Page 1 June. 2015Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Unsecured ServicesPage 8 Exposing Unsecured Services as SecuredPage 9 Exposing Secured Services as UnsecuredPage 10 Security TransitionPage 11 Page 12 Page 13 Page 14 Page 15 Page 16 Page 17 Page 18 Page 19 Page 20 ● ● ● ● ●Page 21 ● ●Page 22 http://ws.apache.org/ns/synapse https://localhost:9443/service https://localhost:9443/service https://localhost:9443/servicePage 23 http://en.wikipedia.org/wiki/XACML http://en.wikipedia.org/wiki/XACML http://en.wikipedia.org/wiki/XACMLPage 24 Page 25 Page 26 http://wso2.com/library/articles/2012/07/kerberos-authentication-using-wso2-products/ http://wso2.com/library/articles/2012/07/kerberos-authentication-using-wso2-products/Page 27 Protocol TransitionPage 28 Page 29 Page 30 Page 31 Page 32 Using OAuth Mediator https://docs.wso2.org/display/ESB481/OAuth+MediatorPage 33 Constrained Access DelegationPage 34 Constrained Access Delegation https://localhost:9444/oauth2/token http://10.225.175.182:8282/stockquote/view/IBMPage 35 Security patterns with WSO2 ESBPage 36 Page 37 QnAPage 38 Page 39 http://wso2.com/contact https://twitter.com/wso2 https://www.facebook.com/WSO2Inc