October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY
01 OVERVIEW
ARCHITECTURE OVERVIEW
EXTENSION CONCEPT
FRONTEND LAYER
BUSINESS AND PERSISTENCE LAYER
DATABASE & APPLICATION SERVER ENVIRONMENT
CORE+ CONCEPT
HYBRIS: BEST OF BOTH WORLDS
02 DEVELOPMENT
EASY TO INSTALL AND RUN
EASY TO DEVELOP FOR No special tools or IDEs Open standards and proven technologies Extension templates Wiki documentation Training trails hybris Experts community
EASY TO CONFIGURE Text-based properties files and … XML-based Spring configuration files Annotations in custom-made extensions
JAVA FRAMEWORKS, LIBRARIES AND STANDARDS
03 CUSTOMIZATION
FLEXIBLE BUSINESS OBJECTS
SERVICES IN THE SERVICELAYER Three steps to exchange the service: Find the service interface. 1 Implement the new service. 2 Replace the alias of the service. 3
CREATING NEW EXTENSIONS
HYBRIS COMMERCE ACCELERATOR
EVENTS
INTERNATIONALIZATION
MULTI - CATALOG SUPPORT
COCKPIT CUSTOMIZATION
04 INTEGRATION
INTEGRATION CHALLENGES
DATA VALIDATION
DATA INTEGRATION
DATA INTEGRATION VIA DATA HUB
HYBRIS IMPORT COCKPIT
THIRD PARTY SYSTEM INTEGRATION Three common options to connect with external systems: Spring Integration 1 Java Message Service 2 SOAP/RESTful web services 3
BUILT-IN RESTFUL WEB SERVICES
SPRING INTEGRATION & JAVA MESSAGE SERVICE
05 OPERATIONS
MINIMAL SYSTEM INFRASTRUCTURE
TYPICAL SYSTEM INFRASTRUCTURE
PERSISTENT CACHE LRU QUERIES / RESULTS FIFO TYPES LRU ENTITIES Eviction Strategy Size Cache Region
TYPICAL ORACLE RAC / MYSQL SETUP
SESSION FAILOVER Partial of full session failover. Transparent to users. Support for Oracle Coherence and Tomcat Session replication.
VIRTUALIZATION
MULTI-CORE PERFORMANCE
MONITORING THE RUNNING SYSTEM
PERFORMANCE MONITORING
06 SECURITY
ROLE CREATION All security decisions based on user roles. Multiple roles for each user. Roles mapping stored on LDAP servers or hybris persistence. Tools for hierarchical roles creation. Security check performed before execution of an action.
SECURING YOUR MODEL Control of CRUD operations. Spring security mechanisms. hybris FlexibleSearch filters. Secured on the basis of user roles.
SECURING YOUR DATA Hashing and encryption of sensitive data. Encryption of highly sensitive data. Transparent Attribute Encryption. Managed through back-end administration UI. PCI compliancy support.
AUDIT TRAILS All changes to information are recorded. Type of change, user/entity, time, original and new values. Help identify loopholes, violations and spoofing. Improved security maintenance.
AUTHENTICATION AND AUTHORIZATION WITH LDAP Integration with LDAP and Active directories. Verification of user accounts. Support for Single- Sign-On. Importing of LDIF files and search results.