13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ClientTierSynchronousApplicationSynchronous Application 1AsynchronousApplication 2Figure 11-2 Self-Service:: Directly Integrated Single Channel application patternThe primary business driver that directed the use of this pattern is to reducebusiness process latency by providing direct access to back-end application anddata from the Web-enabled business process.This pattern provides a structure for point-to-point connection from the clientbrowser to one or more applications. We do not need multiple channelintegration mechanisms. Although this Application pattern can be used toimplement any one of the delivery channels, we only focus our design on theWeb delivery channel.This Application pattern requires applications to be divided into three differentlogical tiers: presentation, Web application and back-end business logic. Datacan be accessed from both Web and business tiers. We can have in mind anytypical J2EE structure while selecting this pattern.►►►The presentation tier is responsible for all the application presentation logic.In the Web application tier, some of the application business logic is done andall the communication to the back-end business logic is implemented.Back-end application logic in our case covers data access functions of theITSOBank application. Here, are all the application integration interfaces areimplemented as well.All the communication between tiers is either synchronous or asynchronous.11.2.2 Application pattern for the Access Integration patternThe main goal of the Access Integration pattern is to give users a consistent andseamless front-end access mechanism to multiple business applications thatreside on multiple servers, each with its own access mechanism.In our ITSOBank example, we have chosen the Extended Single Sign-Onapplication pattern.354 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!