Oracle Fusion Middleware Online Documentation Library

Oracle® Fusion Middleware
Administrator’s Guide for Oracle Service Bus
11g Release 1 (11.1.1.5.0)
E15867-03

April 2011

Oracle Fusion Middleware Administrator's Guide for Oracle Service Bus, 11g Release 1 (11.1.1.5.0)
E15867-03
Copyright © 2008, 2011, Oracle and/or its affiliates. All rights reserved.
Primary Authors:

Floyd Jones, Legacy authors

Contributing Author:
Contributor:
This software and related documentation are provided under a license agreement containing restrictions on
use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your
license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,
transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse
engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is

prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If
you find any errors, please report them to us in writing.
If this software or related documentation is delivered to the U.S. Government or anyone licensing it on
behalf of the U.S. Government, the following notice is applicable:
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data
delivered to U.S. Government customers are "commercial computer software" or "commercial technical data"
pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As
such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and
license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of
the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software
License (December 2007). Oracle USA, Inc., 500 Oracle Parkway, Redwood City, CA 94065.
This software is developed for general use in a variety of information management applications. It is not
developed or intended for use in any inherently dangerous applications, including applications which may
create a risk of personal injury. If you use this software in dangerous applications, then you shall be
responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure the safe use
of this software. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of
this software in dangerous applications.
Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks
of their respective owners.

This software and documentation may provide access to or information on content, products, and services
from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all
warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and
its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of
third-party content, products, or services.

Contents
Preface ........................................................................................................................................................... xxxv
Documentation Accessibility ...............................................................................................................
Conventions ...........................................................................................................................................

xxxv
xxxv

1 Interoperability Scenarios and Considerations
1.1
1.2
1.3
1.4
1.4.1

1.4.2
1.4.3

Part I

Supported Configurations .........................................................................................................
Supported Standards and Implementations ...........................................................................
Platform Interoperability ...........................................................................................................
Platform Interoperability Limitations......................................................................................
.NET Interoperability Limitations .....................................................................................
Apache Axis Interoperability Limitations........................................................................
WebSphere Interoperability Limitations..........................................................................

1-1
1-1
1-4
1-7
1-7
1-7
1-8


Console Help for Oracle Service Bus

2 Introduction to Oracle Service Bus
2.1
2.2
2.3

Starting the Oracle Service Bus Administration Console ..................................................... 2-1
Customizing Table Views.......................................................................................................... 2-2
Resource Naming Restrictions .................................................................................................. 2-2

3 Change Center
3.1
3.2
3.3
3.4
3.5
3.6
3.6.1

3.6.2
3.7
3.8
3.9

Using the Change Center...........................................................................................................
Activating Sessions .....................................................................................................................
Exiting Sessions ...........................................................................................................................
Viewing Configuration Changes ..............................................................................................
Purging Session Activation History .........................................................................................
Undoing Tasks.............................................................................................................................
Order of Undoing Tasks .....................................................................................................
Undoing Into a Session .......................................................................................................
Viewing Task Details..................................................................................................................
Viewing All Sessions ..................................................................................................................
Viewing and Resolving Conflicts .............................................................................................

3-2
3-2
3-3

3-3
3-5
3-5
3-6
3-6
3-6
3-7
3-7

iii

4 Working with Projects, Folders, and Resources
4.1
4.1.1
4.2
4.3
4.4
4.5
4.6
4.7

4.8
4.9
4.10
4.11
4.12
4.13
4.14
4.15
4.16
4.17
4.18
4.19
4.20
4.21
4.22
4.23
4.24
4.25
4.26
4.27

4.28
4.29
4.30
4.31

Naming Projects and Folders ................................................................................................... 4-1
Qualifying Resource Names Using Projects and Folders .............................................. 4-1
Projects View Page...................................................................................................................... 4-1
Project/Folder View Page.......................................................................................................... 4-2
Adding Projects ........................................................................................................................... 4-4
Renaming Projects....................................................................................................................... 4-4
Moving Projects (Converting to a Folder) ............................................................................... 4-5
Cloning Projects ......................................................................................................................... 4-5
Deleting Projects.......................................................................................................................... 4-6
Adding Folders............................................................................................................................ 4-6
Renaming Folders ....................................................................................................................... 4-7
Moving or Upgrading Folders .................................................................................................. 4-7
Cloning Folders ........................................................................................................................... 4-8
Deleting Folders .......................................................................................................................... 4-8
Creating Resources ..................................................................................................................... 4-9

Loading Resources from a Zip File........................................................................................ 4-10
Load Resources - Select Zip File and Review Type Extensions Page............................... 4-11
Loading Resources from a URL ............................................................................................. 4-11
Load Resources - Load Resources from URL Page............................................................. 4-12
Load Resources - Review Loaded Resources Page ............................................................. 4-12
Load Resources - Import Result Page ................................................................................... 4-12
View References Page.............................................................................................................. 4-13
Viewing References to Resources .......................................................................................... 4-13
View Change History Page..................................................................................................... 4-14
Using the Resource Browser................................................................................................... 4-14
Renaming Resources ............................................................................................................... 4-15
Moving Resources.................................................................................................................... 4-15
Cloning Resources ................................................................................................................... 4-15
Exporting a WSDL ................................................................................................................... 4-16
Generating a WSDL ................................................................................................................. 4-16
Viewing Resources in a Web Browser .................................................................................. 4-17
Deleting Resources................................................................................................................... 4-18

5 XML Schemas
5.1

5.2
5.3
5.4
5.5
5.6

Locating XML Schemas..............................................................................................................
Adding XML Schemas................................................................................................................
Editing XML Schemas ................................................................................................................
Deleting XML Schemas ..............................................................................................................
Viewing Unresolved XML Schema References ......................................................................
Resolving Unresolved XML Schema References....................................................................

5-1
5-2
5-2
5-4
5-4
5-5


6 Alert Destinations
6.1
6.2
6.3

iv

Locating Alert Destinations....................................................................................................... 6-1
Adding Alert Destinations......................................................................................................... 6-2
Adding E-Mail and JMS Recipients.......................................................................................... 6-3

6.3.1
6.3.2
6.4
6.5

Adding E-Mail Recipients ..................................................................................................
Adding JMS Destinations ...................................................................................................
Editing Alert Destinations .........................................................................................................
Deleting Alert Destinations .......................................................................................................

6-3
6-4
6-4
6-5

7 WSDLs
7.1
7.2
7.3
7.4
7.5
7.6

Locating WSDLs..........................................................................................................................
Adding WSDLs ...........................................................................................................................
Editing WSDLs ............................................................................................................................
Deleting WSDLs ..........................................................................................................................
Viewing Unresolved WSDL References ..................................................................................
Resolving Unresolved WSDL References................................................................................

7-1
7-2
7-2
7-4
7-5
7-5

Locating JARs ..............................................................................................................................
Adding JARs ................................................................................................................................
Editing JARs.................................................................................................................................
Editing JAR Dependencies ........................................................................................................
Deleting JARs...............................................................................................................................

8-1
8-2
8-2
8-3
8-4

8 JARs
8.1
8.2
8.3
8.4
8.5

9 MQ Connections
9.1
9.2
9.3
9.4

Locating MQ Connections .........................................................................................................
Adding MQ Connections...........................................................................................................
Editing MQ Connections ...........................................................................................................
Deleting MQ Connections .........................................................................................................

9-1
9-2
9-4
9-5

10 Split-Joins
10.1
10.2
10.3
10.4

Locating Split-Joins..................................................................................................................
Adding Split-Joins....................................................................................................................
Editing Split-Joins ....................................................................................................................
Deleting Split-Joins ..................................................................................................................

10-1
10-2
10-2
10-3

11 XQuery Transformations
11.1
11.2
11.3
11.4

Locating XQuery Transformations........................................................................................
Adding XQuery Transformations .........................................................................................
Editing XQuery Transformations ..........................................................................................
Deleting an XQuery Transformation ....................................................................................

11-1
11-2
11-2
11-3

12 Custom WS-Policies
12.1
12.1.1
12.2
12.3
12.4

Using Oracle Service Bus WS-Policies ..................................................................................
Using Custom WS-Policies..............................................................................................
Locating Custom WS-Policies ................................................................................................
Adding Custom WS-Policies..................................................................................................
Editing Custom WS-Policies...................................................................................................

12-1
12-1
12-1
12-2
12-3

v

12.5

Deleting Custom WS-Policies ................................................................................................ 12-3

13 JCA Bindings
13.1
13.2
13.3
13.4

Locating JCA Bindings ............................................................................................................
Adding JCA Bindings..............................................................................................................
Editing JCA Bindings ..............................................................................................................
Deleting JCA Bindings ............................................................................................................

13-1
13-2
13-3
13-4

14 XML Documents
14.1
14.2
14.3
14.4

Locating XML Documents ......................................................................................................
Adding XML Documents........................................................................................................
Editing XML Documents ........................................................................................................
Deleting XML Documents ......................................................................................................

14-1
14-2
14-2
14-3

15 XSL Transformations
15.1
15.2
15.3
15.4
15.5

Locating XSL Transformations ..............................................................................................
Adding an XSL Transformation.............................................................................................
Editing XSL Transformations.................................................................................................
Deleting an XSL Transformation ...........................................................................................
Resolving Unresolved XSL Transformation References ....................................................

15-1
15-2
15-2
15-4
15-4

Locating MFLs ..........................................................................................................................
Adding MFLs............................................................................................................................
Editing MFLs ............................................................................................................................
Deleting MFLs ..........................................................................................................................

16-1
16-2
16-2
16-3

16 MFLs
16.1
16.2
16.3
16.4

17 Service Accounts
17.1
17.1.1
17.2
17.3
17.4
17.5

Specifying Service Accounts...................................................................................................
Using Service Accounts Data and Sessions ..................................................................
Locating Service Accounts......................................................................................................
Adding Service Accounts .......................................................................................................
Editing Service Accounts ........................................................................................................
Deleting Service Accounts ......................................................................................................

17-1
17-2
17-2
17-3
17-4
17-6

18 Service Key Providers
18.1
18.2
18.3
18.4

Locating Service Key Providers .............................................................................................
Adding Service Key Providers...............................................................................................
Editing Service Key Providers ...............................................................................................
Deleting Service Key Providers .............................................................................................

18-1
18-2
18-3
18-4

19 Business Services: Creating and Managing
19.1
Creating and Configuring Business Services....................................................................... 19-1
19.1.1
Generating a Business Service from a JCA Binding Resource ................................... 19-2

vi

19.1.2
Generating a Business Service from Oracle Enterprise Repository...........................
19.2
Create/Edit a Business Service - Page Reference................................................................
19.2.1
General Configuration Page............................................................................................
19.2.2
Message Type Configuration Page ................................................................................
19.2.3
Transport Configuration Page ........................................................................................
19.2.4
Protocol-Specific Transport Configuration Page .......................................................
19.2.5
BPEL-10g Transport Configuration Page....................................................................
19.2.6
DSP Transport Configuration Page..............................................................................
19.2.7
EJB Transport Configuration Page ...............................................................................
19.2.8
E-Mail Transport Configuration Page .........................................................................
19.2.9
File Transport Configuration Page...............................................................................
19.2.10
Flow Transport Configuration Page ............................................................................
19.2.11
FTP Transport Configuration Page ..............................................................................
19.2.12
HTTP Transport Configuration Page ..........................................................................
19.2.13
JCA Transport Configuration Page..............................................................................
19.2.14
JEJB Transport Configuration Page..............................................................................
19.2.15
JMS Transport Configuration Page ..............................................................................
19.2.16
MQ Transport Configuration Page ..............................................................................
19.2.17
SB Transport Configuration Page.................................................................................
19.2.18
SFTP Transport Configuration Page ............................................................................
19.2.19
SOA-DIRECT Transport Configuration Page.............................................................
19.2.20
Tuxedo Transport Configuration Page........................................................................
19.2.21
WS Transport Configuration Page ...............................................................................
19.2.22
SOAP Binding Configuration Page..............................................................................
19.2.23
Message Handling Configuration Page ......................................................................
19.2.24
Summary Page ................................................................................................................
19.3
Exporting a WSDL Associated with a Business Service...................................................
19.4
Locating Business Services ...................................................................................................
19.5
Editing Business Service Configurations............................................................................
19.5.1
View a Business Service - Configuration Details Page..............................................
19.5.2
Business Service Policies Page ......................................................................................
19.5.3
Business Service Security Page .....................................................................................
19.6
Deleting Business Services....................................................................................................

19-2
19-2
19-3
19-5
19-6
19-10
19-11
19-12
19-13
19-15
19-16
19-16
19-17
19-17
19-20
19-22
19-23
19-26
19-29
19-30
19-31
19-33
19-35
19-36
19-36
19-39
19-40
19-40
19-41
19-42
19-43
19-45
19-45

20 Proxy Services: Creating and Managing
20.1
Creating and Configuring Proxy Services............................................................................
20.1.1
Generating a Proxy Service from a JCA Binding Resource ........................................
20.2
Create/Edit a Proxy Service - Page Reference.....................................................................
20.2.1
General Configuration Page............................................................................................
20.2.2
Message Type Configuration Page ................................................................................
20.2.3
Transport Configuration Page ........................................................................................
20.2.4
Protocol-Specific Transport Configuration Pages......................................................
20.2.5
E-Mail Transport Configuration Page .........................................................................
20.2.6
File Transport Configuration Page...............................................................................
20.2.7
FTP Transport Configuration Page ..............................................................................
20.2.8
HTTP Transport Configuration Page ..........................................................................
20.2.9
JCA Transport Configuration Page..............................................................................

20-1
20-2
20-2
20-2
20-4
20-6
20-10
20-10
20-11
20-12
20-14
20-16

vii

20.2.10
JEJB Transport Configuration Page..............................................................................
20.2.11
JMS Transport Configuration Page ..............................................................................
20.2.12
MQ Transport Configuration Page ..............................................................................
20.2.13
SB Transport Configuration Page.................................................................................
20.2.14
SFTP Transport Configuration Page ............................................................................
20.2.15
Tuxedo Transport Configuration Page........................................................................
20.2.16
WS Transport Configuration Page ...............................................................................
20.2.17
Operation Selection Configuration Page.....................................................................
20.2.18
Message Handling Page.................................................................................................
20.2.19
Summary Page ................................................................................................................
20.3
Exporting a WSDL Associated with a Proxy Service........................................................
20.4
Locating Proxy Services ........................................................................................................
20.5
Editing Proxy Service Configurations ................................................................................
20.5.1
View a Proxy Service - Configuration Details Page...................................................
20.5.2
Proxy Service Policy Page..............................................................................................
20.5.3
Proxy Service Security Page ..........................................................................................
20.6
Deleting Proxy Services ........................................................................................................

20-18
20-19
20-23
20-25
20-26
20-27
20-29
20-30
20-32
20-35
20-35
20-36
20-37
20-38
20-39
20-40
20-43

21 Proxy Services: Message Flow
21.1
21.2
21.3
21.4
21.5
21.6
21.7
21.8
21.9

Viewing and Editing Message Flows....................................................................................
Edit Message Flow Page .........................................................................................................
Edit Stage Configuration Page ...............................................................................................
Adding Pipeline Pair Nodes to Message Flows ..................................................................
Adding Conditional Branches to Message Flows ...............................................................
Adding Operational Branches to Message Flows ...............................................................
Adding Stages to Pipelines.....................................................................................................
Adding Route Nodes to Message Flows ..............................................................................
Cutting, Copying, and Pasting Stages and Route Nodes...................................................

21-1
21-1
21-4
21-4
21-5
21-6
21-7
21-8
21-9

22 Proxy Services: Actions
22.1
Adding and Editing Actions in Message Flows ..................................................................
22.2
Adding Publish Actions..........................................................................................................
22.3
Adding Publish Table Actions ...............................................................................................
22.4
Adding Dynamic Publish Actions.........................................................................................
22.5
Adding Routing Options Actions..........................................................................................
22.6
Adding Service Callout Actions ............................................................................................
22.7
Adding Transport Header Actions .....................................................................................
22.7.1
Setting Cookies in Outbound HTTP Transport Headers..........................................
22.7.1.1
Setting a Cookie as a Complex XML Expression ................................................
22.7.1.2
Setting a Cookie with a String Expression ...........................................................
22.8
Adding Dynamic Routing to Route Nodes........................................................................
22.9
Adding Routing Actions to Route Nodes ..........................................................................
22.10 Adding Routing Tables to Route Nodes ............................................................................
22.11 Adding For Each Actions......................................................................................................
22.12 Adding If... Then... Actions ..................................................................................................
22.13 Adding Raise Error Actions .................................................................................................
22.13.1
Transactions.....................................................................................................................
viii

22-2
22-6
22-6
22-7
22-8
22-9
22-11
22-13
22-14
22-14
22-14
22-15
22-16
22-17
22-17
22-18
22-19

22.14
22.15
22.16
22.17
22.18
22.19
22.20
22.21
22.22
22.23
22.24
22.25
22.26
22.27

Adding Reply Actions...........................................................................................................
Adding Resume Actions .......................................................................................................
Adding Skip Actions .............................................................................................................
Adding Assign Actions .........................................................................................................
Adding Delete Actions..........................................................................................................
Adding Insert Actions ...........................................................................................................
Adding Java Callout Actions................................................................................................
Adding MFL Transform Actions .........................................................................................
Adding Rename Actions.......................................................................................................
Adding Replace Actions .......................................................................................................
Adding Validate Actions ......................................................................................................
Adding Alert Actions ............................................................................................................
Adding Log Actions ..............................................................................................................
Adding Report Actions .........................................................................................................

22-19
22-19
22-20
22-20
22-20
22-21
22-22
22-24
22-24
22-25
22-26
22-27
22-28
22-29

23 Proxy Services: XQuery and XPath Editors
23.1
23.2
23.2.1
23.2.2
23.2.3
23.3
23.4
23.5
23.6
23.7
23.8
23.9
23.10
23.11

Creating and Editing Inline XQuery and XPath Expressions ...........................................
Understanding XQuery Editor Layouts and Tasks ............................................................
Palettes................................................................................................................................
Workspace .........................................................................................................................
Property Inspector ............................................................................................................
Building Expressions in the Editor Workspace Text Fields...............................................
Creating Namespaces to Use in Inline Expressions ...........................................................
Creating Variable Structures in the XQuery Editors ..........................................................
Creating Custom XPath Functions in the XQuery Editors ..............................................
Binding External XQuery Resources to Inline XQueries..................................................
Binding External XSLT Resources to Inline XQueries......................................................
Binding Dynamic XQuery Expressions to Inline XQueries .............................................
Entering XQuery Comparison Expressions Using the Builder Option .........................
Entering Unary Expressions Using the Builder Option ...................................................

23-1
23-2
23-2
23-3
23-3
23-3
23-6
23-7
23-10
23-10
23-11
23-12
23-13
23-14

24 Proxy Services: Error Handlers
24.1
24.2
24.3
24.4
24.5
24.6

Edit Error Handler Page .........................................................................................................
Adding Proxy Service Error Handlers..................................................................................
Adding Pipeline Error Handlers ...........................................................................................
Adding Stage Error Handlers ................................................................................................
Adding Route Node Error Handlers.....................................................................................
Editing Error Handlers............................................................................................................

24-1
24-1
24-2
24-3
24-3
24-4

25 Security Configuration
25.1
Understanding Users, Groups, Security Roles and Policies ..............................................
25.1.1
Users ...................................................................................................................................
25.1.2
Groups ................................................................................................................................
25.1.2.1
Administrative Security Groups .............................................................................
25.1.3
Roles....................................................................................................................................
25.1.3.1
Administrative Security Roles .................................................................................

25-1
25-1
25-2
25-2
25-2
25-2

ix

25.1.4
Access Control Policies ....................................................................................................
25.1.5
Security Configuration Data and Sessions....................................................................
25.2
Locating Users ..........................................................................................................................
25.3
Adding Users............................................................................................................................
25.4
Editing Users ............................................................................................................................
25.5
Deleting Users ..........................................................................................................................
25.6
Locating Groups.......................................................................................................................
25.7
Adding Groups ........................................................................................................................
25.8
Editing Groups .........................................................................................................................
25.9
Deleting Groups .......................................................................................................................
25.10 Locating Roles ..........................................................................................................................
25.11 Adding Roles ............................................................................................................................
25.11.1
Defining Role Conditions ................................................................................................
25.12 Editing Roles...........................................................................................................................
25.13 Deleting Roles.........................................................................................................................
25.14 Locating Access Control Policies .........................................................................................
25.15 Editing Transport-Level Access Policies ............................................................................
25.16 Editing Message-Level Access Policies...............................................................................
25.17 Adding Policy Conditions ....................................................................................................

25-2
25-3
25-3
25-4
25-5
25-5
25-6
25-6
25-7
25-7
25-8
25-8
25-8
25-11
25-12
25-12
25-12
25-13
25-14

26 Monitoring
26.1
Viewing SLA Alerts .................................................................................................................
26.2
Viewing Pipeline Alerts ..........................................................................................................
26.3
Locating Alerts .........................................................................................................................
26.3.1
WebLogic Diagnostics Framework Query Language .................................................
26.4
Purging Alerts ..........................................................................................................................
26.5
Viewing Alert Details ..............................................................................................................
26.6
Viewing Service Monitoring Information ............................................................................
26.7
Resetting Statistics for Services ............................................................................................
26.8
Configuring Operational Settings for Proxy Services.......................................................
26.9
Configuring Operational Settings for Business Services..................................................
26.10 Setting the Aggregation Interval for a Service...................................................................
26.11 Viewing Service Metrics........................................................................................................
26.12 Viewing Operations Metrics for WSDL-Based Services...................................................
26.13 Viewing Pipeline Metrics......................................................................................................
26.14 Viewing Action Metrics ........................................................................................................
26.15 Viewing Business Services Endpoint URIs Metrics ..........................................................
26.16 Viewing Server Information.................................................................................................
26.17 Viewing Server Details..........................................................................................................
26.18 Viewing Domain Log Files ...................................................................................................
26.19 Customizing Your View of Domain Log File Entries .......................................................
26.20 Viewing Details of Domain Log Files .................................................................................
26.21 Viewing Alert Rules...............................................................................................................
26.22 Locating Alert Rules ..............................................................................................................
26.23 Creating and Editing Alert Rules ........................................................................................
26.23.1
Configuring General Information for Alert Rules .....................................................
26.23.2
Defining Alert Rule Conditions....................................................................................

x

26-1
26-2
26-4
26-5
26-5
26-6
26-7
26-10
26-11
26-14
26-19
26-19
26-22
26-23
26-24
26-25
26-26
26-28
26-28
26-29
26-30
26-31
26-31
26-31
26-32
26-34

26.23.3
Reviewing the Alert Rule Configuration ....................................................................
26.24 Viewing Alert Rule Configurations ....................................................................................
26.25 Editing Alert Rules ................................................................................................................
26.26 Deleting Alert Rules ..............................................................................................................

26-35
26-35
26-36
26-37

27 Configuration
27.1
Finding and Updating Operational Settings........................................................................
27.1.1
Finding All Services (Proxy and Business Services)....................................................
27.1.2
Finding Proxy Services.....................................................................................................
27.1.3
Finding Business Services................................................................................................
27.1.4
Finding Split-Joins ............................................................................................................
27.1.5
Finding Alert Destinations ..............................................................................................
27.1.6
Finding SLA Alert Rules..................................................................................................
27.2
Enabling Global Settings.......................................................................................................
27.2.1
Enabling Global Monitoring of Services .....................................................................
27.2.2
Disabling Global Monitoring of Services ....................................................................
27.2.3
Enabling SLA Alerts Globally.......................................................................................
27.2.4
Disabling SLA Alerts Globally......................................................................................
27.2.5
Enabling Pipeline Alerts Globally ................................................................................
27.2.6
Disabling Pipeline Alerts Globally...............................................................................
27.2.7
Enabling Message Reporting Globally ........................................................................
27.2.8
Disabling Message Reporting Globally .......................................................................
27.2.9
Enabling Logging Globally ...........................................................................................
27.2.10
Disabling Logging Globally ..........................................................................................
27.2.11
Enabling Result Caching Globally ...............................................................................
27.2.12
Disabling Result Caching Globally ..............................................................................
27.3
Setting User Preferences .......................................................................................................

27-1
27-1
27-3
27-5
27-6
27-7
27-8
27-10
27-11
27-11
27-12
27-12
27-13
27-13
27-14
27-14
27-14
27-15
27-15
27-16
27-16

28 Reporting
28.1
28.2
28.3

Viewing Reporting Messages................................................................................................. 28-1
Viewing Message Details ........................................................................................................ 28-2
Purging Messages .................................................................................................................... 28-4

29 Import/Export
29.1
Importing Resources................................................................................................................
29.1.1
Selecting Projects and Resources to Import ..................................................................
29.1.2
Specifying the Importing Security Settings...................................................................
29.1.3
Importing Service Accounts or Service Key Providers ...............................................
29.1.4
Reviewing the Import Summary ....................................................................................
29.2
Exporting Resources ................................................................................................................
29.2.1
Specifying the Exporting Security Settings...................................................................

29-1
29-2
29-3
29-4
29-4
29-5
29-6

30 UDDI
30.1
30.2

Viewing Configured UDDI Registries .................................................................................. 30-1
Configuring UDDI Registries................................................................................................. 30-2

xi

30.2.1
30.2.2
30.3
30.4
30.5
30.6
30.7
30.8

Adding UDDI Registries..................................................................................................
Editing UDDI Registries ..................................................................................................
Setting Up a Default UDDI Configuration...........................................................................
Importing Business Services From a UDDI Registry..........................................................
Using Auto-Import Status ......................................................................................................
Detaching Services ...................................................................................................................
Publishing Proxy Services to a UDDI Registry....................................................................
Using Auto-Publish .................................................................................................................

30-2
30-3
30-4
30-4
30-6
30-6
30-7
30-8

31 Global Resources
31.1
31.2
31.3
31.4
31.5
31.6
31.7
31.8
31.9
31.10
31.11
31.12
31.13
31.14
31.15

Viewing JNDI Providers .....................