On 2011-05-25 11:14, Mike Wills wrote:
I realize this would probably be a prefect use of web services on the i. But
we would prefer to not punch a hole through the firewall from the internet
side (DMZ) to the intranet side if possible. Or can this be done securely
and avoid the possible problems with holes into our internal network?
Any thoughts?
I've done something similar with a java web service on the i, running in 
Tomcat. I haven't worked in .net much, but as I recall, .net apps can 
easily consume a web service. The web service, running on the i can then 
pass data to a back-end process via a data queue, command, or a direct 
program call, passing a delimited data stream. The request into the DMZ 
can also be an XML document containing a batch of transactions if you 
use XMLHTTP. The web service on the i can contain logic to validate the 
requester, the request content or both. A simple HTTP post works just 
fine too for single transactions. It's fairly secure to allow a server 
in the DMZ to communicate with the i. It has the advantage that there is 
direct hand-off; no file drops, no polling interval. Direct return of a 
result message is very possible. You could eliminate the i web service 
and have a 3 tiered solution if you can figure out how to use jtopen in 
.net. The .net web service could contain credentials to log in on the i. 
That's speculative though. I haven't done it.
As an Amazon Associate we earn from qualifying purchases.
	
 
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.