Skip to main content Skip to complementary content

Order of policy execution

The sequence in which those policies are applied to a message is as follows:

For outgoing message chain

  1. Validation

  2. Correlation ID

  3. Transformation

  4. WS-Security and Authorization

  5. Service Activity Monitoring(sending of event to database)

  6. Compression

For incoming message chain

  1. Compression (decompression)

  2. Service Activity Monitoring(sending of event to database)

  3. WS-Security and Authorization

  4. Transformation

  5. Correlation ID

  6. Validation

For more information on each of these policies, see their related section below.

For outgoing message chain

The sequence in which those policies are applied to a message is as follows:

  1. Validation

  2. Correlation ID

  3. Transformation

  4. WS-Security and Authorization

  5. Service Activity Monitoring(sending of event to database)

  6. Compression

For incoming message chain

  1. Compression (decompression)

  2. Service Activity Monitoring(sending of event to database)

  3. WS-Security and Authorization

  4. Transformation

  5. Correlation ID

  6. Validation

For more information on each of these policies, see their related section below.

Did this page help you?

If you find any issues with this page or its content – a typo, a missing step, or a technical error – let us know how we can improve!