Cover image for Mastering Web services security
Title:
Mastering Web services security
Publication Information:
Indianapolis, Ind. : Wiley Technology Pub., 2003
ISBN:
9780471267164
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010058292 QA76.9.A25 M374 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

Uncovers the steps software architects and developers will need to take in order to plan and build a real-world, secure Web services system Authors are leading security experts involved in developing the standards for XML and Web services security Focuses on XML-based security and presents code examples based on popular EJB and .NET application servers Explains how to handle difficult-to-solve problems such as passing user credentials and controlling delegation of those credentials across multiple applications Companion Web site includes the source code from the book as well as additional examples and product information


Author Notes

BRET HARTMAN is Chief Technology Officer at Quadrasis, a business unit of Hitachi. He is a well-known expert on security of component systems.
DONALD J. FLINN is Chief security architect at Quadrasis and an active member of the SAML and WS-Security working groups at OASIS, which defines XML and Web services security.
KONSTANTIN BEZNOSOV, PhD, is a security architect at Quadrasis, specializing in the security design for distributed systems.
SHIRLEY KAWAMOTO is a principal security architect at Quadrasis, specializing in cryptography.


Table of Contents

Acknowledgmentsp. v
Forewordp. vii
Introductionp. xix
Chapter 1 Overview of Web Services Securityp. 1
Web Services Overviewp. 2
Characteristics of Web Servicesp. 3
Web Services Architecturep. 3
Security as an Enabler for Web Services Applicationsp. 4
Information Security Goals: Enable Use, Bar Intrusionp. 5
Web Services Solutions Create New Security Responsibilitiesp. 5
Risk Management Holds the Keyp. 6
Information Security: A Proven Concernp. 7
Securing Web Servicesp. 8
Web Services Security Requirementsp. 9
Providing Security for Web Servicesp. 10
Unifying Web Services Securityp. 12
EASI Requirementsp. 13
EASI Solutionsp. 14
EASI Frameworkp. 15
EASI Benefitsp. 18
Example of a Secure Web Services Architecturep. 19
Business Scenariop. 19
Scenario Security Requirementsp. 22
Summaryp. 23
Chapter 2 Web Servicesp. 25
Distributed Computingp. 25
Distributed Processing across the Webp. 27
Web Services Pros and Consp. 29
Extensible Markup Languagep. 30
Supporting Conceptsp. 32
SOAPp. 36
SOAP Message Processingp. 37
Message Formatp. 39
SOAP Featuresp. 44
HTTP Bindingp. 45
SOAP Usage Scenariosp. 45
Universal Description Discovery and Integrationp. 46
WSDLp. 48
Other Activitiesp. 50
Active Organizationsp. 51
Other Standardsp. 51
Summaryp. 52
Chapter 3 Getting Started with Web Services Securityp. 53
Security Fundamentalsp. 54
Cryptographyp. 56
Authenticationp. 58
Authorizationp. 63
Walk-Through of a Simple Examplep. 64
Example Descriptionp. 65
Security Featuresp. 66
Limitationsp. 67
Summaryp. 70
Chapter 4 XML Security and WS-Securityp. 73
Public Key Algorithmsp. 73
Encryptionp. 74
Digital Signaturesp. 78
Public Key Certificatesp. 80
Certificate Formatp. 82
Public Key Infrastructurep. 83
XML Securityp. 85
XML Encryptionp. 85
XML Signaturep. 88
WS-Securityp. 95
Functionalityp. 96
Security Elementp. 97
Structurep. 97
Examplep. 97
Summaryp. 98
Chapter 5 Security Assertion Markup Languagep. 99
OASISp. 100
What Is SAML?p. 100
How SAML Is Usedp. 101
The Rationale for Understanding the SAML Specificationp. 104
Why Open Standards Like SAML Are Neededp. 105
Security Problems Solved by SAMLp. 105
A First Detailed Look at SAMLp. 107
SAML Assertionsp. 109
Common Portion of an Assertionp. 109
Statementsp. 112
SAML Protocolsp. 116
SAML Request/Responsep. 117
SAML Requestp. 117
SAML Responsep. 121
Bindingsp. 122
Profilesp. 122
Shibbolethp. 127
Privacyp. 128
Federationp. 129
Single Sign-onp. 129
The Trust Relationshipp. 130
Related Standardsp. 130
XACMLp. 130
WS-Securityp. 130
Summaryp. 131
Chapter 6 Principles of Securing Web Servicesp. 133
Web Services Examplep. 133
Authenticationp. 135
Authentication Requirementsp. 135
Options for Authentication in Web Servicesp. 137
System Characteristicsp. 141
Authentication for ePortal and eBusinessp. 143
Data Protectionp. 145
Data Protection Requirementsp. 145
Options for Data Protection in Web Servicesp. 146
System Characteristicsp. 147
eBusiness Data Protectionp. 150
Authorizationp. 150
Authorization Requirementsp. 150
Options for Authorization in Web Servicesp. 153
System Characteristicsp. 154
eBusiness Authorizationp. 155
Summaryp. 156
Chapter 7 Security of Infrastructures for Web Servicesp. 157
Distributed Security Fundamentalsp. 158
Security and the Client/Server Paradigmp. 158
Security and the Object Paradigmp. 160
What All Middleware Security Is Aboutp. 161
Roles and Responsibilities of CSS, TSS, and Secure Channelp. 163
How Middleware Systems Implement Securityp. 164
Distributed Security Administrationp. 174
Enforcing Fine-Grained Securityp. 175
CORBAp. 176
How CORBA Worksp. 177
Roles and Responsibilities of CSS, TSS, and Secure Channelp. 179
Implementation of Security Functionsp. 182
Administrationp. 186
Enforcing Fine-Grained Securityp. 187
COM+p. 188
How COM+ Worksp. 188
Roles and Responsibilities of CSS, TSS, and Secure Channelp. 192
Implementation of Security Functionsp. 193
Administrationp. 195
Enforcing Fine-Grained Securityp. 196
.NET Frameworkp. 197
How .NET Worksp. 199
.NET Securityp. 203
J2EEp. 207
How EJB Worksp. 208
Roles and Responsibilities of CSS, TSS, and Secure Channelp. 210
Implementation of Security functionsp. 212
Administrationp. 213
Enforcing Fine-Grained Securityp. 216
Summaryp. 217
Chapter 8 Securing .NET Web Servicesp. 219
IIS Security Mechanismsp. 219
Authenticationp. 220
Protecting Data in Transitp. 221
Access Controlp. 222
Loggingp. 222
Fault Isolationp. 224
Creating Web Services with Microsoft Technologiesp. 224
Creating Web Services out of COM+ Componentsp. 225
Creating Web Services out of COM Components Using SOAP Toolkitp. 226
Creating Web Services with .NET Remotingp. 228
Creating Web Services Using ASP.NETp. 229
Implementing Access to eBusiness with ASP.NET Web Servicesp. 233
ASP.NET Web Services Securityp. 234
Authenticationp. 235
Data Protectionp. 243
Access Controlp. 244
Auditp. 251
Securing Access to eBusinessp. 256
Summaryp. 257
Chapter 9 Securing Java Web Servicesp. 259
Using Java with Web Servicesp. 260
Traditional Java Security Contrasted with Web Services Securityp. 261
Authenticating Clients in Javap. 262
Data Protectionp. 262
Controlling Accessp. 263
How SAML Is Used with Javap. 263
Assessing an Application Server for Web Service Compatibilityp. 265
JSR Compliancep. 265
Authenticationp. 266
Authorizationp. 267
Java Tools Available for Web Servicesp. 267
Sun FORTE and JWSDPp. 268
IBM WebSphere and Web Services Toolkitp. 269
Systinet WASPp. 270
The Java Web Services Examplesp. 271
Example Using WASPp. 271
Example Using JWSDPp. 280
Summaryp. 284
Chapter 10 Interoperability of Web Services Security Technologiesp. 287
The Security Interoperability Problemp. 288
Between Security Tiersp. 289
Layered Securityp. 290
Perimeter Securityp. 291
Mid-Tierp. 294
Back-Office Tierp. 297
Interoperable Security Technologiesp. 297
Authenticationp. 297
Security Attributesp. 298
Authorizationp. 300
Maintaining the Security Contextp. 301
Handling Delegation in Web Servicesp. 302
Using a Security Frameworkp. 305
Client Use of EASIp. 305
Target Use of EASIp. 307
Securing the Examplep. 307
Framework Authenticationp. 308
Framework Attribute Handlingp. 310
Framework Authorizationp. 310
Example Using JWSDPp. 311
What Problems Should an EASI Framework Solve?p. 317
Web Services Support for EASIp. 318
Making Third-Party Security Products Work Togetherp. 318
Federationp. 319
Liberty Alliancep. 320
The Internet versus Intranets and Extranetsp. 322
Summaryp. 322
Chapter 11 Administrative Considerations for Web Services Securityp. 325
Introducing Security Administrationp. 325
The Security Administration Problemp. 326
What about Web Services?p. 327
Administering Access Control and Related Policiesp. 327
Using Attributes Wiselyp. 328
Taking Advantage of Role-Based Access Controlp. 329
Delegationp. 341
Audit Administrationp. 343
Authentication Administrationp. 343
How Rich Does Security Policy Need to Be?p. 344
Administering Data Protectionp. 345
Making Web Services Development and Security Administration Play Well Togetherp. 346
Summaryp. 347
Chapter 12 Planning and Building a Secure Web Services Architecturep. 349
Web Services Security: The Challengesp. 350
Security Must Be In Placep. 350
What's So Tough About Security for Web Services?p. 351
What Is Security?p. 351
Building Trustworthy Systemsp. 352
Security Evolution--Losing Controlp. 354
Dealing with the "ilities"p. 355
EASI Principles for Web Servicesp. 355
Security Architecture Principlesp. 356
Security Policy Principlesp. 357
Determining Requirementsp. 358
Functional Requirementsp. 360
ePortal Security Requirementsp. 360
eBusiness Security Requirementsp. 362
Nonfunctional Requirementsp. 364
Overview of ePortal and eBusiness Security Architecturesp. 366
Applying EASIp. 369
ePortal EASI Frameworkp. 370
Addressing ePortal Requirementsp. 372
eBusiness EASI Frameworkp. 375
Addressing eBusiness Requirementsp. 378
Deploying Securityp. 381
Perimeter Securityp. 382
Mid-Tier Securityp. 384
Back-Office Securityp. 385
Using a Security Policy Serverp. 386
Self-Administrationp. 386
Large-Scale Administrationp. 387
Storing Security Policy Datap. 388
Securing UDDI and WSDLp. 391
Security Gotchas at the System Architecture Levelp. 391
Scalingp. 392
Performancep. 392
Summaryp. 393
Glossaryp. 395
Referencesp. 415
Indexp. 423