13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

intermediaries to forward messages. Specifically, the SOAP message modeloperates on logical endpoints that abstract the physical network and applicationinfrastructure and therefore frequently incorporates a multi-hop topology withintermediate actors.Point-to-point configurationAvailable <strong>Security</strong> solutions such as Secured Socket Layer (SSL) / TransportLayer <strong>Security</strong> (TLS) and IPSec, like network layer solutions, provide featuressuch as authentication, data integrity and data confidentiality. But the mainproblem is that these solutions enable only point-to-point secure sessions.<strong>Security</strong> Context{<strong>Security</strong> Context{Requester Intermediary Web ServiceFigure 7-15 Point-to-point configurationEnd-to-end configurationWhen data is received and forwarded by an intermediary beyond the transportlayer, both the integrity of data and any security information that flows with it maybe lost. This forces any upstream message processors to rely on the securityevaluations made by previous intermediaries and to completely trust theirhandling of the content of messages. What is needed in a comprehensive WebService security architecture is a mechanism that provides end-to-end security.Successful Web Service security solutions will be able to leverage both transportand application layer security mechanisms to provide a comprehensive suite ofsecurity capabilities.<strong>Security</strong> ContextRequester Intermediary Web ServiceFigure 7-16 End-to-end configuration<strong>Security</strong> Token Service ModelThe following section explains the <strong>Security</strong> Token Service Model which enablesus to achieve our end-to-end security goals. Figure 7-17 shows that anyrequester may also be a service, and that the <strong>Security</strong> Token Service may alsofully be a Web Service, expressing policy and requiring security tokens.Chapter 7. Securing Enterprise Integration components 149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!