DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
  1. DZone
  2. Software Design and Architecture
  3. Integration
  4. Enterprise SaaS Integration Using REST and OAuth

Enterprise SaaS Integration Using REST and OAuth

Francois Lascelles user avatar by
Francois Lascelles
·
Mar. 22, 12 · Interview
Like (0)
Save
Tweet
Share
4.69K Views

Join the DZone community and get the full member experience.

Join For Free

the current trend of moving enterprise applications to saas-style public cloud solutions is raising a number of concerns regarding security and governance. what about integration though? in the now legacy enterprise, various applications are deployed within the same trusted network under a single security domain which facilitate the integration between these applications.

how do you integrate these applications moving forward when they are separated across a number of different public cloud providers independent from each other? if you thought it was hard enough to integrate applications from different vendors inside your domain, imagine what this will turn into once different solution providers host these applications. as a consumer of such services, you need to demand and favor solutions providing adequate integration mechanisms; this is a critical selection factor. on the web, an elegant solution to integrate various services on behalf of users is gaining popularity: oauth .

oauth standardizes the process where the owner of a resource authorizes an application to access this resource on the resource provider. oauth is very ‘resource-oriented’. as such, oauth is well suited to enable authorization between two entities communicating using a restful web service interaction. this very pattern involving oauth and rest, is ideal to enable the integration of two saas provider acting on behalf of their common enterprise subscriber as illustrated below.

in this case, two saas (or paas) solutions, which are otherwise independent, can share data as coordinated by the enterprise subscriber. this interaction substitutes the integration that would traditionally occur on-premise between two applications managed by the enterprise itself and provides the basis for restoring integration on the cloud.

of course, the saas/paas adoption by the enterprise is only partial, and many it assets remain on-premise. the enterprise therefore requires the same level of integration between externally hosted saas and these resources within the enterprise itself. it is logical that the enterprise supports the very integration mechanism that it demands from its external providers. this pattern is known as the ‘cloud call-back’ and is enabled by a specialized perimeter gateway that facilitates the enterprise cloud adoption such as cloudconnect .

to learn more about such patterns or find out how layer 7 technologies can help your enterprise integrate to the cloud securely , i invite you to visit us at the soa/cloud symposium october 5-6 2010 in berlin. i will be presenting on the topic of enterprise security patterns for restful web services .

REST Web Protocols Integration security authentication SaaS application

Published at DZone with permission of Francois Lascelles, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • 10 Easy Steps To Start Using Git and GitHub
  • Required Knowledge To Pass AWS Certified Solutions Architect — Professional Exam
  • OpenVPN With Radius and Multi-Factor Authentication
  • Multi-Tenant Architecture for a SaaS Application on AWS

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: