Apama 10.3.1 | Apama Capital Markets Foundation Documentation | Capital Markets Foundation | Order Management | Risk firewall | Understanding risk firewalls | Overview of steps for using a risk firewall
 
Overview of steps for using a risk firewall
The typical steps for setting up and using a risk firewall are as follows:
1. Add the Risk Firewall bundle to your application. To use the risk firewall default rule classes, you must also add the Risk Firewall Rules bundle to your application.
2. Create a risk firewall. See Creating risk firewalls.
3. Register one or more rule classes with the risk firewall you created. See Registering rule classes with a risk firewall.
4. Add one or more risk firewall rule instances for each rule class you registered with the risk firewall. See Adding rule instances to rule classes. Note that for custom rule classes, the addition of at least one rule class instance is not always a requirement. See Implementing custom risk firewall rule classes.
5. Unlock the risk firewall, which is locked by default so your application can ensure that initialization has been done before trying to use the risk firewall. See Unlocking and locking risk firewalls.
6. Send orders into the risk firewall. See Sending orders into a risk firewall.
7. Process orders after evaluation by the risk firewall. This is application-specific. For example, your application can
*Forward approved orders to an order management system outside your application. See Receiving approved orders from a risk firewall.
*Process rejected orders by sending notifications to relevant users. See Handling orders rejected by a risk firewall.
*Amend pending orders by allowing human intervention.
8. Receive order updates from external order management systems and pass them back into the risk firewall. See Processing order updates.
9. Process order updates from the risk firewall.
Optionally, you can also do the following:
*Configure a risk firewall factory instance by setting parameters and/or overriding default error handling behavior. These configurations apply to subsequent execution of the RiskFirewallFactory.create(), createCb(), connect(), or connectCb() action on that instance. See Configuring risk firewall factories.
*Configure a risk firewall instance by:
*Setting risk firewall query response callbacks
*Setting risk firewall lock callbacks
*Setting risk firewall parameters
*Overriding default error handling for risk firewalls
*Specify the order in which to evaluate registered rule classes. See Setting rule class priority.
*Connect to a risk firewall that is in another monitor or context. See Connecting to risk firewalls.
*Set order update callbacks that process order updates that the risk firewall sends. See Setting order update callbacks.

Copyright © 2013-2019 | Software AG, Darmstadt, Germany and/or Software AG USA, Inc., Reston, VA, USA, and/or its subsidiaries and/or its affiliates and/or their licensors.