Technical deployment
The technical deployment of the Data Exchange Layer contains the following phases:
1. Familiarise and plan
- Familiarise yourself with the materials of Data Exchange Layer
- Familiarise yourself with the environments of the Data Exchange Layer and the API Catalogue
- Agree on contact persons
- Familiarise yourself with the security server solutions
- Plan the technical starting point of your services: SOAP or REST
- Plan the possible adapter service
Read more about the Familiarise and plan -phase.
2. Select a security server solution
- Consider the factors that affect to your organisations security server solution
- Choose the implementation method of the security server
- Install and configure the host server
Read more about the Select a security server solution -phase.
3. Join the test environment
- Open firewalls
- Install the security server software
- Configure the security server
- Add a subsystem to the security server
- Connect the information system to the security server
- If you intend to provide services to other organisations on the Data Exchange Layer, add your service to the security server
- Deploy the adapter service if necessary
Read more about the Join the test environment -phase.
4. Test in the test environment
- Test the connection to the Data Exchange Layer
- Test the functionality of the message thread
- Test messaging using meta services
- Fix any possible errors that occurred during the testing
Read more about the Test in the test environment -phase.
5. Proceed to the production environment
- First, prepare to deploy the security server, because you will need a separate security server for each environment
- After that, repeat the steps you took when you joined the test environment
Read more about the Proceed to the production environment -phase.
Please note that the flow of the deployment process depends on the organisation's role in the Data Exchange Layer and the security server solution that the organisation has chosen. The deployment process is shorter
- if the organisation only uses services or
- if the organisation uses a shared security server.
Updated: 10/10/2024