Next Review Date
what constitutes an EGAB acceptable
Service Integration and Test.
For all web services that are to be published at an enterprise level must be
tested using sound and proven test methodologies
. This policy specifies a phased approach that is very
generic so that it can be easily applied to any web services testing.
The web service provider or the entity that makes a web service available in the Registry/Repository is
comply with this policy
Web services will not be approved for enterprise access without
a successful end
end test and
documented in the Integration Test Report Policy, Non
Function Test Report Policy and the Acceptance
Test Report Policy.
EGAB does not provide or endorse a specific test tool, utility or
methodology. The web
r can utilize their resources of choice given that such choices can successfully
complete a full end
end test of the service.
Due to the nature of web services, testing should follow a phased testing approach:
Ensures that SOA
policies are met and adhered to.
Ensures that all individual service components follow policies and the service, as
a whole, meets those policies.
This is essentially a unit test that ensures each
component functions as
This is a functional test of the service that ensur
es operation perform according
Includes negative testing to ensure that exception handling is robust.
Service performance testing
Load support, response time testi
level testing (Integration Test)
Ensures that each web service successfully meets expectations for all points of
Performed by consumer.
level testing (Process Test)
Ensures services are operatin
g collectively as specified.
This phase of testing would cover business logic, sequencing, exception handling
and process decomposition (including service and process reuse).
level testing (Acceptance Test)
System Level testing will form the major
ity, if not all of the User Acceptance
This test phase will test that the SOA technical solution has delivered the
defined business requirements and has met the defined business acceptance
that all security has been properly applied.
Ensures systems and data are properly secured to prevent unauthorized access.