GP.Access Security

An implementation of this Pattern can be used to secure access to back-end resources. By and large, it performs either or both of the following two tasks: If needed, Encryption functionality can secure the communication between the consumers of the back-end resource and the Access Security pattern itself, and/or between the Access Security pattern and the back-end resource itself. Note that for many security operations, the traffic between consumers and back-end resources need to be unencrypted, so as to allow inspection by this Generic Pattern.
 * It can use the combination of Connection Handling and Filter function to deny traffic to pass to the back-end resource, until proper authentication and authorization have occurred, so as to shield the protected resources against unauthorized access;
 * It can use the combination of Data Scanning and a Filter function, to shield the protected resources from malicious or malformed traffic.

Furthermore, Reduction may be used to allow compression of the data traffic between consumers and the Access Security service, for efficient data transfers. Note that for many security operations, the traffic between consumers and back-end resources need to be uncompressed, so as to allow inspection by this Generic Pattern.

This service is often combined with Access Distribution; such a combination may be realized as an "access path".