- WSO2 Developer’s Guide
- Fidel Prieto Estrada Ramón Garrido Lázaro
- 85字
- 2021-07-08 10:06:02
Secure proxy
The proxy that we create using this wizard will be secured using WS-Security standard, and can be used to secure a backend service that has no security restriction.
Consider that we have a legacy backend service with no security, and it does not support any type of authentication. We can create a secure proxy, configure to use a WS-Security policy, and then consume the insecure backend; this proxy will be the public service available to the final consumer instead of the legacy one:

推薦閱讀
- Android和PHP開(kāi)發(fā)最佳實(shí)踐(第2版)
- MySQL數(shù)據(jù)庫(kù)應(yīng)用與管理 第2版
- Mastering Concurrency in Go
- The React Workshop
- 前端架構(gòu):從入門(mén)到微前端
- Learn Swift by Building Applications
- Internet of Things with the Arduino Yún
- PySide GUI Application Development(Second Edition)
- 領(lǐng)域驅(qū)動(dòng)設(shè)計(jì):軟件核心復(fù)雜性應(yīng)對(duì)之道(修訂版)
- Java SE實(shí)踐教程
- iOS開(kāi)發(fā)項(xiàng)目化入門(mén)教程
- 量子計(jì)算機(jī)編程:從入門(mén)到實(shí)踐
- Flutter之旅
- Eclipse開(kāi)發(fā)(學(xué)習(xí)筆記)
- Internet of Things with Arduino Cookbook