This chapter expands on the basic OIS architecture and explains how the components interact with one another during policy execution. It also discusses the major deployment models and identifies where each model would be most beneficial. In addition to architecture, this chapter reviews how the various security models affect an OIS deployment.
↧