Overview of steps for using a risk firewall
The typical steps for setting up and using a risk firewall are as follows:
1. Add the Risk Firewall bundle to your application. To use the risk firewall default rule classes, you must also add the Risk Firewall Rules bundle to your application.
5. Unlock the risk firewall, which is locked by default so your application can ensure that initialization has been done before trying to use the risk firewall. See
Unlocking and locking risk firewalls.
7. Process orders after evaluation by the risk firewall. This is application-specific. For example, your application can
Amend pending orders by allowing human intervention.
8. Receive order updates from external order management systems and pass them back into the risk firewall. See
Processing order updates.
9. Process order updates from the risk firewall.
Optionally, you can also do the following:
Configure a risk firewall factory instance by setting parameters and/or overriding default error handling behavior. These configurations apply to subsequent execution of the
RiskFirewallFactory.create(),
createCb(),
connect(), or
connectCb() action on that instance. See
Configuring risk firewall factories.
Configure a risk firewall instance by: