Solution Architecture Document Word Formatdoc147
Solution Architecture Document Word Formatdoc147
Project:
Thursday,December28,2006
12/28/2006
1.1.1 Scope
This blueprint solution architecture is based on the Interior Solution Architecture (ISA) Volume
I. ISA is the target logical solution architecture and service-oriented application reference
architecture for the Department of the Interior (the enterprise). ISA is intended to help the
department and its bureaus attain their business needs using cost effective, usable, and
maintainable enterprise applications. This blueprint core team plans to implement this unified
solution architecture throughout the enterprise to achieve a flexible business model that meets
the customers demands with greatly reduced cost and much improved efficiency.
This ISA document (Volume I) provides the relationship of the solution architecture (SA) with
business, data, application, technology, and security architecture domains. It also explains how
the solution architecture is driven by the enterprise business needs. Solution architecture and its
associated application architecture address multiple development and deployment platforms. It
applies Enterprise Application Integration (EAI) techniques in the application architecture.
Consistent use of the ISA will allow the enterprise to smoothly transition to a service-oriented
architecture (SOA).
Not addressed in this document is the ISA Volume II document which presents a Service
Oriented Architecture (SOA) roadmap for the enterprise and discusses SOA patterns, governance
and security best practices. The general the enterprise Application Architecture is laid out
Volume III, while platform-specific reference architectures are presented in Volume IV, .NET
Application Reference Architecture, and Volume V, J2EE Application Reference Architecture.
This document defines the enterprise target solution architecture, which supports an applications
business, data, application, technology, and security architectures. While it describes the
application architecture in detail, discussions of the other four architectures are beyond its scope.
The enterprise and its Bureaus are leveraging e-Government strategies to make themselves more
agile. This Solution Architecture (SA) initiative is a key step in improving the enterprises
customer service. The key business drivers behind this initiative are as follows:
Provide consistent human and application interfaces throughout the enterprise
Provide services that help reduce training costs
Provide interfaces that are easy to use
In addition, the department-wide initiative supports the goal of the Office of the Chief
Information Officer (OCIO) to improve the enterprises internal and external business practices
using electronic services. It promotes solution consistency and simplifies vendor selection.
1.2 Audience
This document is intended mainly for senior technical managers at the enterprise to foster a
common understanding on IT governance. It may also benefit the requirements analysts,
12/28/2006
enterprise architects, solution architects, developers, and project managers who participate in
solution and application development.
Editor Notes:
Add comments for specific blueprint audience comments
12/28/2006
Technology Architecture and the enterprise Technology Reference Model (TRM) are reviewed in
Chapter 6.
Chapter applies Editor Notes to the other sub-architectures within SA: user security levels and
procedures; data security; application access, authorization, and security boundaries; and security
in the technology architecture.
A brief synopsis of the steps that are taken when applying the ISA is presented in Chapter 8,
Using Solution Architecture.
Appendix A has a glossary and a list of abbreviations and acronyms used in the ISA. Appendix
B contains a list of all the artifacts discussed in the ISA. A roadmap with pragmatic, concrete
steps for transforming the enterprise applications to the target service-oriented architecture is
presented in Appendix C.
1.4 References
[1] Patterns for e-business: A Strategy for Reuse, IBM Press, 2001
[2] Based on: Interior Solution Architecture Guidance Volume I: Target Logical Solution and
Service-Oriented Application Reference Architecture as provided by Service Oriented Integration
Center of Excellence, Chief Technology Officer Council (CTOC)
Editor Notes
Reference the team web site link and even the BFA Portfolio web site that captures the as-is
architecture. Cite the MBT products produced for this blueprint (or enterprise products) on the
site where any Figure you create in this document is sourced from.
12/28/2006
2 Architecture Overview
Editor Notes
Overall focus on highlighting the scope and level of change discovered including:
As-Is State of the Architecture
Target Service Architecture Overview
Mission Validation against Architecture
o Scoring
o Portfolio Re-use Highlights
Major Gaps and Alternative Analysis
As-Is State of the Architecture:
Editor Notes
Highlight the following aspects of the portfolio architecture:
o Portfolio Counts (i.e. # of systems, investments)
o # of organizations
o Existing related PAR or PART scores for business focus area
o # of functions
Paste the Summary table below from the As-Is System and Services Scoring
Capture 5-10 sentences summarizing and noting specific rationale from As-Is System and
Services Scoring.
Target Service Architecture Overview:
Editor Notes
Summarize the Description of:
Value Chain Diagram
Stakeholder Overview Diagram
Target Systems and Services Interaction Diagram
Business Services Maturity Matrix points near-term and long-term
Describe in 2-3 paragraphs how the target architecture meets the service needs
12/28/2006
Capture 2-5 sentences summarizing and noting specific rationale from Target System and
Services Scoring.
Portfolio Re-use Highlights:
Editor Notes
Highlight what systems (from what organizations) are key for re-use in target services
highlighting rationale
Highlight what enterprise services (from what organizations) are key for re-use in target services
highlighting rationale
Highlight what federal services (from what organizations) are key for re-use in target services
highlighting rationale
Major Gaps and Alternative Analysis:
Editor Notes
Highlight what key Gaps that need extra resolve and (from what organizations) are key for re-use
in target services highlighting rationale.
As well, highlight tactical wins in alternative analysis (near-term) along with long-term endservice solutions architecture (long-term)
12/28/2006
Interior Solution Architecture (ISA). Architectural principles for the IEA process affect
development, maintenance, and use of the IEA. These principles are documented in the
enterprise Conceptual Architecture Document Error: Reference source not found. ISA principles
for implementation establish the first tenets and related decision-making guidance for designing
and developing information systems.
Editor Notes
Further Non-Functional Requirement Principle detail will be captured in 5.2 Non-Functional
Requirements
The Solution and Application Architectures will encompass the following principles:
Flexibility
The enterprise will implement service-based application software that is independent of
hardware platforms, that is loosely coupled to infrastructure services, that places
reasonable demands on networks used for communication (i.e., minimizes traffic), and
that places minimal demands on users of the application.
Efficiency
The enterprise will create designs that reduce cost and implementation time, minimize
human intervention to preserve continuous and reliable operation, and reduce usertraining requirements. The architecture promotes user interfaces that optimize the nature,
efficiency, and effectiveness of the human operator.
Usability
The enterprise will implement easy-to-use solutions, accessible by people with
disabilities, which solve the enterprise business needs and provide needed information to
the public.
Balance
The enterprise will implement IT systems that provide availability and accessibility with
the appropriate level of security. Security shall be designed into all architectural elements,
balancing accessibility and ease of use with data protection commensurate to the
determined risks.
Reuse
The ISA, by creating standard application structure and leveraging SOA, provides the
foundation for their use of assets, including the solution architecture; business, data,
application, and run-time patterns; and business and infrastructure services. Reuse of
assets is key in reducing cost by eliminating redundant systems and promoting best
practices across the department.
12/28/2006
12/28/2006
IT Drivers:
12/28/2006
3 Business Architecture
3.1
Business Description
The business description defines at a very high-level for a solution the enterprise lines of
business, business functions, the users, and the interactions between users and functions. It can
be as simple as a couple of paragraphs. It should define the business functions that the solution
will perform along with the enterprise lines of business (LOBs) and external users for which the
solution will provide services.
Editor Notes
Extend off the Overview in more detail on each value-chain
Pull From Step 2 Vision Document
Revisit the lines of businesses covered by the solution architecture from 2.3.1
Cite Step 3 blueprint products related to business architecture (link to product instead of placing
hierarchy or table within document).
3.2
The Solution Overview Diagram represents the business description pictorially, showing the
users, business functions, and their connections.
Editor Notes
< Insert an overview Target Systems and Services Interaction Diagram>
Exhibit 3- 1: Solution Overview Diagram (SOD) for the blueprint
3.3
Review Section 3.3 Use Case Models in the Interior Solution Architecture document for
remainder of section including Use Case Template.
Editor Notes
In MBT Step 11 will be completed, but in MBT Step 4, process-system interaction will be listed
and modeled to IDEF0, BPMN, or similar activity modeling standards)
3.4
10
12/28/2006
business, user, accessibility, etc.). The Functional Requirements Document should tie back to the
recommendations in the Modernization Blueprint, if applicable, as well as the solutions overview
diagram and the use cases.
Editor Notes
In MBT Step 11, the Functional Requirements will be completed, but in MBT Step 4:
From the As-Is State of the Architecture scoring, capture 5-10 sentences on specific points in
Performance and Business Criteria findings.
From the Target Service Architecture Overview, Capture 2-5 sentences summarizing and noting
specific rationale from Target System and Services Validation as related to Business Fit and Gap
Criteria.
3.5
Business patterns are high-level concepts that establish the business purpose of any solution.
They define major objectives of the solution, identify participants, and help describe the
interactions between participants. Four basic business patterns are at the core of most (if not all)
composite business patterns: Self-Service, Collaboration, Information Aggregation, and
Extended Enterprise. There are also two integration patterns used to integrate two or more basic
business patterns: Access Integration and Application Integration.
Exhibit 3- 2: Business and Integration Patterns
Collaboration
Information Aggregation
Application Integration
Access Integration
Self-Service
Extended Enterprise
These business and integration patterns can be combined as composite patterns to implement the
enterprise-specific business solutions, making up composite patterns, discussed in Section Error:
Reference source not found, Error: Reference source not found. For more information on
11
12/28/2006
patterns, see Patterns for e-business: A Strategy for Reuse and Inside Patterns Error:
Reference source not found.
Exhibit 3-3: Business Pattern Selection Summary
Business Pattern
Description
Applicability to the
enterprise
Self-Service
(User-to-Business)
Collaboration
(User-to-User)
Information
Aggregation
(User-to-Data)
Extended Enterprise
(Bus-to-Bus)
Review Section 3.5 Business, Integration and Composite Patterns in the Interior Solution
Architecture document.
Editor Notes
In MBT Step 11 will be completed, but in MBT Step 4, service rationale on re-use, repeatable,
and redundancy inputs will be captured in rationale in the Target Systems and Services
Validation.
Highlight a paragraph for each Business Pattern based on reviewing the Ts/s Model
12
12/28/2006
4 Data Architecture
4.1
Editor Notes
Summarize the subject areas and information classes in support of this segment. For each key
subject area, provide a brief description.
Cite Step 3 blueprint products related to data architecture (link to product instead of placing
hierarchy or table within document).
From the As-Is State of the Architecture scoring, capture 5-10 sentences on specific points in
Data Criteria findings.
From the Target Service Architecture Overview, Capture 2-5 sentences summarizing and noting
specific rationale from As-Is System and Services Scoring as related to any data related rationale
found in all Criteria.
4.2
Summarize the conceptual entities in support of this segment. For each key subject area, provide
a brief description of the authoritative data sources.
4.3
If it has been decided that the solution (or parts of it) must be one or more custom-built
applications, the types of data that will be required by each application should be organized into
logical and physical Entity Relationship Diagrams (ERDs). The logical ERD represents entities
and their attributes (and, optionally, categories) as well as the relationships between the m. The
physical ERD differs from the logical one in that it represents the tables and columns that will
actually be implemented in a database.
The basic ERD diagram is made up of rectangles that represent entities (i.e., tables in the
physical ERD) or views and lines that represent the relationships between the entities. A logical
ERD may also contain a circle sitting on a horizontal line that represents a category. Attributes
(columns in the physical ERD) are listed within the entity and view boxes, with primary and
foreign keys noted if known. A physical ERD may differ in several ways from its associated
logical ERD. Multiple logical entities may be collapsed into one or more tables. For example, it
is standard practice to represent every look-up entity (such as state codes, zip codes, etc.) as
separate logical entities, but they may be implemented as a single, generic reference table or as a
standard pattern of reference tables that includes a values, grouping, and sub-grouping tables.
4.4
For many newer applications, when custom-built applications are required, an Object Role
Model (ORM) diagram may be more useful than an ERD. The ORM starts at a much more
Chapter 4 Data Architecture
13
12/28/2006
conceptual level than an ERD, with no attributes and all facts stated as relationships between
objects. ORM tools allow ORM models to be mapped to relational database schemas. For more
information about ORM diagrams, see Information Modeling and Relational Databases Error:
Reference source not found. There is also a good overview by the same author on the Microsoft
Developers Network (MSDN) site.
14
12/28/2006
5 Application Architecture
Editor Notes
Summarize the as-is and target portfolio architecture as well as differences such as:
o Portfolio Counts (i.e. # of systems, investments)
o # of organizations
o Existing related PAR or PART scores for business focus area
o # of functions by services
Cite Step 4 blueprint products related to application and service architecture (link to product
instead of placing hierarchy or table within document).
From the As-Is State of the Architecture scoring, capture 5-10 sentences on specific points in
Application Criteria findings.
From the Target Service Architecture Overview, Capture 2-5 sentences summarizing and noting
specific rationale from As-Is System and Services Scoring as related to Project Fit and Gap
Criteria.
Service level requirements (SLRs), which are run-time properties the system as a whole,
or parts of the system, must satisfy. SLRs include:
SLRs sometimes relate to particular parts of the system, e.g., to particular use cases.
15
12/28/2006
Portability
Maintainability.
For convenience, NFRs can also include constraints the system must conform to or satisfy.
System Constraints include:
The business constraints which the system must satisfy (e.g., geographical location)
The technical standards the system must satisfy
The technical givens which constrain the system (e.g., which existing hardware or
DBMS must be used).
The following list can be used as a guideline for the NFR categories that need to be captured:
Availability
Backup & Recovery
Capacity Estimates and Planning
Configuration Management
Disaster Recovery
Extendibility/Flexibility
Failure Management
Performance
Reliability
Scalability
Security
Service Level Agreements
Standards
System Management
Editor Notes
Under each bullet, based on rationale points for each service, organize and summarize those
points as related to the operational qualities of the service. Further Non-Functional Requirement
Some NFRs are expected to change over time. For example, capacity requirements very often
increase as more workload is added to the system, or as the volume of stored data increases.
Exhibit 5 -4 provides a convenient way to capture this information.
Editor Notes
The exhibit table below should be reviewed again and finalized in Step 11
16
12/28/2006
17
12/28/2006
6 Technology Architecture
The Technology Architecture applies to the Solution Architecture by guiding the following
decisions:
On what platform will the solution run?
What components of the technology-specific Application Reference Models are required
for the solution?
What business functionality and infrastructure components can be reused or purchased as
COTS products?
Editor Notes
Cite Step 4 blueprint products related to application or service architecture (link to product
instead of placing hierarchy or table within document).
From the As-Is State of the Architecture scoring, capture 5-10 sentences on specific points in
Technology Criteria findings.
From the Target Service Architecture Overview, Capture 2-5 sentences summarizing and noting
specific rationale from As-Is System and Services Scoring as related to Project Fit and Gap
Criteria.
18
12/28/2006
7 Security Architecture
Security Architecture interacts with all the other constituent architecture domains of SA:
Business, Data, Application, and Technology. Per the Business Architectural components, the
Security Architecture includes determining the appropriate user roles, security levels, and
procedures. With regards to Data Architecture, it includes various types of data security. The
Application Architecture must consider its security policy, including authorization, identification,
and application security boundaries. Within Technology Architecture, how the required security
can be provided by the technology infrastructure must be determined.
The enterprise Security standards are documented in the Interior Enterprise IT Security
Architecture Blueprint V1.0 Error: Reference source not found and the Interior Enterprise IT
Security Architecture Standard V2.1 Error: Reference source not found. During all phases of a
solution lifecycle, it is appropriate to determine what security components can be reused from
existing enterprise solutions or purchased as COTS products.
Editor Notes
Cite Step 4 blueprint products related to security architecture (link to product instead of placing
hierarchy or table within document).
From the As-Is State of the Architecture scoring, capture 5-10 sentences on specific points in
Security Criteria findings.
From the Target Service Architecture Overview, Capture 2-5 sentences summarizing and noting
specific rationale from As-Is System and Services Scoring as related to Project Fit and Gap
Criteria.
7.1
User roles and procedures is the primary focus of security within Business Architecture. To
implement a solution, the security policies and procedures must be defined that will allow the
appropriate users to access and interact with the solution.
Editor Notes
To be completed in Step 11
7.2
Data Security
Security Architecture is concerned with two main dimensions in Data Architecture: data domain
security and security applied to domain cross-sections. In Exhibit 7 -5, for example, an
application could contain data about sites and projects (two data domains represented vertically).
19
12/28/2006
Project Data
Site Data
A user could have access only to project data or only to site data (a given data domain) or could
have access only to data for a certain set of projects at a certain set of sites (a cross-section). The
solution dealing with this situation would have to be able to restrict access to project data in at
least two ways. First, only users who are authorized to see project data (the vertical security
slice) should have access to project data interface. Second, users authorized to see only
particular project data must be appropriately restricted. There may also be a need to define roles
for update versus read-only access to groups of data.
7.3
Each application must consider, as part of its business requirements, the levels of security
required and how and where it will be implemented. The enterprise Security Architecture lays
out the framework for applying the enterprise security policy to applications, such as:
Access to applications
Security at the application boundaries
Security of platforms on which the application components run
Physical security for system components and hardware
The Operational Models, based on the Technology-Specific Application Reference Architectures,
can be used to aid in the identification of application security boundaries, platform security, and
physical security.
7.4
Within the enterprise Technology Architecture, security is currently a major focus because of the
HSPD-12 directive. The Technology Architecture must recommend security technology
solutions that comply with the enterprise Security Architecture and that are as reusable and
interoperable as possible.
20
12/28/2006
Refer to full checklist on using Solution Architecture in Chapter 8 Using Solution Architecture in the
Interior Solution Architecture.
These procedures are used (as appropriate) to apply the ISA to a particular solution. Note that the
following list is not meant to imply an order in which the steps must be executed many of these steps
may be performed concurrently. Also see Appendix B Solution Architecture Artifacts for a list of the
artifacts mentioned below.
F-21
9 Appendix A Glossary
See 9 Appendix A Glossary in the Interior Solution Architecture document.
9.1
F-22
Related
Subarchitecture
Comments
Required
MBT
Step
MBT
Product
Name(s)
Blueprint
Supported
Business
Description
Business
Brief narrative
Required
Editor
note
Yes
Solution
Overview
Diagram (SOD)
Business
Enhanced in
subsequent steps
with business and
integration pattern
and service
components
overlays
Required
Yes
Business
Diagram or text
high-level with text
documenting each
use case and actor
Required
Activity
Modeling
Input (for
use case)
Functional
Requirements
Business
List
Required
Services
listed,
interface,
stakeholder
exchange,
but not
bus. Rules
Solution Subject
Areas and
Information
Classes
Data
List
Required
Yes
Solution data
mapped to the
enterprise
entities or
classes
Data
List
Required
Key Areas
and Core
Areas only
Entity
Relationship
Diagram (ERD)
Data
Diagram
As needed for
new
development
Logical ERD
-Key Areas
and Core
Areas only
Object Role
Model (ORM)
diagram
Data
Diagram
As needed for
new
development
F-23
Application
Patterns and
Tiers
Application
Diagram
As needed
11
Non-functional
Requirements
Application
List
Required
4,11
Partial
SRM mapped to
business
functionality
Application
Diagram
As needed
Yes
Application
Reference Model
Application/
Technology
Diagram
Required for
COTS products
and new
development
Yes
Security
List
Required
11
Procedures
Security
Document
Required
11
Data Security
Security
Document
Required
11
Application
Access
Security
Document
Required
11
Application
Security
Boundaries
Security
Diagram
Required
11
Security
Technology
Security
Document
Required
11
F-24