** A question on XML Gateway: How do you handle the security/authentication to (1) not expose data that shouldn't be exposed and (2) control incoming data to ensure nasty data doesn't do things it shouldn't?

Thanks,
Axton Grams

On 11/11/06, John Baker <[EMAIL PROTECTED]> wrote:
Mike,

You should neither be using webservices (because they are wholly inadequate)
or a filter plugin (unscalable, one off bespoke code, requires testing on
each upgrade, messy, frowned upon, etc.).

There are a number of XML integration tools for Remedy in the market, and
because I'm totally biased, I'm going to tell you that ours is the best (by a
long way). Of course, I'd recommend you look at a few, so you can come to the
same conclusion as our customers.

To help you with your design, you'll want to look at these diagrams:
http://www.javasystemsolutions.com/img/diagrams, and this document:
http://www.javasystemsolutions.com/docs/XMLGateway.pdf

The solution will do everything you want, reliably, both inbound and outbound.
We can send you someone to help if required.

I will also point out that, the technicals are only easy if you're using a
decent tool (there are no good out of the box integration tools), and it's
never easy getting two parties to talk to each other reliably and securely.
While technically, you should be able to implement such an approach rapidly,
we often find ourselves spending too much time mapping data and discussing
failover - for example:

What happens if the third party sends data to you and you can't (currently)
process it?
What happens if you can't processs it but could at a later date (database
down, but XML listening service up)?
What happens if you can't send your data to the third party at any point in
time?
What happens if you can send your data, but the third party provides an XML
response stating that it can't be processed right now, but should be resent
later?
What happens when a third party sends you some XML which doesn't match the
schema (and they will)?
How do you handle attachments in a sensible fashion? How are attachments
provided (URL or SOAP headers, perhaps)?
What happens when your third party wants to send the
strings 'apples', 'pears', 'bananas', but you need Remedy enumerated values
(0, 1, 2, etc.)?

The list is absolutely endless.

Once you start to do the job properly, there are a whole pile of questions
you'll need to address.


John

Java System Solutions : http://www.javasystemsolutions.com

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the Answers Are"

__20060125_______________________This posting was submitted with HTML in it___

Reply via email to