tag:blogger.com,1999:blog-5879862082923120144.post7396727762509122239..comments2012-03-21T05:12:26.049+05:30Comments on Creative SOA: OWSM : Applying PoliciesLalit Jolaniahttp://www.blogger.com/profile/11487454795808624047noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-5879862082923120144.post-42428308586698191792008-08-20T12:49:00.000+05:302008-08-20T12:49:00.000+05:30Lalit has perspicaciously brought to fore how simp...Lalit has perspicaciously brought to fore how simple it is to secure your resources using OWSM. For those wondering if OWSM is the only ray of hope, rest assured. There is more. You might as well use JDeveloper and secure your resources, creating keystores to store the keys, certificates etc. Then you can go ahead and add all those that Lalit talked about - authentication, authorization and so on. It is a little cubersome though, and is recommended only if you dont have OWSM. If you have OWSM, nothing like it.Sankash Thakuriahttps://www.blogger.com/profile/07125918688592118177noreply@blogger.com