Secure production deployment of B2B solutions using WebSphere business integration connect

Many business-to-business (B2B) deployments are unsuccessful due to the lack of proper planning prior to installing and configuring the software solution. Also, it is often forgotten that implementing a B2B solution has implications for the overall IT infrastructure. Network security, network availa...

Descripción completa

Detalles Bibliográficos
Autor principal: Putte, Geert van de (Autor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Research Triangle Park, N.C. : IBM Corp., International Technical Support Organization c2005.
Edición:1st ed
Colección:IBM redbooks.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009755118406719
Tabla de Contenidos:
  • Front cover
  • Contents
  • Figures
  • Tables
  • Notices
  • Trademarks
  • Preface
  • The team that wrote this redbook
  • Become a published author
  • Comments welcome
  • Part 1 Preparing for a B2B project
  • Chapter 1. Overview
  • 1.1 The business of B2B
  • 1.1.1 Business requirements
  • 1.2 Book layout
  • 1.2.1 Part 1. Preparing for a B2B project
  • 1.2.2 Part 2. Managing a B2B project
  • 1.2.3 Part 3. Implementing a B2B solution
  • 1.3 B2B deployment methodology overview
  • Chapter 2. Introducing WebSphere Business Integration Connect
  • 2.1 Features of WebSphere Business Integration Connect
  • 2.2 WebSphere Business Integration Connect Architecture
  • 2.2.1 Runtime components
  • 2.2.2 Configuration components
  • 2.2.3 Profile management
  • 2.3 B2B features and standards
  • 2.3.1 Transport options
  • 2.3.2 Messaging protocol options
  • 2.3.3 Business document formats
  • 2.3.4 Security options in WebSphere Business Integration Connect
  • 2.4 Integration options
  • Chapter 3. Aspects of security
  • 3.1 Overview
  • 3.2 Areas of B2B security
  • 3.2.1 Deployment security
  • 3.2.2 Connection security
  • 3.2.3 Document security
  • 3.2.4 Access control
  • 3.3 Security technologies
  • 3.3.1 Reverse proxy server
  • 3.3.2 Firewalls
  • 3.3.3 Network Address Translation
  • 3.3.4 Port Address Translation
  • Chapter 4. Implementation topologies
  • 4.1 Deployment overview
  • 4.1.1 WebSphere Business Integration Connect components
  • 4.1.2 Database
  • 4.1.3 WebSphere MQ
  • 4.1.4 Firewalls and Proxies
  • 4.2 Distributed-Dual DMZ, Reverse Proxy with Failover
  • 4.2.1 Deployment considerations
  • 4.2.2 Inbound data flow
  • 4.2.3 Outbound data flow
  • 4.2.4 Pros
  • 4.2.5 Cons
  • 4.2.6 Variations of the reverse proxy scenario
  • 4.3 Distributed-Single DMZ
  • 4.3.1 Deployment considerations
  • 4.3.2 Inbound data flow
  • 4.3.3 Outbound data flow
  • 4.3.4 Pros.
  • 4.3.5 Cons
  • 4.3.6 Variations of the Single DMZ Scenarios
  • Part 2 Managing a B2B project
  • Chapter 5. Introduction to B2B projects
  • 5.1 B2B deployment methodology overview
  • 5.1.1 Knowledge transfer and training
  • 5.1.2 Discovery
  • 5.1.3 Planning
  • 5.1.4 Installation
  • 5.1.5 Customization
  • 5.1.6 Testing
  • 5.1.7 Production deployment
  • 5.1.8 Partner ramping
  • 5.1.9 Support
  • 5.2 B2B project scenario overview
  • 5.2.1 Overview of Company E
  • 5.2.2 Business environment
  • 5.2.3 Technical environment
  • 5.2.4 Organizational challenges
  • 5.2.5 New business strategy
  • 5.2.6 Current projects
  • Chapter 6. Project Espresso: Discovery phase
  • 6.1 Company E discovery overview
  • 6.1.1 Task review
  • 6.2 B2B deployment assessment
  • 6.2.1 Project Expresso deployment assessment agenda
  • 6.2.2 Project Expresso deployment assessment presentation
  • 6.3 Roles and responsibilities
  • 6.4 Assessment meeting results
  • 6.4.1 Business objectives
  • 6.4.2 Technical environment review
  • 6.4.3 Community profile
  • 6.4.4 Data flow and integration
  • 6.4.5 Environment, architecture and implementation discussion
  • 6.5 Requirements and scope document
  • Chapter 7. Project Espresso: Planning phase
  • 7.1 Company E planning overview
  • 7.1.1 Task review
  • 7.2 Requirements and follow-up meetings
  • 7.3 Project plan
  • 7.4 Installation and deployment plan
  • 7.4.1 Firewall configuration plan
  • 7.4.2 Reverse proxy configuration plan
  • 7.4.3 Load balancer configuration plan
  • 7.4.4 WebSphere MQ configuration
  • 7.4.5 Database loader deployment plan
  • 7.4.6 Product installation deployment plan
  • 7.4.7 Product configuration plan
  • 7.4.8 Community manager configuration plan
  • 7.4.9 Community participant configuration plan
  • 7.4.10 Certificate deployment plan
  • 7.5 Testing plan
  • 7.6 Training plan
  • 7.7 Support plan.
  • 7.7.1 How to discover or detect problems with transactions
  • 7.7.2 How to report problems
  • 7.7.3 How to resolve reported problems
  • 7.7.4 How to maintain the system
  • Chapter 8. Project Espresso: Testing phase
  • 8.1 Testing overview
  • 8.1.1 Task review
  • 8.2 Test plan review
  • 8.3 Execute the Test Plan
  • 8.4 Performance testing
  • 8.4.1 Performance concepts
  • 8.4.2 Performance tuning
  • 8.4.3 WebSphere Business Integration Connect sizing
  • Chapter 9. Project Espresso: Production deployment phase
  • 9.1 Production Deployment overview
  • 9.1.1 Task review
  • 9.2 Review the deployment plan
  • 9.3 Create production environment
  • 9.4 Verify component installation
  • Chapter 10. Project Espresso: Partner ramping phase
  • 10.1 Company E Partner Ramping overview
  • 10.1.1 Task review
  • 10.2 Trading partner review
  • 10.3 Trading Partner ramping process
  • 10.4 Trading Partner ramping plan
  • Chapter 11. Project Espresso: Support phase
  • 11.1 Company E Support overview
  • 11.1.1 Task review
  • 11.2 Ramping support
  • 11.3 Monitoring and support best practices
  • 11.3.1 Alerts
  • 11.3.2 Monitoring
  • 11.3.3 Debugging
  • 11.3.4 JACL scripts
  • 11.3.5 Console configuration
  • 11.3.6 Profile configuration
  • 11.3.7 Disaster recovery
  • 11.3.8 Archive process
  • 11.3.9 Logs
  • 11.3.10 Data security
  • 11.4 Support process and issue resolution
  • Part 3 Implementing a B2B solution
  • Chapter 12. Validating the environment
  • 12.1 Create a validation checklist
  • 12.2 Validate hardware and operating system
  • 12.3 Validate network
  • 12.4 Verifying software levels
  • 12.4.1 Verifying DB2
  • 12.4.2 Verifying WebSphere MQ
  • 12.4.3 Enabling DB2 stored procedures
  • 12.5 Review validation results
  • Chapter 13. Implementing a firewall
  • 13.1 Network services and vulnerability
  • 13.1.1 Minimizing security risk: Introducing the firewall.
  • 13.2 Introduction to firewall
  • 13.3 Firewall types
  • 13.4 Functional components of a firewall
  • 13.4.1 Packet-filtering router
  • 13.4.2 Application-level gateway
  • 13.4.3 Network Address Translation
  • 13.5 Firewall architecture
  • 13.5.1 Packet filtering firewall
  • 13.5.2 Dual-homed gateway firewall
  • 13.5.3 Screened host firewall
  • 13.5.4 Screened subnet firewall
  • 13.6 Implementing firewalls in our B2B solution
  • 13.6.1 Firewall1
  • 13.6.2 Firewall2
  • 13.6.3 Firewall3
  • 13.7 Limitations of a firewall
  • Chapter 14. Implementing a proxy server
  • 14.1 Overview of proxy servers
  • 14.2 Reverse proxy
  • 14.3 Discussing the data flow
  • 14.4 Configuring the IBM HTTP server as reverse proxy
  • 14.4.1 Create an administrator user ID and password
  • 14.4.2 Configure the IBM HTTP server
  • 14.5 Validating the reverse proxy
  • 14.6 Using IBM HTTP Server V2.x as reverse proxy
  • Chapter 15. Deploying the solution
  • 15.1 Overview
  • 15.2 Software installation
  • 15.2.1 Adding user accounts on the DB2 server
  • 15.2.2 Installing database schema
  • 15.2.3 WebSphere MQ configuration
  • 15.2.4 Installing the DB2 Client
  • 15.2.5 Installing WebSphere MQ Client and JMS libraries
  • 15.2.6 Installing the common share files
  • 15.2.7 Adding a Windows user ID and group
  • 15.2.8 Installing the Document Manager
  • 15.2.9 Installing the Community Console
  • 15.2.10 Installing the receiver
  • 15.3 Initial server configuration
  • 15.4 Hub configuration
  • 15.4.1 Create targets
  • 15.4.2 Create interactions
  • 15.4.3 Create community manager
  • 15.4.4 Create community participant
  • 15.5 Community Manager configuration
  • 15.5.1 Create a gateway
  • 15.5.2 Provide B2B capabilities
  • 15.6 Community Participant configuration
  • 15.7 Configure participant connection
  • Chapter 16. Implementing a load balancer
  • 16.1 Load balancing overview.
  • 16.1.1 WebSphere Edge Server
  • 16.1.2 Load balancer
  • 16.2 Load balancing using Media Access Control (MAC) forwarding
  • 16.2.1 How it works
  • 16.2.2 Overall solution design
  • 16.2.3 Load balancing deployment design
  • 16.3 Install WebSphere Edge Server Network Dispatcher
  • 16.4 Configure Network Dispatcher for load balancing
  • 16.4.1 Start Network Dispatcher
  • 16.4.2 Configure Network Dispatcher with the Dispatcher GUI
  • 16.4.3 Configuring the cluster IP address on the network adapter
  • 16.4.4 Aliasing the cluster address on the load-balancing servers
  • 16.5 Validate the load balancing environment
  • 16.6 IP session affinity
  • 16.7 Access the components
  • Chapter 17. Troubleshooting the deployment
  • 17.1 Configuration issues for multihomed servers
  • 17.2 Execution issues
  • 17.2.1 System log files
  • 17.2.2 Analyze traffic on your network
  • 17.2.3 Reprocessing failed events and business documents
  • 17.3 Performance Issues
  • 17.3.1 Increase the Receiver timeout setting
  • 17.3.2 Insufficient virtual memory for DB2 agents
  • 17.3.3 Optimizing database query performance
  • 17.3.4 Avoiding out-of-memory errors
  • 17.3.5 Avoid long processing time on large, encrypted AS documents
  • Chapter 18. Implementing HTTPS
  • 18.1 Overview of SSL and the SSL handshake
  • 18.2 SSL data flow
  • 18.3 Firewall changes
  • 18.3.1 Validating the firewalls
  • 18.4 Configuring the IBM HTTP Server 1.3.x for SSL
  • 18.4.1 Create a key store file
  • 18.4.2 Generate a self-signed certificate
  • 18.4.3 Configure the IBM HTTP Server for SSL
  • 18.4.4 Validating the reverse proxy
  • 18.5 Using IBM HTTP Server V2.x as a reverse proxy
  • 18.6 Establishing trust from the proxy server to the Console
  • 18.6.1 Validating the reverse proxy
  • 18.7 Enforcing SSL connections to the Community Console
  • 18.7.1 Validating the changes
  • 18.8 SSL with Load Balancer.
  • 18.8.1 Configuring the Cluster IP address on the Network Adapter.