13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6. The service fetches the certificate from the specified URL location.7. The service verifies the certificate, its validity and its signature.8. When the service authenticates the certificate, it processes the message andreturns a result.Firewall processingFirewalls remain a critical component of the Web Services security architectureand WS-<strong>Security</strong> Specifications also address security on the firewall.AuthorizedRequesterRequesterWebServiceUnauthorizedRequesterFigure 7-24 Firewall processingAs shown in Figure 7-25, the firewall processes the incoming SOAP messagesand only allows those from authorized clients to penetrate the firewall.Figure 7-25 Scenario using firewall processingIn this scenario, the firewall observes the security tokens used to sign themessage. If the signature is valid, and the signing authority for the security tokenis trusted to authorize messages into the firewall, then the message is allowed;otherwise it is rejected. In some cases, a signature may specifically reference thefirewall as a SOAP actor.154 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!