October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY 01 OVERVIEW.

Slides:



Advertisements
Similar presentations
Implementation of a Validated Statistical Computing Environment Presented by Jeff Schumack, Associate Director – Drug Development Information September.
Advertisements

DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Data Management Expert Panel - WP2. WP2 Overview.
Unveiling ProjectWise V8 XM Edition. ProjectWise V8 XM Edition An integrated system of collaboration servers that enable your AEC project teams, your.
1 Oracle Financial System Mary Ann Carr September 14, 2000.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Report Distribution Report Distribution in PeopleTools 8.4 Doug Ostler & Eric Knapp 7264.
Chapter 5 Database Application Security Models
SIMI: ISO Perspective Al ISO CSU Northridge
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Authenticating REST/Mobile clients using LDAP and OERealm
© Internna Technologies 1 IWebMvc Features, Possibilities & Goals.
Understanding Active Directory
Enterprise Reporting with Reporting Services SQL Server 2005 Donald Farmer Group Program Manager Microsoft Corporation.
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Introduction to the Enterprise Library. Sounds familiar? Writing a component to encapsulate data access Building a component that allows you to log errors.
Global Customer Partnership Council Forum | 2008 | November 18 1IBM - GCPC MeetingIBM - GCPC Meeting IBM Lotus® Sametime® Meeting Server Deployment and.
Eric Westfall – Indiana University Jeremy Hanson – Iowa State University Building Applications with the KNS.
Jan Hatje, DESY CSS ITER March 2009: Alarm System, Authorization, Remote Management XFEL The European X-Ray Laser Project X-Ray Free-Electron.
USM Regional PeopleSoft Conference
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
Oracle Application Express Security. © 2009 Oracle Corporation Authentication Out-of-the-Box Pre-Configured Schemes LDAP Directory credentials Oracle.
University of Illinois at Urbana-Champaign A Unified Platform for Archival Description and Access Christopher J. Prom, Christopher A. Rishel, Scott W.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Building Applications with the KNS. The History of the KNS KFS spent a large amount of development time up front, using the best talent from each of the.
Module 9 Configuring Messaging Policy and Compliance.
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
CAS Lightning Talk Jasig-Sakai 2012 Tuesday June 12th 2012 Atlanta, GA Andrew Petro - Unicon, Inc.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
ArcGIS Server for Administrators
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Jan Hatje, DESY CSS GSI Feb. 2009: Alarm System, Authorization, Remote Management XFEL The European X-Ray Laser Project X-Ray Free-Electron.
Module 12 Upgrading from Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010.
I Copyright © 2007, Oracle. All rights reserved. Module i: Siebel 8.0 Essentials Training Siebel 8.0 Essentials.
DGC Paris WP2 Summary of Discussions and Plans Peter Z. Kunszt And the WP2 team.
Katari Globant 2008 (update to 2010). Katari  Katari is a framework to use as a starting point to develop new web applications.  Incorporates architecture,
Satisfy Your Technical Curiosity 27, 28 & 29 March 2007 International Convention Center (ICC) Ghent, Belgium.
Preface IIntroduction Objectives I-2 Course Overview I-3 1Oracle Application Development Framework Objectives 1-2 J2EE Platform 1-3 Benefits of the J2EE.
ESG-CET Meeting, Boulder, CO, April 2008 Gateway Implementation 4/30/2008.
Template v5 October 12, Copyright © Infor. All Rights Reserved. Template v4 September 27, Copyright © Infor. All.
1 Data Architecture Strawman - Grimshaw Important points Everything is a service (object) >All have a name (EPR) and an interface (type) One or more base.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Live Mobile and Cloud Hacking by ACEs OGh | Fusion Middleware Experience (FME) 16-feb :45 – 16:45.
Google Code Libraries Dima Ionut Daniel. Contents What is Google Code? LDAPBeans Object-ldap-mapping Ldap-ODM Bug4j jOOR Rapa jongo Conclusion Bibliography.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED INTERSTAGE BPM ARCHITECTURE BPMS.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
SPECTO TRAINING contact us: , mail :
SoftUpdate New features and management technique.
Introduction The concept of a web framework originates from the basic idea that every web application obtains its foundations from a similar set of guidelines.
Fundamental of Databases
Jean-Philippe Baud, IT-GD, CERN November 2007
Consulting Services JobScheduler Architecture Decision Template
Centralized Management for Barracuda Networks products
New features and customization options
Consulting Services JobScheduler Architecture Decision Template
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Securing the Network Perimeter with ISA 2004
VI-SEEM Data Discovery Service
SAP Hybris Online Training SAP Hybris Online Training
Overview: Fedora Architecture and Software Features
SAP Hybris Overview  SV Trainings SAP Hybris Training program is developed to make you expert in working with Hybris Technology. SAP Hybris has been.
Oracle Architecture Overview
Weapons/Gear Accountability Utilizing Radio Waves (RFID)
Designing IIS Security (IIS – Internet Information Service)
Sending data to EUROSTAT using STATEL and STADIUM web client
Presentation transcript:

October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY

01 OVERVIEW

ARCHITECTURE OVERVIEW

EXTENSION CONCEPT

FRONTEND LAYER

BUSINESS AND PERSISTENCE LAYER

DATABASE & APPLICATION SERVER ENVIRONMENT

CORE+ CONCEPT

HYBRIS: BEST OF BOTH WORLDS

02 DEVELOPMENT

EASY TO INSTALL AND RUN

EASY TO DEVELOP FOR No special tools or IDEs Open standards and proven technologies Extension templates Wiki documentation Training trails hybris Experts community

EASY TO CONFIGURE Text-based properties files and … XML-based Spring configuration files Annotations in custom-made extensions

JAVA FRAMEWORKS, LIBRARIES AND STANDARDS

03 CUSTOMIZATION

FLEXIBLE BUSINESS OBJECTS

SERVICES IN THE SERVICELAYER Three steps to exchange the service: Find the service interface. 1 Implement the new service. 2 Replace the alias of the service. 3

CREATING NEW EXTENSIONS

HYBRIS COMMERCE ACCELERATOR

EVENTS

INTERNATIONALIZATION

MULTI - CATALOG SUPPORT

COCKPIT CUSTOMIZATION

04 INTEGRATION

INTEGRATION CHALLENGES

DATA VALIDATION

DATA INTEGRATION

DATA INTEGRATION VIA DATA HUB

HYBRIS IMPORT COCKPIT

THIRD PARTY SYSTEM INTEGRATION Three common options to connect with external systems: Spring Integration 1 Java Message Service 2 SOAP/RESTful web services 3

BUILT-IN RESTFUL WEB SERVICES

SPRING INTEGRATION & JAVA MESSAGE SERVICE

05 OPERATIONS

MINIMAL SYSTEM INFRASTRUCTURE

TYPICAL SYSTEM INFRASTRUCTURE

PERSISTENT CACHE LRU QUERIES / RESULTS FIFO TYPES LRU ENTITIES Eviction Strategy Size Cache Region

TYPICAL ORACLE RAC / MYSQL SETUP

SESSION FAILOVER Partial of full session failover. Transparent to users. Support for Oracle Coherence and Tomcat Session replication.

VIRTUALIZATION

MULTI-CORE PERFORMANCE

MONITORING THE RUNNING SYSTEM

PERFORMANCE MONITORING

06 SECURITY

ROLE CREATION All security decisions based on user roles. Multiple roles for each user. Roles mapping stored on LDAP servers or hybris persistence. Tools for hierarchical roles creation. Security check performed before execution of an action.

SECURING YOUR MODEL Control of CRUD operations. Spring security mechanisms. hybris FlexibleSearch filters. Secured on the basis of user roles.

SECURING YOUR DATA Hashing and encryption of sensitive data. Encryption of highly sensitive data. Transparent Attribute Encryption. Managed through back-end administration UI. PCI compliancy support.

AUDIT TRAILS All changes to information are recorded. Type of change, user/entity, time, original and new values. Help identify loopholes, violations and spoofing. Improved security maintenance.

AUTHENTICATION AND AUTHORIZATION WITH LDAP Integration with LDAP and Active directories. Verification of user accounts. Support for Single- Sign-On. Importing of LDIF files and search results.