Ever since I was first started working with IBM WebSphere DataPower I was looking around for someone that was offering[…]
Read moreLatest Posts
JBoss World 2012 Session–Trusted Security with JBoss Enterprise Application Platform
It’s been a few weeks since I have posted any updates. I started a new project at the beginning of[…]
Read moreFine Grained Authorization versus Coarse Grained Authorization
I was recently involved in a conversation where someone asked the question what is FGA (Fine Grained Authorization) versus Coarse[…]
Read moreRBM–Administrative Access & Security for DataPower
I generally recommend to clients that DataPower RBM (Role-Based Management) be configured to perform authentication and authorization of DataPower administrators[…]
Read moreDataPower Appliances & HSMs
I’ve been in a couple of shops that have used the HSM module option of DataPower for FIPS 140-2 v2[…]
Read moreJBoss World 2012 Session…
I will be presenting at JBoss World 2012 in Boston the last week of June. I’ll be presenting with Anil[…]
Read moreDataPower Exports and XML Files Referenced by Stylesheets
I was recently presented with an opportunity to be clever while promoting DataPower objects from a development environment to a[…]
Read moreHow To Rename a WS-Proxy or Multi-Protocol Gateway Object on a DataPower Appliance
Anyone who has worked with DataPower for a while has gotten into a situation where they need to rename a[…]
Read moreThomas Erl’s SOA Book Series
I listed several of Thomas Erl’s books in my SOA Recommended reading list. A full list of Thomas Erl’s series[…]
Read moreWho Owns DataPower Within An Organization?
The definition of the word ownership has varying meanings across organizations, but there is always a group that retains control[…]
Read more