03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

intermediaries to forward messages. Specifically, the SOAP message model<br />

operates on logical endpoints that abstract the physical network and application<br />

infrastructure and therefore frequently incorporates a multi-hop topology with<br />

intermediate actors.<br />

Point-to-point configuration<br />

Available <strong>Security</strong> solutions such as Secured Socket Layer (SSL) / Transport<br />

Layer <strong>Security</strong> (TLS) and IPSec, like network layer solutions, provide features<br />

such as authentication, data integrity and data confidentiality. But the main<br />

problem is that these solutions enable only point-to-point secure sessions.<br />

<strong>Security</strong> Context<br />

{<br />

<strong>Security</strong> Context<br />

{<br />

Requester Intermediary Web Service<br />

Figure 7-15 Point-to-point configuration<br />

End-to-end configuration<br />

When data is received and forwarded by an intermediary beyond the transport<br />

layer, both the integrity of data and any security information that flows with it may<br />

be lost. This forces any upstream message processors to rely on the security<br />

evaluations made by previous intermediaries and to completely trust their<br />

handling of the content of messages. What is needed in a comprehensive Web<br />

Service security architecture is a mechanism that provides end-to-end security.<br />

Successful Web Service security solutions will be able to leverage both transport<br />

and application layer security mechanisms to provide a comprehensive suite of<br />

security capabilities.<br />

<strong>Security</strong> Context<br />

Requester Intermediary Web Service<br />

Figure 7-16 End-to-end configuration<br />

<strong>Security</strong> Token Service Model<br />

The following section explains the <strong>Security</strong> Token Service Model which enables<br />

us to achieve our end-to-end security goals. Figure 7-17 shows that any<br />

requester may also be a service, and that the <strong>Security</strong> Token Service may also<br />

fully be a Web Service, expressing policy and requiring security tokens.<br />

Chapter 7. Securing Enterprise Integration components 149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!