03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

WS-<strong>Security</strong> describes enhancements to SOAP messaging to provide quality of<br />

protection through message integrity, message confidentiality, and single<br />

message authentication. These mechanisms can be used to accommodate a<br />

wide variety of security models and encryption technologies.<br />

WS-<strong>Security</strong> also provides a general-purpose mechanism for associating<br />

security tokens with messages. No specific type of security token is required by<br />

WS-<strong>Security</strong>. It is designed to be extensible, for example, to support multiple<br />

security token formats, or in the case of a client providing proof of identity and<br />

proof of a particular business certification.<br />

Additionally, WS-<strong>Security</strong> describes how to encode binary security tokens. The<br />

specification describes how to encode X.509 certificates and Kerberos tickets as<br />

well as how to include opaque encrypted keys. It also includes extensibility<br />

mechanisms that can be used to further describe the characteristics of the<br />

credentials that are included with a message.<br />

Web Services security specifications<br />

WS-<strong>Security</strong> only provides the foundation for other security specifications.<br />

Layered on this, we have a policy layer model (WS-Policy), a trust model<br />

(WS-Trust), and a privacy model (WS-Privacy). These specifications provide us<br />

with the foundation to establish secure interoperable Web Services across the<br />

domain. The follow-on specifications include secure conversation<br />

(WS-SecureConversation), federated trust (WS-Federation), and authorization<br />

(WS-Authorization). All these specifications should provide security framework<br />

specifications related to auditing, management, and privacy.<br />

Follow-On Specifications<br />

WS-<br />

SecureConversation<br />

WS-Federation<br />

WS-Authorization<br />

Initial Specifications<br />

WS-<strong>Security</strong><br />

SOAP Foundation<br />

WS-Policy WS-Trust WS-Privacy<br />

WS-<strong>Security</strong><br />

SOAP Foundation<br />

Figure 7-14 Web Services security specifications<br />

The following sections will provide more details on the initial specifications.<br />

WS-Policy<br />

WS-Policy describes the capabilities and constraints of the security policies on<br />

intermediaries and endpoints. This way, senders and receivers can define their<br />

requirements and capabilities.<br />

Chapter 7. Securing Enterprise Integration components 147

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!