03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Policy<br />

Requester<br />

<strong>Security</strong><br />

Token<br />

Service<br />

Policy<br />

<strong>Security</strong><br />

Token<br />

Claims<br />

Claims<br />

<strong>Security</strong><br />

Token<br />

Web<br />

Service<br />

Policy<br />

<strong>Security</strong><br />

Token<br />

Claims<br />

Figure 7-17 <strong>Security</strong> Token Service Model<br />

A Web Service can require that an incoming message prove a set of claims (for<br />

example: name, key, permission, capability, and so on). If a message arrives<br />

without having the required claims, the service may ignore or reject the message.<br />

We refer to the set of required claims and related information as policy.<br />

A requester can send messages with proof of the required claims by associating<br />

security tokens with the messages. Thus, messages both demand a specific<br />

action and prove that their sender has the claim to demand the action.<br />

When a requester does not have the required claims, the requester or someone<br />

on its behalf can try to obtain the necessary claims by contacting other Web<br />

Services. These other Web Services, which we refer to as security token<br />

services, may in turn require their own set of claims. <strong>Security</strong> token services<br />

broker trust between different trust domains by issuing security tokens.<br />

Scenarios<br />

The following sections discuss some of the WS-<strong>Security</strong> scenarios. Only a few of<br />

the possible scenarios are covered here, those that will provide you with an<br />

introduction to the topic and an easy understanding of it.<br />

Direct Trust using basic authentication and Transport-Level<br />

<strong>Security</strong><br />

In this scenario, the requester opens a connection to the Web Service by<br />

exchanging a public key pair to establish a secure channel over an HTTP<br />

connection. Then the server prompts for user ID and password through an HTTP<br />

message exchange and these user credentials are carried through the HTTP<br />

headers.<br />

150 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!