|
From: Patrick Y. <kc...@ce...> - 2003-06-18 04:28:07
|
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <meta http-equiv="Content-Type" content="text/html;charset=ISO-8859-1"> <title></title> </head> <body> <blockquote type="cite" cite="mid...@s-..."> <div><font face="Arial" size="2"><span class="478263901-16062003">Given that, it's a small leap to supporting different listeners for the CpaId/service/action combination (rather than just the CpaId). However, I still think that the current implementation is too complicated.</span></font></div> <div><font face="Arial" size="2"><span class="478263901-16062003"></span></font></div> </blockquote> <br> Now, our discussion shifted to the role of conversation ID. Please see CY's mail for his usage on conversation ID.<br> <br> <blockquote type="cite" cite="mid...@s-..."> <div> <font face="Arial" size="2"><span class="478263901-16062003">Have you identified other parts of the specification that the MSH must know?</span></font></div> </blockquote> <br> According to our understanding, the current 4 parameters of AppContent is adequate as a key to identify application.<br> <br> <blockquote type="cite" cite="mid...@s-..."> <div><font face="Arial" size="2"><span class="478263901-16062003">Incidentally (talking about where mail servers live), our systems people wouldn't allow the Hermes database to be on the Hermes server in the DMZ, since it contains corporate data. Instead, it sits on an internal system, and the MSH accesses it from the DMZ.</span></font></div> </blockquote> <br> In your case, Hermes (in DMZ) make JDBC connections to the DB (on internal) through the firewall, right? So, how do you ensure the security of the JDBC call? Sorry for stupid question, I know little on DMZ/firewall stuff.<br> <br> Regards, -Patrick<br> <br> <br> </body> </html> |