03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6. The service fetches the certificate from the specified URL location.<br />

7. The service verifies the certificate, its validity and its signature.<br />

8. When the service authenticates the certificate, it processes the message and<br />

returns a result.<br />

Firewall processing<br />

Firewalls remain a critical component of the Web Services security architecture<br />

and WS-<strong>Security</strong> Specifications also address security on the firewall.<br />

Authorized<br />

Requester<br />

Requester<br />

Web<br />

Service<br />

Unauthorized<br />

Requester<br />

Figure 7-24 Firewall processing<br />

As shown in Figure 7-25, the firewall processes the incoming SOAP messages<br />

and only allows those from authorized clients to penetrate the firewall.<br />

Figure 7-25 Scenario using firewall processing<br />

In this scenario, the firewall observes the security tokens used to sign the<br />

message. If the signature is valid, and the signing authority for the security token<br />

is trusted to authorize messages into the firewall, then the message is allowed;<br />

otherwise it is rejected. In some cases, a signature may specifically reference the<br />

firewall as a SOAP actor.<br />

154 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!