Multi-Tenant Data Isolation & Row Level Security

Over the past 1 and a half years, I was involved in designing and developing a multi-tenant Treasury Management system. In this article, I will share our approaches to the data isolation aspect of our multi-tenant solution and the learnings from it. Background & problem regarding Data isolation Before going into the problem which I … Continue reading Multi-Tenant Data Isolation & Row Level Security

Extracting Private Key from Java KeyStore (JKS)

I've been working with the AS2 Protocol and the AdroitLogic AS2Gateway for quite some time now and hence playing with JKS has been a must. One of the tricks which were required from time to time was extracting the private key and public key (certificate) from Java KeyStores. In this blog post, we'll go through … Continue reading Extracting Private Key from Java KeyStore (JKS)

as2 protocol for b2b integration

Message Signing & Encryption for AS2 Protocol in Java

The main idea of the AS2 protocol defined in the RFC 4130 is on how we can exchange structured business data securely using the HTTP transfer protocol. In one of the previous posts on AS2, we looked at an overview of the AS2 (Applicability Statement 2) protocol and why it wins over the other B2B … Continue reading Message Signing & Encryption for AS2 Protocol in Java

as2 protocol for b2b integration

AS2 Protocol for Business Data Interchange

The Applicability Statement 2 or AS2 specification defines a mechanism for the secure and reliable transfer of structured business data over the Internet. AS2 Message Payloads The AS2 protocol itself does not dictate any limits on the payload of an AS2 message. However. typical AS2 payloads are structured business documents such as Invoices, Purchase Orders … Continue reading AS2 Protocol for Business Data Interchange