Changes for page Data Exchange
Last modified by Erik Bakker on 2024/09/05 14:00
From version 1.1
edited by eMagiz
on 2022/05/05 10:04
on 2022/05/05 10:04
Change comment:
There is no comment for this version
To version 10.1
edited by Erik Bakker
on 2022/07/26 14:11
on 2022/07/26 14:11
Change comment:
There is no comment for this version
Summary
-
Page properties (5 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,0 +1,1 @@ 1 +Data Exchange - Parent
-
... ... @@ -1,0 +1,1 @@ 1 +WebHome - Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. marijn1 +XWiki.ebakker - Default language
-
... ... @@ -1,0 +1,1 @@ 1 +en - Content
-
... ... @@ -1,115 +1,92 @@ 1 -{{ html wiki="true"}}2 - <divclass="ez-academy">3 - <divclass="ez-academy_body">1 +{{container}}{{container layoutStyle="columns"}}((( 2 +Because eMagiz provides the integration between two or more applications via the eMagiz platform, the point at which the data is interchanged between application and integration is a critical part of the integration in terms of security. 3 +Within eMagiz, there are three main integration patterns a user can configure to support their business case most optimally. First, this section will look at all three integration types and specify the security measures. 4 4 5 - <divclass="doc">5 +Should you have any questions, please get in touch with [[academy@emagiz.com>>mailto:academy@emagiz.com]]. 6 6 7 +== 1. Prerequisites == 7 7 9 +* Expert knowledge of the eMagiz platform 8 8 9 -= XPathAdvanced=11 +== 2. Key concepts == 10 10 11 - Within the crashcourse, we already explained XPath conceptually. In that same microlearning,we alsolooked at some more uncomplicated cases ofusing XPath within your transformation. If you need to brushuponthat knowledge, pleaseheck out this [microlearning](crashcourse-platform-create-transformation-xpath-basic.md). In theintermediate microlearning on thissubject,webuilt uponthat knowledge. Pleasecheck out this [microlearning](intermediate-create-your-transformations-xpath-intermediate.md)if you needrefresher onthat.In this microlearning,we will build uponthat knowledgeand look at some concrete,practicalexamplesthat could be useful in yourproject.13 +This microlearning focuses on security considerations when exchanging data via the platform. 12 12 13 - Shouldyouhave anyquestions,pleaseget intouchwithacademy@emagiz.com.15 +* Each pattern comes with generic and specific checks and balances to ensure security is taken care of when exchanging data. 14 14 15 -* Last update: October 25th, 2021 16 -* Required reading time: 6 minutes 17 +== 3. Data Exchange == 17 17 18 -== 1. Prerequisites == 19 +Because eMagiz provides the integration between two or more applications via the eMagiz platform, the point at which the data is interchanged between application and integration is a critical part of the integration in terms of security. 20 +Within eMagiz, there are three main integration patterns a user can configure to support their business case most optimally. First, this section will look at all three integration types and specify the security measures. 19 19 20 -* Advanced knowledge of the eMagiz platform 21 -* [XPath Basic](crashcourse-platform-create-transformation-xpath-basic.md) 22 -* [XPath Intermediate](intermediate-create-your-transformations-xpath-intermediate.md) 22 +=== 3.1 Messaging === 23 23 24 - crashcourse-platform-create-transformation-xpath-basic25 - crashcourse-platform-create-transformation-XPath-basic24 +Messaging is the most flexible option of the three; therefore, a wide range of options is available within eMagiz to secure the connections. 25 +eMagiz offers users the tools to set up integrations and end-points securely. eMagiz supports well-known market standards, including: 26 26 27 -== 2. Key concepts == 27 +* OpenID Connect 28 +* WS-Security 29 +* API Keys in combination with HTTPS/SSL 30 +* SOAP Authentication 31 +* OAuth2.0 32 +* Basic Authentication 28 28 29 -This microlearningfocuses onmorecomplexXPath operations.34 +This way, each connection between the application and the integration (end-point) can be adequately secured and gives the flexibility to confer with the external application which method best suits their needs. 30 30 31 - WithXPathAdvanced, we mean learning that XPathoptionsare complex butcould benefit you in your dailywork.36 +=== 3.2 API Gateway === 32 32 33 - Some of themore complexXPath options are:38 +A structure with roles and rights per role can be specified within the portal or via an external IDP to secure the front end of the API Gateway in eMagiz. Note that for the backend of the API Gateway, the same logic applies as stated above for messaging, which means that eMagiz supports the industry standard. Therefore, you as a user should confer with the external party about the correct method. 34 34 35 -* dateTime calculation 36 -* Filter list 37 -* XPath on JSON 38 -* SpEL notation for XPath 40 +==== 3.2.1 Portal ==== 39 39 42 +As shown in the picture below, the roles are defined so that the Read role can only access two integrations available for this specific API Gateway. If a client has insufficient rights, they will receive a 401 Unauthorized 40 40 44 +[[image:Main.Images.Fundamental.WebHome@fundamental-emagiz-security-guide--api-gateway-portal-feedback.png]] 41 41 42 -== 3. XPath Advanced==46 +==== 3.2.2 (External) IDP ==== 43 43 44 -Within the crash course, we already explained XPath conceptually. In that same microlearning, we also looked at some more uncomplicated cases of using XPath within your transformation. If you need to brush up on that knowledge, please check out this [microlearning](crashcourse-platform-create-transformation-xpath-basic.md). In the intermediate microlearning on this subject, we built upon that knowledge. Please check out this [microlearning](intermediate-create-your-transformations-xpath-intermediate.md) if you need a refresher on that. In this microlearning, we will build upon that knowledge and look at some concrete, practical examples that could be useful in your project. 48 +Apart from configuring the roles, users, and rights within the portal itself, it is also possible to hook the API Gateway up to an (external) IDP. 49 +By communicating with this IDP via the OAuth2.0 protocol, a check is done every time a client calls a specific operation to see whether that client has sufficient rights to access the operation. 45 45 46 - Someof themore complexXPathoptions are:51 +If the client has sufficient rights, the process continues. For example, if the client has insufficient rights, the client receives a 401 Unauthorized. 47 47 48 -* dateTime calculation 49 -* Filter list 50 -* XPath on JSON 51 -* SpEL notation for XPath 53 +==== 3.2.3 Error Handling ==== 52 52 53 - ===3.1dateTime calculation===55 +To prevent the error message if it occurs is sent straight back to the client, you can configure the front end of the API Gateway so that correct HTTP Status codes are given back to the client, including a descriptive message. 54 54 55 - Sometimeswe see that a dateTime calculation is neededwithina transformationtodetermineaspecific action. Asthesecalculationsarenotnatively supportedwithinthe eMagiz platform,you needto useXPath'sfunctionalitytocalculatethenewvaliddate(ordateTime).57 +For more information on how this precisely can be configured via the eMagiz platform, please check the following [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course API Gateway.crashcourse-api-gateway-configure-roles-and-users.WebHome||target="blank"]]. 56 56 57 - TheXPath standard offers several functions to calculate with dateTime values.The two most used options are dayTimeDuration and yearMonthDuration. With the help of the dayTimeDuration, you can add, subtract, multiple, or divideseconds, minutes,hours, and days regarding the original value. The yearMonthDuration works similarly but then for months and years. An example of such an XPath is: <xsl:value-of xmlns:xs="http://www.w3.org/2001/XMLSchema" select="CDM:StartDate+ xs:dayTimeDuration('P1D') * xs:yearMonthDuration('P1M')"/>. In this example, XPath adds one day and subtracts one month from the input date. Note that makingthis work requires the additional namespace to be defined. Therefore you need a custom snippet within your transformation or a custom transformation to make this work. Furthermore, note that the P1D and P1M could also be filled with the help of parameters to make them dynamic in nature.59 +=== 3.3 Event Streaming === 58 58 59 -Some examples that we saw during the years: 61 +Within the Event Streaming solution, eMagiz provides Event Streaming users, and topics can be created. 62 +Access to a topic within a cluster is governed by an Access Control List (ACL). This ACL links users to a topic and defines what the user can do on a topic (consume, produce, both). 60 60 61 -* https://my.emagiz.com/p/question/172825635700358186 62 -* https://my.emagiz.com/p/question/172825635700352588 64 +Only users with sufficient rights in the Deploy phase of eMagiz can add users, and topics and change the ACL entries specific to the Event Streaming cluster. 63 63 64 - ===3.2Filter list===66 +Apart from producing or consuming data on specific topics based on the ACL, users also need a valid Keystore (containing the key and cert generated automatically) and a valid truststore (containing the CA certificate of the event streaming cluster) to produce or consume data. 65 65 66 - Sometimesyou have alargemessagewhich containsa certain listwithin it. However, logic dictates thatyoucan only send themessage if at least one entry in the list for which attribute A is filled and attributeB equals type C. Tomake that happen in XPath, we first need tonavigateto the list within the message. As we previously learned,therearetwo options to do so. Oneisto use // tonavigate to the entity somewherein thetreedirectly.The other is to start at theroot and walk the tree from there. In thisexample, we usethe latter. That results in the followingXPathxample:/root/list[attributeB = 'type C']/attributeA!=''. With thisXPath, you filterthelist on the specifiedcheck and subsequently check whetheroneofthoseentries that remains has an attributeA which isfilled in.68 +These are all security measures to prevent third parties from unauthorized access to the data stored on the topics. 67 67 68 - ===3.3XPath onJSON===70 +For more information on how this precisely can be configured via the eMagiz platform, please check the following [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Event Streaming.crashcourse-eventstreaming-user-management.WebHome||target="blank"]]. 69 69 70 - Withthe release of build number.50,weexpanded ouroffering on JSON messages to resemblemuch of the functionality we previously offered for XML messages. As a result, you can use XPath expressions on JSON messages within the following components (related to XPath):72 +=== 3.4 General === 71 71 72 -* XPath header enricher 73 -* XPath transformer 74 -* XPath router 74 +Regardless of the selected pattern for your solution, it would be best if you always considered that you only exchange relevant information with the external party. This means you should consider both headers as the payload you need to exchange with the external party. This is particularly interesting for any communication via HTTP gateways as they hold functionality to send all message headers as HTTP headers and vice versa. 75 75 76 -To activate the functionality, simply link the JSON source factory support object to one of these components to achieve the desired result. For more information, check out: https://emagiz.github.io/docs/release-notes/build50. 77 - 78 -=== 3.4 SpEL notation for XPath === 79 - 80 -Sometimes you want to perform an XPath operation but store the header via a standard message header enricher component. As a result, you need a valid SpEL expression to help you in this cause. To do so, you need to know the correct notation for an XPath expression when using the SpEL language. An example of the correct notation is: #xpath(payload,'/root/entity/attribute') 81 - 82 -===== Practice ===== 83 - 84 84 == 4. Assignment == 85 85 86 -Check outwhich ofthe XPathswe have discussedtodaycanbefoundwithin your project.78 +Check whether you might be exchanging too much information with an external party within your project. 87 87 This assignment can be completed within the (Academy) project you created/used in the previous assignment. 88 88 89 89 == 5. Key takeaways == 90 90 91 -Some of the more complex XPath options are: 83 +* Each pattern comes with generic and specific checks and balances to ensure security is taken care of when exchanging data. 84 +* When you are not careful, you might share too much information with external parties. 92 92 93 -* dateTime calculation 94 -* Filter list 95 -* XPath on JSON 96 -* SpEL notation for XPath 97 - 98 - 99 - 100 100 == 6. Suggested Additional Readings == 101 101 102 -If you are interested in this topic and want more information on it, please read the help text provided by eMagizand read more information on the following link:88 +If you are interested in this topic and want more information, please read the help text provided by eMagiz. 103 103 104 -* https://www.w3schools.com/xml/xpath_intro.asp 105 - 106 106 == 7. Silent demonstration video == 107 107 108 -As this is more of theoretical microlearning, there is no video accompanying the microlearning. 109 - 110 -</div> 111 -</main> 112 -</div> 113 -</div> 114 - 115 -{{/html}} 92 +As this is more of theoretical microlearning, there is no video accompanying the microlearning.)))((({{toc/}}))){{/container}}{{/container}}