Choosing a SOA Gateway
Considerations for Business Managers
Agenda
Introduction
Key Functionality
- Deployability
- Interoperability
- Extensibility
- Manageability
- etc
Conclusions
- Total cost of ownership
Additional Resources
INTRODUCTION
SOA Gateway Use Cases
SOA
- Runtime governance (security, policy enforcement and lifecycle management)
- Enterprise application integration
- Sharing sensitive information between businesses/governments
- Business rule enforcement (such as SLAs; contract-defined limits [# of downloads/day])
Web
- API management
Cloud
- Identity federation (including SSO to SaaS applications)
- Integrating enterprise applications with cloud-based services
NOT ALL SOA GATEWAYS ARE THE SAME
Deployability
Multiple form factors allow you to choose a solution
that matches your budget and requirements
Hardware Software
VMware Amazon Machine Image
Interoperability
Appserver
Secure Token Server
(customizations,
queues, etc)
(identity federation)
Cloud Gateway/ Cloud Broker
IAM system
(authentication/
authorization)
Avoid vendor lock-in by ensuring your vendor
can accommodate heterogeneous SOA
Platform Interoperability
Out-of-the-box, multi-platform support
decreases integration costs
Extensibility
Gateways that run custom code simplify
customization by avoiding appserver integration
Custom Code
Secure Token Service, PKI & Custom Code Onboard
An all-in-one solution speeds time to
deployment and decreases costs
Manageability – Local Clusters
(automated replication)
(clustered systems)
Single point of administration
simplifies management
Administration Console
Service Metering
IPTV SMS MMS Ringtones
Pascal
Quincy
Gets 1 free TV
show per month
Gets 200 SMS
per month
Customer
Contract
Telco service
provisioning system
Integrated clustering lets you
enforce exact contractual limits
Manageability – Global Deployments
Central administration and visibility for all
Gateways lowers management costs
Manageability – Migration Risk
Development
(Asia)
Test / Staging
(cloud)
Production
(EMEA)
test01LDAP
prod02LDAP
dev01LDAP
Production
(NA)
prod01LDAP
IP: XXX
IP: XYY
IP: XXYIP: YYY
Trust relationships
URL linksCertificates
Queue names
Automatically resolving dependencies
between environments reduces migration risk
Constrained National Service Rollout
IT time and resource constraints can
delay service rollout, impacting ROI
Streamlined National Service Rollout
Speed time to deployment by
automating service migration
Upgradeability
Hardware Upgrade
Migration Path
Gateways that decouple hardware from
soft/firmware simplify upgradeability
Soft/Firmware Upgrade
Migration Path
License Portability
Physical Virtual Cloud
License portability lets you avoid
platform lock-in and re-licensing costs
CONCLUSIONS
Total Cost of Ownership – Deployment
Cost of Deployment
Deployment Options
Hardware Appliance
Virtual Appliance
Software (for RHEL, SUSE & Solaris)
Amazon Machine Image
Total Cost of Ownership – Operations
Cost of Deployment
Cost of Operations
Deployment Options
Hardware Appliance
Virtual Appliance
Software (for RHEL, SUSE & Solaris)
Amazon Machine Image
Operations
Cluster Support
Automated Failover
Software Upgrade
Integrated Management
Single point of Admin
“Freedom” License
Total Cost of Ownership – Extensibility
Cost of Deployment
Cost of Operations
Cost of Implementation
Deployment Options
Hardware Appliance
Virtual Appliance
Software (for RHEL, SUSE & Solaris)
Amazon Machine Image
Operations
Cluster Support
Automated Failover
Software Upgrade
Integrated Management
Single point of Admin
“Freedom” License
Extensibility
Native Java-based SDK
Cloud Ready
JMS, WebSphere MQ, raw TCP, etc
Additional Resources
Contact:
- Dana Crane, Product Marketing Manager
Download:
- “Not all SOA Gateways are Created Equal” White Paper
- http://www.layer7tech.com/library/
Attend our next webinar: Managing API Security in SaaS and Cloud
Presented by Scott Morrison, Layer 7 CTO & Liam Lynch, eBay Chief Security Strategist
- Security challenges posed by SOAP, REST and Odata APIs
- Approaches to addressing data and access security
- Ways to leverage existing security investments
- Methods for enrolling third-party developers
- Examples from the real world of how cloud providers use and secure APIs