
It is maybe just a little thing and you probably payed never attention to something like theYou may need adequate protection. ("You may need adequate protection " by Umit Yalcinalp . She is a research architect at SAP Research.)
But you will also quickly find out about these discussions when you exchange WSDL-description files with consumers.
In our current project, we had serious trouble exchanging wsdl-files with the brand new ws-policy tags.
Depending on the versions and abilities of the consumer workbench, the file will be rejected. Only a few systems recognize the ws-policy-tags right now. This will change with the raising web services security discussion and SAML.
What is it anyway? There is a pretty good explanation at msdn:
" The WS-Policy and WS-PolicyAttachment specifications extend this foundation and offer mechanisms to represent the capabilities and requirements of Web services as Policies."
WS-Policy enables the description of security requirements and guidelines to interact with web based services. It is the definition of an extensible framework to realize simple requirements, usually for transportation protocols and security procedures for authentication.
It is really easy to turn the policy tags off and you don't have to do it manually.
Go into your ECC-System and start transaction SOAMANAGER
Inside the SOA Manager, select „Business Administration"
Select your actual service.
Then you see the links to show the source code for your wsdl service .
This is the view when you start the SOA-Manager in your ECC-System
In the URL of the browser, you can see the „ws_policy" part
Just type in „standard" instead, replacing the ws_policy" tag
The SOAMANAGER of your PI-System has a slight different look
At the end, you should have a WSDL without the policy tags.
This is maybe not the most strategic how-to, but should give a quick "fix-it".
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
11 | |
10 | |
9 | |
7 | |
6 | |
5 | |
5 | |
5 | |
4 | |
4 |