13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.1 Web Services securityWeb Services has become a hot area in relation to Web applications; it is a fairlynew technology with remarkable promise. There are areas in Web Services yetto be explored or refined; like security, it is an essential part of Web Services, butthe recommendations have been just worked out recently and it will take time forthem to mature.This book will not introduce the concept of Web Services, and it will not discussthe Web Services architecture; for a good introduction and more details on thistopic read the <strong>IBM</strong> Redbook: Web Services Wizardry with <strong>WebSphere</strong> StudioApplication Developer, SG24-6292.In this section you will find information on how to create a secured Web Serviceusing digital certificates in <strong>WebSphere</strong> Studio. You will find an introduction to theWS-<strong>Security</strong> recommendation, providing the security fundamentals for WebServices. We will also discuss how the Web Services Gateway is involved inWeb Services security.7.1.1 Digital CertificatesDigital signatures provide integrity, signature assurance and non-repudiationover Web data. Such features are especially important for documents thatrepresent commitments such as contracts, price lists, and manifests. In view ofrecent Web technology developments, the proposed work will address the digitalsigning of documents (any Web resource addressable by a URI) using XMLsyntax. This capability is critical for a variety of electronic commerce applications,including payment tools.Developing secure Web Services with <strong>WebSphere</strong> StudioNow we are going to write a secured Web Service to provide customer accountbalance details.There is one pattern of evolving Web Services from an existing Web Serverapplication known as “Browser to Server Pattern”. This pattern wraps an existingapplication as a service using a SOAP message as the service invocation. TheWeb server provides a runtime execution container that defines its own securitymodel with policy information derived from a deployment descriptor configuredby the deployer of the Web server application. This pattern typically includes amechanism for associating the identity of the invoking entity (the browser client)with the executing application instance and allows the application to continue tofunction as it did before.126 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!