Why not? The primary function of a Reverse Invoke server is to provide enhanced security over the out-of-the-box IS configuration using a proprietary protocol that involves internal IS servers creating outbound connections through the firewall to the RI server. In this manner the firewall can be configured to block all inbound connections.
However, I usually recommend leveraging an enterprise’s existing web server security components in the DMZ rather than adding an IS-only proprietary solution. Why re-invent the wheel for securing the HTTP/S portion of IS when your organization has most likely already done this for its existing web servers or other HTTP-accessible components.
If your organization has no other HTTP security approach (how could this be?) I still suggest acquiring a third-party secure proxy, load balancing or edge server that could be used for non-IS products (such as webMethods Portal for example).
Reverse Invoke was a critical component in the early days of B2B, but unless you are absolutely determined to have an IS-only HTTP security solution, I do not recommend it.
Mark
#API-Management#webMethods#soa