What should you do?

You are configuring a receive port for a purchasing application. You want to track both authenticated and unauthenticated messages. You also want to ensure that the application processes only the authenticated messages. You need to configure the receive port to meet these requirements. You need to achieve this goal by using the minimum amount of coding effort. What should you do?

You are configuring a receive port for a purchasing application. You want to track both authenticated and unauthenticated messages. You also want to ensure that the application processes only the authenticated messages. You need to configure the receive port to meet these requirements. You need to achieve this goal by using the minimum amount of coding effort. What should you do?

A.
Configure the receive port with the Authentication Not Required option and add a filter to the receive port.

B.
Configure the receive port with the Authentication Not Required option and add a party resolution component to the pipeline.

C.
Configure the receive port with the Authentication Required (Drop Messages) option.

D.
Configure the receive port with the Authentication Required (Keep Messages) option.



Leave a Reply 0

Your email address will not be published. Required fields are marked *