SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
24-10-2008




                            This Presentation Courtesy of the
                            International SOA Symposium
                            October 7-8, 2008 Amsterdam Arena
                            www.soasymposium.com
                            info@soasymposium.com


                                          Founding Sponsors




Platinum Sponsors




Gold Sponsors         Silver Sponsors




    The Future of SOA
    Security
    (as far as I can guess)




     Toufic Boubez, Ph.D.
     Chief Technology Officer
     Layer 7 Technologies

     tboubez@layer7tech.com
     www.layer7tech.com




                                                                        1
24-10-2008




Agenda

 LOTS of material to cover!!
 No time for Agenda!!




                      © Toufic Boubez - Layer 7 Technologies




Speaker Introduction

 Current:
      Layer 7 Co-Founder and Chief Technology Officer.
      Co-Editor: WS-Policy W3C Work Group
      Co-Author: WS-Trust, WS-SecureConversation, WS-Federation.
      OASIS WS-RM TC, WS-SX TC
      Books: Building Web Services with Java (12/2001), Java P2P
       Unleashed (8/2002).
 Background:
    IBM Lead Architect for Web Services.
    IBM Lead Architect for Web Services Toolkit.
    Co-Author of UDDI V1 specification.
    Technical Chair/Track Chair for the XML Web Services One
     Conferences.
    OASIS WS-Security TC, UDDI TC, SAML TC, WS-I Sample Apps
     WG
    IBM technical lead for UN/OASIS ebXML.



                      © Toufic Boubez - Layer 7 Technologies




                                                                            2
24-10-2008




 Drivers for SOA

 Growth and increased productivity:
 Inside the organization, EAI (Enterprise Application
  Integration) is essential for increased productivity;
 Outside the organization, integration with partners is
  essential for growth.

 Flexibility and agility:
 Easily integrate disparate internal and external resources
  and functionalities as needed;
 Easily add and change integrations with business partners;
 Easily add and change IT platforms – avoid vendor lock-in;
 Runtime Configurable Models.

 Just-in-time integration as required:
 Loose coupling as a fundamental architectural principle.


                          © Toufic Boubez - Layer 7 Technologies




 Scenario: Fluid Communities Of Interest

                                   Situation 1
   Organization A




                                                                   Organization B




                                           Organization C
            Situation 2

                          © Toufic Boubez - Layer 7 Technologies




                                                                                            3
24-10-2008




Issues: Runtime Constraints and Capabilities

                                Situation 1
 Organization A




                                                                Organization B



        Identity                                                     Transport
        Trust                                                        API/Syntax
        Security                                                     Description
        Platform                                                     Discovery
        Auth/Auth                                                    Semantics
        Availability                                                 Context
        Response
                                      Organization C

                       © Toufic Boubez - Layer 7 Technologies




Theory vs. Practice

 Web Services technology will solve
  these problems (will it?)
 In theory, theory and practice are the
  same.
    In practice, they're not!

 Two major issues:
    All kidding aside, why would I expose my
     backend systems on the Web? Security,
     Privacy, Reliability … anyone? anyone?
    So, whatever happened to loose coupling?


                       © Toufic Boubez - Layer 7 Technologies




                                                                                           4
24-10-2008




 Dealing with Security




                               © Toufic Boubez - Layer 7 Technologies




Fundamentals of Security




                                                                 ISO 7498-2, 10181



              © Layer 7 Technologies




                                                                                             5
24-10-2008




The Present:
Essential Security Requirements for SOA
 SOA brings new requirements:
   Messages may pass through multiple
    transports/hops
      Can’t rely on transport security
      Can’t rely on socket continuity
   At any intermediary, certain parts of the
    message may need to be processed
      Only encrypt what we need to support the
       security policy




                Web Services Security   © Layer 7 Technologies   11




The Present:
New Security Model for SOA
 SOA necessitates a new security
  model:
   Need to decouple security from
    transport
   Need to include security information in
    the message:
      Credentials or tokens for AuthN/AuthZ
      Encryption of message parts
      Signing of message parts




                Web Services Security   © Layer 7 Technologies   12




                                                                              6
24-10-2008




WS-Security
 The security architecture for Web services
 Defines SOAP security headers:
       Tokens:
            Binary Tokens (X.509)
            Username, SAML, Kerberos
       Encryption of message whole or parts
       Signing of message whole or parts
  Unifying standard that brings together a
   number of standards efforts, defining how
   they are to be used in SOAP messaging
       Eg: W3C XML encryption, c14n, and digital
        signatures, OASIS SAML, etc.



                                © Toufic Boubez - Layer 7 Technologies




<SOAP-ENV:Envelope>
   <SOAP-ENV:Header>
       <wsse:Security>
           <wsu:TimeStamp>
                                                                               Web Service
                                                                             Server Certificate
           <wsse:BinarySecurityToken>



          <xenc:EncryptedKey>                                            Reference

             <ds:KeyInfo>
                                                                          Encrypt
             <xenc:EncryptedData>


             <xenc:DataReference>                                              Web Service
                                                                             Client Certificate
           <ds:Signature>                                                 Copy of

             <ds:Reference>
             <ds:Reference>

                                                                           Sign

             <ds:KeyInfo>



  <SOAP-ENV:Body>
       <xenc:EncryptedData>




                                © Toufic Boubez - Layer 7 Technologies




                                                                                                          7
24-10-2008




 What’s Next:
 Dealing with Identity and
 Trust




What’s Missing From WS-Security?
 We now have a basic mechanism to secure
  SOAP messages on a one-by-one basis.
 Key questions:
   Where do the tokens come from?
   What if I don’t want to propagate identities?
   What I need additional information to make
    authorization decisions?
   What if the message exchange pattern requires
    more than one request and response pair?
 Missing:
   Portable identity, entitlements, attributes
   Trust, federation, token distribution
   Sessions




                  © Toufic Boubez - Layer 7 Technologies




                                                                   8
24-10-2008




The Two Sides of SOA
 SOA brings new challenges:
   The combination of loose coupling and
    distributed resources, both fundamental SOA
    tenets, are a double edged sword – along with
    the potential for much greater IT flexibility and
    business agility, they bring the potential for
    harder oversight.
   New regulatory environment that requires
    much more stringent oversight, monitoring
    and enforcement of corporate and IT
    governance policies:
      SOX, HIPAA, etc.
      Cross industries: Financial, Health, etc.
      Non-compliance is expensive; also involves personal
       responsibility for executives.




                   © Toufic Boubez - Layer 7 Technologies




Identity Requirements for Policy Compliance
Monitoring
   Identity: Who?
        can access information;
        has accessed information;
        owns information;
        is subject of information;
        has performed action.
   Audit:
      Identity-based audit trail.
   Policy:
      Framework of identity centric corporate security
       and privacy rules.
   Trust:
      How to establish loosely coupled trust between
       disparate organizations?



                   © Toufic Boubez - Layer 7 Technologies




                                                                     9
24-10-2008




The Federation Challenge in Web Services

                             Islands of                                                          Blue’s
                                                                                                 Server
                              Identity
                                                                                                                 Blue’s
                                                                                                                Directory
 Green’s                                                                                                         Server
Directory
 Server
                      Firewall




                                 Green’s
                                  Client
                                                                               Alex
                                                                                  Scott
                                                                                      Francis               Organization
                                                                                                               Blue




                                                                          Need to share not only
      Michelle
                                                                     authentication and authorization
            Dimitri
                                               Organization           information, but also identity
                 Program                          Green                    attribute information
                    X
                                                                                   Big privacy and confidentiality issues…



                                          © Toufic Boubez - Layer 7 Technologies




What Hasn’t Worked in the Past
                  Issues
     • Online access through firewall mazes
     • Latency in replication
             • People leave, fired, etc

                                                                                                                 Blue’s
                                                                                                                Directory
 Green’s                                                                                                         Server
                                          Remote
Directory
                                          Directory
 Server
                      Firewall
                                           Access




                                                                                                            Organization
                                                                                                               Blue



                                                                      Directory
                                                                   Synchronization
      Michelle
            Dimitri
                                               Organization
                 Program                          Green
                    X




                                          © Toufic Boubez - Layer 7 Technologies




                                                                                                                                    10
24-10-2008




What We Really Need is Effective Separation of
Concerns


                 Authentication
                                                                                                         Blue’s
                                                                                                        Directory
 Green’s                                                                                                 Server
Directory
 Server
                                  Authorization



                                       Trust


                                                                                                    Organization
                                                                                                       Blue




                                                                                   Core Requirements
      Michelle                                                              • Build dynamic trust relationships
            Dimitri                                                         • Transport the security context so that
                                        Organization                        authentication and authorization can be
                  Program                  Green
                     X                                                      distributed
                                                                            • Enforce privacy issues
                                                                            • Time out sessions/global logout

                                   © Toufic Boubez - Layer 7 Technologies




The Mechanism: Global Trust of Local Tokens



                                                                                                         Blue’s
                                                                                                        Directory
 Green’s                                                                                                 Server
 Identity
  Server




                                       Trust



                                                                                         2. Validate token
                                                                                         here according to
                                                                                            trust model
      Michelle
            Dimitri
                                          1. Acquire trusted token with
                  Program
                                        statement of authentication (and
                     X                        possibly authorization,
                                         entitlements, attributes) in this
                                                 security domain
                                   © Toufic Boubez - Layer 7 Technologies




                                                                                                                              11
24-10-2008




 The Standards:
 SAML, WS-Trust,
 WS-SecureConversation




Next Steps in SOA Security
 Portable, canonical assertions:
   SAML
 Token distribution:
   WS-Trust
 Sessions:
   WS-SecureConversation




               © Toufic Boubez - Layer 7 Technologies




                                                               12
24-10-2008




What is SAML?
 Security Assertion Markup Language

 “XML standard for exchanging authentication and
  authorization data between security domains”
  (Wikipedia)

 Cross-platform, XML-based, vendor-neutral
  standards for:
   Single Sign-On
   Issuing and communicating trusted identity claims and
    associated proofs

 Really multiple standards, assertions and various
  protocols and profiles



                  © Toufic Boubez - Layer 7 Technologies




SAML Assertions: What’s inside?
 A SAML assertion can have:

   Subject: who am I talking to (or about)?
   Authentication Statements: how was the Subject
    authenticated?
   Attribute Statements: what attributes does the
    Subject have?
   Authorization Decision Statements: what is the
    Subject permitted to do?
   Signature: who is making the statements about the
    Subject, and how can you decide whether to trust them?
   Unfortunately they're all optional, but in practice SAML
    Assertions will conform fairly closely to a few
    stereotypes.




                  © Toufic Boubez - Layer 7 Technologies




                                                                      13
24-10-2008




What is WS-Trust?
 Specifies an abstract protocol for exchanging
  security tokens with a Security Token Service
  (STS)
 Some examples of security tokens:
      UsernameTokens (login plus password or digest)
      SAML Assertions
      Encrypted symmetric keys (or partial keys)
      Security Context Tokens (WS-SecureConversation
       sessions)
 WS-Trust itself provides no concrete examples;
  use cases have come from:
    Informal but widespread consensus:
         Issuing SAML Assertions
    Other standards efforts:
         WS-SecureConversation / WS-SecureExchange




                      © Toufic Boubez - Layer 7 Technologies




WS-Trust and SAML: Typical Use Case
 Requester sends UsernameToken with username and
  password to Identity Provider STS in
  <RequestSecurityToken> message.

 STS authenticates credentials, issues signed SAML
  Assertion containing AuthenticationStatement, sends
  it back in <RequestSecurityTokenResponse>

 Requester caches SAML Assertion, includes it in SOAP
  Security Header of outbound messages

 Recipient verifies assertion signature, validates that
  signer is a trusted SAML issuer

 SAML Assertion can be re-used until it expires



                      © Toufic Boubez - Layer 7 Technologies




                                                                      14
24-10-2008




 <SOAP-ENV:Envelope>

   <SOAP-ENV:Header>

     <SAML:Assertion>



                                Statement 1
                                                                                           Issuing
                                                                                           Authority




                                     …
                                                                                           signature
                                                                                           covers
                                                                                           assertion and
                                                                                           binds
                                Statement n                                                statements
                                                                                           to Subject’s
                                                                                           public key

       <SubjectConfirmation>
            <KeyInfo>


       <ds:Signature>
                                                                  Issuing
                                                                  Authority




     <ds:Signature>         The key used in Subject’s signature                           Subject signs
                            across the message body is the analogue   Subject             its message
                            of the one bound into the assertion.



   <SOAP-ENV:BODY>


                                © Toufic Boubez - Layer 7 Technologies




The Mechanism: Global Trust of Local Tokens



                                                                                         Blue’s
                                                                                        Directory
Green’s                                                                                  Server
Identity
 Server




                                                                        SAML
                                     Trust


                     SAML

                                                                                2. Validate token
                                                                                here according to
                                                                                   trust model
     Michelle
           Dimitri
                                        1. Acquire trusted token with
                Program
                                      statement of authentication (and
                   X                        possibly authorization,
                                       entitlements, attributes) in this
                                               security domain
                                © Toufic Boubez - Layer 7 Technologies




                                                                                                                  15
24-10-2008




WS-Trust: Typical Token Validation Request
 <soapenv:Envelope>
   <soapenv:Body>
     <wst:RequestSecurityToken>
      <wst:Base>                                                      Incoming token
           <wsse:UsernameToken>
               <wsse:Username>testuser</wsse:Username>
               <wsse:Password Type="...#PasswordText">pass</wsse:Password>
           </wsse:UsernameToken>
       </wst:Base>
       <wst:Issuer>
         <wsa:Address>http://myemployer.example.com/</wsa:Address>
       </wst:Issuer>
                                                                  Issuer of Incoming token
       <wsp:AppliesTo>
         <wsa:EndpointReference>
           <wsa:Address>http://samlpart.com/sso</wsa:Address>
         </wsa:EndpointReference>
                                                                Scope of intended use
       </wsp:AppliesTo>
       <wst:RequestType>...Validate</wst:RequestType>
     </wst:RequestSecurityToken>
   </soapenv:Body>
 </soapenv:Envelope>
                                                                          What the STS should do with Incoming token




                                 © Toufic Boubez - Layer 7 Technologies




WS-Trust: Typical Token Response
<soapenv:Envelope>
  <soapenv:Body>
    <wst:RequestSecurityTokenResponse>
       <wst:RequestedSecurityToken>
         <saml:Assertion>
            <ds:Signature/>
         </saml:Assertion>
       </wst:RequestedSecurityToken>                    Returned Token
       <wst:RequestedTokenReference>
         <wss:KeyIdentifier ValueType="saml:Assertion">
            Assertion-uuidd0dad954-0101-e072-018a-b935cd071747
                   </wss:KeyIdentifier>
       </wst:RequestedTokenReference>
       <wst:Status>

   <wst:Code>http://schemas.xmlsoap.org/ws/2004/04/security/trust/status/valid</w
                                                                     WS-Security plumbing
   st:Code>
       </wst:Status>
     </wst:RequestSecurityTokenResponse>
  </soapenv:Body>
</soapenv:Envelope>




                                 © Toufic Boubez - Layer 7 Technologies




                                                                                                                              16
24-10-2008




WS-SecureConversation
 WS-Security provides security on a message by
  message basis.
 Frequently, there is a need to exchange
  multiple messages between consumer and
  provider in a single conversation.
 A Security Context is a convenient mechanism
  to provide a form of a session, without the
  need to generate new keys for every message.
 WS-SC provides a mechanism to generate and
  exchange a SecurityContextToken.
 The SCT can be used until it expires.
 SCT’s are requested and issued through specific
  WS-Trust bindings.




                © Toufic Boubez - Layer 7 Technologies




 What About Loose
 Coupling?




                                  © Toufic Boubez - Layer 7 Technologies




                                                                                  17
24-10-2008




The Potential of Web Services – A Governance
Nightmare?
                                                       SOAP over http
                               SOAP over http          XML encryption
                               AD based ACL            Digital Signature
                               Text logging            Guaranteed QoS
  Inventory    getLevel                                Non-repudiation audit logging



              update

Procurement
                                                                     SOAP over https
                                                                     LDAP based ACL
                                                                     Text logging
                       order


                               SOAP over http
                               XML encryption
                               Digital Signature
                               Guaranteed QoS
                               Non-repudiation audit logging




                           © Toufic Boubez - Layer 7 Technologies




How to Introduce Flexibility into a System
 Software engineering principles:
      Decouple the variable part of an
       implementation from the invariant part.
      Invariant is the business functionality of
       the Web service
      Variable is the layers of policy
      Introduce flexibility into the system
       through the use of policies:
           Decouple the policy part of Web services
            from the business logic part.



                           © Toufic Boubez - Layer 7 Technologies




                                                                                              18
24-10-2008




A Simple Analogy: Audio Systems




 Monolithic, proprietary              RCA Jack: standard
  design                                interfaces and data
                                        format; component
 Fixed architecture and                design
  capabilities                         Flexible architecture
 Vulnerable to                        Future-proof
  technology change                    Vendor-neutral
 Single-source vendor                 Competition drives
 Expensive                             prices down
                 © Toufic Boubez - Layer 7 Technologies




One Step Further: Professional Sound Systems




 Abstract out input                   Abstract out requester
  devices and output                    origination points and
  devices.                              provider endpoints.
 Syndicate a variety of               Syndicate a variety of
  inputs to a variety of                services to a variety
  outputs.                              of consumers.
 Complete control over                Complete control over
  input and output                      provider and
  parameters.                           consumer policies.

                 © Toufic Boubez - Layer 7 Technologies




                                                                        19
24-10-2008




From Business Drivers To Web Services: Reusable
Components Framework

 Business Drivers (Inputs)
 -Revenue/Profit                                                                Web Services
                                       Business Services
 -Market share                                                                  -getInventoryBySKU
                                       -Get Inventory Levels
 -Agility                                                                       -getInventoryByPC
                                       -Inventory Updates
                                       -Forecasting
                                       Business Services                        Web Services
 Business Service Types                -Get Customer Account                    -removeSKUItems
 -Inventory                            -Inventory Updates                       -addSKUItems
 -CRM                                  -Forecasting
 -HR                                                                            Web Services …
 -Accounting                           Business Services…
 -…




                                          Registry (MetaData)


                             Reusable Business Components Framework

                               © Toufic Boubez - Layer 7 Technologies




Corporate And Architecture Drivers: Runtime Policy
Framework

 Corporate Policy Drivers (Inputs)                          Corporate Architectural Drivers (Inputs)
 -Governance                                                -Flexibility and Reuse
 -Compliance                                                -Platform Independence
 -Security                                                  -Integration with existing infrastructure
                                                            -Security, Scalability, Availability, Performance

                    Security                SLA                     Reliability
                    -WS-Security            -Response Time          -WS-RM
                    -X509TokenProfile       -Availability           Platform
                    -SAMLTokenProfile       -IP Range, ToD          -Load Balancing
                    -XML Encryption         -Throughput Limits      -WS-Addressing
                    -XML Signatures         -Non-repudiation
                                            Transport                   Threat Protection
                    Message X-Form
                                            -HTTP                       -Schema Validation
                    -Versioning
                                            -TLS                        -Virus Scanning
                    -Localization
                                            -JMS                        -Attachments
                    -DS (ACORD, FIX)



                                          Registry (MetaData)


                                      Runtime Policy Framework

                               © Toufic Boubez - Layer 7 Technologies




                                                                                                                       20
24-10-2008




Joining The Two Frameworks:
Policy Driven SOA



               Reusable Business Components Framework




                                                                                                                                                                            Reusable Business Components Framework
                                                                                              Managed Communications Infrastructure
                                                        Runtime Policy Framework




                                                                                                                                                 Runtime Policy Framework


                                                             © Toufic Boubez - Layer 7 Technologies




Decoupling Policy in Practice:
The Policy Enforcement Point
                                                                                     WSDL
                                                                                   Document




                                                                                                                                            Policy
                                                                                                                                      Enforcement Point




                                                                                                                                                 Policy
                                                                                                                                               Document


                                                                                                                                                                                                                     Web Services
Web Services
                                                                                                                                           Policy                                                                      Provider
 Consumer
                                                                                                                                          Registry




                                                             © Toufic Boubez - Layer 7 Technologies




                                                                                                                                                                                                                                           21
24-10-2008




Decoupling Policy in Practice:
The Policy Application Point
         Policy            WSDL
       Application       Document
         Point
                                    Policy
                                  Conforming
                                    SOAP                    Policy
                                   Request
                                                      Enforcement Point




                                                                      Policy
                                                                    Document


                                                                                   Web Services
Web Services
                                                             Policy                  Provider
 Consumer
                                                            Registry

                          Signed
                           Policy
                         Document




                           © Toufic Boubez - Layer 7 Technologies




PEPs in the Architecture


                         Firewalls
                     (Perimeter PEPs)
                                                           Service           Service          Service
  External
  Service                                                  Endpoint         Endpoint          Endpoint
                                                             PEP              PEP               PEP

  External
  Service
                        Centralized                    Intermediary                         Intermediary
                          PEP                               PEP                                  PEP
  External
  Service
                                                           Endpoint         Endpoint          Endpoint
                           DMZ                               PEP              PEP               PEP
  External
  Service                                                  Service           Service          Service


                                                                     Courtesy: Anne Thomas Manes, Burton Group
                           © Toufic Boubez - Layer 7 Technologies




                                                                                                                        22
24-10-2008




Main WS-Policy Specifications
  WS-Policy
     Assertion framework to describe requirements and
      capabilities of a service, e.g. transport bindings, QoS
      requirements, etc.
     Sometimes known as WS-PolicyFramework.
  WS-PolicyAssertions
     A set of common message policy assertions related to
      language preferences, versioning and predicates.
  WS-SecurityPolicy
     Assertions, using the WS-Policy format, relevant to WS-
      Security.
     Model for other types of WS-*Policy to be defined by
      interest groups.
  WS-PolicyAttachment
     How to associate policy assertions to Web services
      descriptions in WSDL and UDDI




                       © Layer 7 Technologies




WS-Policy Example


<wsp:Policy xmlns:wsse="..." xmlns:wssx="...">
    <wsp:ExactlyOne>
        <wsp:All wsp:Usage="wsp:Required">
            <wsse:SecurityToken>
                <wsse:TokenType>wsse:Kerberosv5TGT</wsse:TokenType>
            </wsse:SecurityToken>
            <wssx:Privacy />
        </wsp:All>
        <wsp:All wsp:Usage="wsp:Required">
            <wsse:SecurityToken>
                <wsse:TokenType>wsse:UsernameToken</wsse:TokenType>
            </wsse:SecurityToken>
            <wssx:Audit />
        </wsp:All>
    </wsp:ExactlyOne>
</wsp:Policy>




                       © Layer 7 Technologies




                                                                             23
24-10-2008




Conclusions
 Security, Identity are becoming increasingly
  important as organizations move to SOA
   Cross-domain, distributed services
   Increased regulations
 Move from transport-based to message-based
  security necessitates a new set of standards:
     WS-Security
     SAML
     WS-Trust
     WS-Policy
 Loose coupling necessitates separating business
  logic from policy infrastructure:
   The emergence of Policy Enforcement Points




                    © Toufic Boubez - Layer 7 Technologies




Some References on WS-*
 WS-Security:
   http://www.oasis-
    open.org/committees/tc_home.php?wg_abbrev=wss
 WS-SecureExchange (WS-SX):
   http://www.oasis-
    open.org/committees/tc_home.php?wg_abbrev=ws-sx
 W3C WS-Policy Workgroup
   http://www.w3.org/TR/WS-Policy/

"Policy-It's More Than Just Security“,
T. Boubez, S. Morrison, M. Hondo, XML Journal
 http://www.sys-con.com/xml/article.cfm?id=772




                    © Toufic Boubez - Layer 7 Technologies




                                                                    24
24-10-2008




Thanks!
 Thank you very much for making it
  through!
 Email questions or comments or
  presentation requests to:
   tboubez@layer7tech.com




            © Toufic Boubez - Layer 7 Technologies




                                                            25

Mais conteúdo relacionado

Destaque

Vincenzo Ferrucci Lessons Learned
Vincenzo  Ferrucci  Lessons LearnedVincenzo  Ferrucci  Lessons Learned
Vincenzo Ferrucci Lessons LearnedSOA Symposium
 
Chris Madrid Master Data Management
Chris  Madrid    Master Data ManagementChris  Madrid    Master Data Management
Chris Madrid Master Data ManagementSOA Symposium
 
Kevin Liu Peter Mc Nulty Best Practices V2
Kevin  Liu  Peter Mc Nulty    Best  Practices V2Kevin  Liu  Peter Mc Nulty    Best  Practices V2
Kevin Liu Peter Mc Nulty Best Practices V2SOA Symposium
 
Edwin Vd Sanden Composite Applications For Users
Edwin Vd Sanden     Composite Applications For UsersEdwin Vd Sanden     Composite Applications For Users
Edwin Vd Sanden Composite Applications For UsersSOA Symposium
 
Andre Tost E S B Ref Arch
Andre  Tost    E S B Ref ArchAndre  Tost    E S B Ref Arch
Andre Tost E S B Ref ArchSOA Symposium
 
Anne Thomas Manes S O A Fatigue
Anne  Thomas Manes    S O A  FatigueAnne  Thomas Manes    S O A  Fatigue
Anne Thomas Manes S O A FatigueSOA Symposium
 
Paul C Brown S O A Governance
Paul  C  Brown    S O A  GovernancePaul  C  Brown    S O A  Governance
Paul C Brown S O A GovernanceSOA Symposium
 
Enrique Castro Leon Scaling Delivery Of I T Services
Enrique  Castro Leon    Scaling  Delivery Of  I T ServicesEnrique  Castro Leon    Scaling  Delivery Of  I T Services
Enrique Castro Leon Scaling Delivery Of I T ServicesSOA Symposium
 
Dennis Wisnosky Cross Talk Presentation D Wiz 09262008 For Publication
Dennis  Wisnosky    Cross Talk  Presentation  D Wiz 09262008  For  PublicationDennis  Wisnosky    Cross Talk  Presentation  D Wiz 09262008  For  Publication
Dennis Wisnosky Cross Talk Presentation D Wiz 09262008 For PublicationSOA Symposium
 
Arnaud Simon Flight Data Processing
Arnaud  Simon    Flight  Data ProcessingArnaud  Simon    Flight  Data Processing
Arnaud Simon Flight Data ProcessingSOA Symposium
 
Jim Webber R E S Tful Services
Jim  Webber    R E S Tful  ServicesJim  Webber    R E S Tful  Services
Jim Webber R E S Tful ServicesSOA Symposium
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1bSOA Symposium
 

Destaque (12)

Vincenzo Ferrucci Lessons Learned
Vincenzo  Ferrucci  Lessons LearnedVincenzo  Ferrucci  Lessons Learned
Vincenzo Ferrucci Lessons Learned
 
Chris Madrid Master Data Management
Chris  Madrid    Master Data ManagementChris  Madrid    Master Data Management
Chris Madrid Master Data Management
 
Kevin Liu Peter Mc Nulty Best Practices V2
Kevin  Liu  Peter Mc Nulty    Best  Practices V2Kevin  Liu  Peter Mc Nulty    Best  Practices V2
Kevin Liu Peter Mc Nulty Best Practices V2
 
Edwin Vd Sanden Composite Applications For Users
Edwin Vd Sanden     Composite Applications For UsersEdwin Vd Sanden     Composite Applications For Users
Edwin Vd Sanden Composite Applications For Users
 
Andre Tost E S B Ref Arch
Andre  Tost    E S B Ref ArchAndre  Tost    E S B Ref Arch
Andre Tost E S B Ref Arch
 
Anne Thomas Manes S O A Fatigue
Anne  Thomas Manes    S O A  FatigueAnne  Thomas Manes    S O A  Fatigue
Anne Thomas Manes S O A Fatigue
 
Paul C Brown S O A Governance
Paul  C  Brown    S O A  GovernancePaul  C  Brown    S O A  Governance
Paul C Brown S O A Governance
 
Enrique Castro Leon Scaling Delivery Of I T Services
Enrique  Castro Leon    Scaling  Delivery Of  I T ServicesEnrique  Castro Leon    Scaling  Delivery Of  I T Services
Enrique Castro Leon Scaling Delivery Of I T Services
 
Dennis Wisnosky Cross Talk Presentation D Wiz 09262008 For Publication
Dennis  Wisnosky    Cross Talk  Presentation  D Wiz 09262008  For  PublicationDennis  Wisnosky    Cross Talk  Presentation  D Wiz 09262008  For  Publication
Dennis Wisnosky Cross Talk Presentation D Wiz 09262008 For Publication
 
Arnaud Simon Flight Data Processing
Arnaud  Simon    Flight  Data ProcessingArnaud  Simon    Flight  Data Processing
Arnaud Simon Flight Data Processing
 
Jim Webber R E S Tful Services
Jim  Webber    R E S Tful  ServicesJim  Webber    R E S Tful  Services
Jim Webber R E S Tful Services
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1b
 

Semelhante a Toufic Boubez The Future Of S O A Security

apidays LIVE New York 2021 - Supercharge microservices with Service Mesh by S...
apidays LIVE New York 2021 - Supercharge microservices with Service Mesh by S...apidays LIVE New York 2021 - Supercharge microservices with Service Mesh by S...
apidays LIVE New York 2021 - Supercharge microservices with Service Mesh by S...apidays
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellCA API Management
 
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021StreamNative
 
Stott May Presentation
Stott May PresentationStott May Presentation
Stott May Presentationcaoimheos
 
MQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and TomorrowMQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and TomorrowProlifics
 
Apache CXF Security Solutions
Apache CXF Security SolutionsApache CXF Security Solutions
Apache CXF Security SolutionsDaniel Kulp
 
SUGCON EU 2023 - Secure Composable SaaS.pptx
SUGCON EU 2023 - Secure Composable SaaS.pptxSUGCON EU 2023 - Secure Composable SaaS.pptx
SUGCON EU 2023 - Secure Composable SaaS.pptxVasiliy Fomichev
 
Presentation a hitchhiker’s guide to the inter-cloud
Presentation   a hitchhiker’s guide to the inter-cloudPresentation   a hitchhiker’s guide to the inter-cloud
Presentation a hitchhiker’s guide to the inter-cloudxKinAnx
 
Istio Service Mesh
Istio Service MeshIstio Service Mesh
Istio Service MeshLew Tucker
 
Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008Jamie Clark
 
Cisco storageconnectfordummies
Cisco storageconnectfordummiesCisco storageconnectfordummies
Cisco storageconnectfordummiesrosegrif1
 
Camelone-2012 HTML5 WebSocket ActiveMQ/Camel
Camelone-2012 HTML5 WebSocket ActiveMQ/CamelCamelone-2012 HTML5 WebSocket ActiveMQ/Camel
Camelone-2012 HTML5 WebSocket ActiveMQ/CamelCharles Moulliard
 
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...Weaveworks
 
Media mosa architecture - features -10 june 2010
Media mosa   architecture - features -10 june 2010Media mosa   architecture - features -10 june 2010
Media mosa architecture - features -10 june 2010Andrii Podanenko
 

Semelhante a Toufic Boubez The Future Of S O A Security (20)

apidays LIVE New York 2021 - Supercharge microservices with Service Mesh by S...
apidays LIVE New York 2021 - Supercharge microservices with Service Mesh by S...apidays LIVE New York 2021 - Supercharge microservices with Service Mesh by S...
apidays LIVE New York 2021 - Supercharge microservices with Service Mesh by S...
 
07 advanced topics
07 advanced topics07 advanced topics
07 advanced topics
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
 
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021
A Pulsar Use Case In Federated Learning - Pulsar Summit NA 2021
 
Soa And Web Services Security
Soa And Web Services SecuritySoa And Web Services Security
Soa And Web Services Security
 
OpenSSO Tech Overview Aquarium
OpenSSO Tech Overview AquariumOpenSSO Tech Overview Aquarium
OpenSSO Tech Overview Aquarium
 
Net Services
Net ServicesNet Services
Net Services
 
End to End Security with MVC and Web API
End to End Security with MVC and Web APIEnd to End Security with MVC and Web API
End to End Security with MVC and Web API
 
Stott May Presentation
Stott May PresentationStott May Presentation
Stott May Presentation
 
MQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and TomorrowMQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and Tomorrow
 
Apache CXF Security Solutions
Apache CXF Security SolutionsApache CXF Security Solutions
Apache CXF Security Solutions
 
SUGCON EU 2023 - Secure Composable SaaS.pptx
SUGCON EU 2023 - Secure Composable SaaS.pptxSUGCON EU 2023 - Secure Composable SaaS.pptx
SUGCON EU 2023 - Secure Composable SaaS.pptx
 
Presentation a hitchhiker’s guide to the inter-cloud
Presentation   a hitchhiker’s guide to the inter-cloudPresentation   a hitchhiker’s guide to the inter-cloud
Presentation a hitchhiker’s guide to the inter-cloud
 
Istio Service Mesh
Istio Service MeshIstio Service Mesh
Istio Service Mesh
 
App Security with Keycloak and Quarkus
App Security with Keycloak and QuarkusApp Security with Keycloak and Quarkus
App Security with Keycloak and Quarkus
 
Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008Ontolog Forum: Semantic Interop March 2008
Ontolog Forum: Semantic Interop March 2008
 
Cisco storageconnectfordummies
Cisco storageconnectfordummiesCisco storageconnectfordummies
Cisco storageconnectfordummies
 
Camelone-2012 HTML5 WebSocket ActiveMQ/Camel
Camelone-2012 HTML5 WebSocket ActiveMQ/CamelCamelone-2012 HTML5 WebSocket ActiveMQ/Camel
Camelone-2012 HTML5 WebSocket ActiveMQ/Camel
 
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
 
Media mosa architecture - features -10 june 2010
Media mosa   architecture - features -10 june 2010Media mosa   architecture - features -10 june 2010
Media mosa architecture - features -10 june 2010
 

Mais de SOA Symposium

Sven Hakan Olsson Composability Index V2
Sven Hakan Olsson    Composability  Index V2Sven Hakan Olsson    Composability  Index V2
Sven Hakan Olsson Composability Index V2SOA Symposium
 
Thomas Erl Introducing S O A Design Patterns
Thomas  Erl    Introducing  S O A  Design  PatternsThomas  Erl    Introducing  S O A  Design  Patterns
Thomas Erl Introducing S O A Design PatternsSOA Symposium
 
Radovan Janecek Avoiding S O A Pitfalls
Radovan  Janecek   Avoiding  S O A  PitfallsRadovan  Janecek   Avoiding  S O A  Pitfalls
Radovan Janecek Avoiding S O A PitfallsSOA Symposium
 
Natasja Paulssen S A P M D M And E S O A At Philips
Natasja  Paulssen    S A P  M D M And E S O A At  PhilipsNatasja  Paulssen    S A P  M D M And E S O A At  Philips
Natasja Paulssen S A P M D M And E S O A At PhilipsSOA Symposium
 
Anthony Carrato S O A Business Architecture
Anthony  Carrato    S O A  Business  ArchitectureAnthony  Carrato    S O A  Business  Architecture
Anthony Carrato S O A Business ArchitectureSOA Symposium
 
David Chappel S O A Grid
David  Chappel    S O A  GridDavid  Chappel    S O A  Grid
David Chappel S O A GridSOA Symposium
 
Johan Kumps Federal E S B
Johan  Kumps    Federal  E S BJohan  Kumps    Federal  E S B
Johan Kumps Federal E S BSOA Symposium
 
Laurent Tarin B P M Ilog
Laurent  Tarin    B P M  IlogLaurent  Tarin    B P M  Ilog
Laurent Tarin B P M IlogSOA Symposium
 
Jim Webber Guerrilla S O A With Web Services
Jim Webber    Guerrilla  S O A With  Web  ServicesJim Webber    Guerrilla  S O A With  Web  Services
Jim Webber Guerrilla S O A With Web ServicesSOA Symposium
 
Robert Schneider What Every Developer
Robert  Schneider    What Every DeveloperRobert  Schneider    What Every Developer
Robert Schneider What Every DeveloperSOA Symposium
 
Robert Schneider 10 Strategies
Robert  Schneider   10  StrategiesRobert  Schneider   10  Strategies
Robert Schneider 10 StrategiesSOA Symposium
 
Thomas Rischbeck Real Life E S B
Thomas  Rischbeck    Real  Life  E S BThomas  Rischbeck    Real  Life  E S B
Thomas Rischbeck Real Life E S BSOA Symposium
 
Stefan Pappe Making S O A Operational
Stefan  Pappe    Making  S O A  OperationalStefan  Pappe    Making  S O A  Operational
Stefan Pappe Making S O A OperationalSOA Symposium
 
Paul Brown Org Man Issues
Paul  Brown    Org  Man  IssuesPaul  Brown    Org  Man  Issues
Paul Brown Org Man IssuesSOA Symposium
 
Paul Butterworth Policy Based Approach
Paul  Butterworth    Policy  Based  ApproachPaul  Butterworth    Policy  Based  Approach
Paul Butterworth Policy Based ApproachSOA Symposium
 
Mark Little Web Services And Transactions
Mark  Little    Web  Services And  TransactionsMark  Little    Web  Services And  Transactions
Mark Little Web Services And TransactionsSOA Symposium
 
S Ven Hakan Olsson Compos Index
S Ven  Hakan  Olsson    Compos IndexS Ven  Hakan  Olsson    Compos Index
S Ven Hakan Olsson Compos IndexSOA Symposium
 
Art Ligthart Service Identification Techniques
Art  Ligthart    Service  Identification  TechniquesArt  Ligthart    Service  Identification  Techniques
Art Ligthart Service Identification TechniquesSOA Symposium
 
Mohamad Afshar Moving Beyond Project Level S O A V1
Mohamad  Afshar    Moving Beyond Project Level S O A V1Mohamad  Afshar    Moving Beyond Project Level S O A V1
Mohamad Afshar Moving Beyond Project Level S O A V1SOA Symposium
 
Brian Loesgen An Early Look At Oslo
Brian  Loesgen    An  Early  Look At  OsloBrian  Loesgen    An  Early  Look At  Oslo
Brian Loesgen An Early Look At OsloSOA Symposium
 

Mais de SOA Symposium (20)

Sven Hakan Olsson Composability Index V2
Sven Hakan Olsson    Composability  Index V2Sven Hakan Olsson    Composability  Index V2
Sven Hakan Olsson Composability Index V2
 
Thomas Erl Introducing S O A Design Patterns
Thomas  Erl    Introducing  S O A  Design  PatternsThomas  Erl    Introducing  S O A  Design  Patterns
Thomas Erl Introducing S O A Design Patterns
 
Radovan Janecek Avoiding S O A Pitfalls
Radovan  Janecek   Avoiding  S O A  PitfallsRadovan  Janecek   Avoiding  S O A  Pitfalls
Radovan Janecek Avoiding S O A Pitfalls
 
Natasja Paulssen S A P M D M And E S O A At Philips
Natasja  Paulssen    S A P  M D M And E S O A At  PhilipsNatasja  Paulssen    S A P  M D M And E S O A At  Philips
Natasja Paulssen S A P M D M And E S O A At Philips
 
Anthony Carrato S O A Business Architecture
Anthony  Carrato    S O A  Business  ArchitectureAnthony  Carrato    S O A  Business  Architecture
Anthony Carrato S O A Business Architecture
 
David Chappel S O A Grid
David  Chappel    S O A  GridDavid  Chappel    S O A  Grid
David Chappel S O A Grid
 
Johan Kumps Federal E S B
Johan  Kumps    Federal  E S BJohan  Kumps    Federal  E S B
Johan Kumps Federal E S B
 
Laurent Tarin B P M Ilog
Laurent  Tarin    B P M  IlogLaurent  Tarin    B P M  Ilog
Laurent Tarin B P M Ilog
 
Jim Webber Guerrilla S O A With Web Services
Jim Webber    Guerrilla  S O A With  Web  ServicesJim Webber    Guerrilla  S O A With  Web  Services
Jim Webber Guerrilla S O A With Web Services
 
Robert Schneider What Every Developer
Robert  Schneider    What Every DeveloperRobert  Schneider    What Every Developer
Robert Schneider What Every Developer
 
Robert Schneider 10 Strategies
Robert  Schneider   10  StrategiesRobert  Schneider   10  Strategies
Robert Schneider 10 Strategies
 
Thomas Rischbeck Real Life E S B
Thomas  Rischbeck    Real  Life  E S BThomas  Rischbeck    Real  Life  E S B
Thomas Rischbeck Real Life E S B
 
Stefan Pappe Making S O A Operational
Stefan  Pappe    Making  S O A  OperationalStefan  Pappe    Making  S O A  Operational
Stefan Pappe Making S O A Operational
 
Paul Brown Org Man Issues
Paul  Brown    Org  Man  IssuesPaul  Brown    Org  Man  Issues
Paul Brown Org Man Issues
 
Paul Butterworth Policy Based Approach
Paul  Butterworth    Policy  Based  ApproachPaul  Butterworth    Policy  Based  Approach
Paul Butterworth Policy Based Approach
 
Mark Little Web Services And Transactions
Mark  Little    Web  Services And  TransactionsMark  Little    Web  Services And  Transactions
Mark Little Web Services And Transactions
 
S Ven Hakan Olsson Compos Index
S Ven  Hakan  Olsson    Compos IndexS Ven  Hakan  Olsson    Compos Index
S Ven Hakan Olsson Compos Index
 
Art Ligthart Service Identification Techniques
Art  Ligthart    Service  Identification  TechniquesArt  Ligthart    Service  Identification  Techniques
Art Ligthart Service Identification Techniques
 
Mohamad Afshar Moving Beyond Project Level S O A V1
Mohamad  Afshar    Moving Beyond Project Level S O A V1Mohamad  Afshar    Moving Beyond Project Level S O A V1
Mohamad Afshar Moving Beyond Project Level S O A V1
 
Brian Loesgen An Early Look At Oslo
Brian  Loesgen    An  Early  Look At  OsloBrian  Loesgen    An  Early  Look At  Oslo
Brian Loesgen An Early Look At Oslo
 

Último

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Último (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Toufic Boubez The Future Of S O A Security

  • 1. 24-10-2008 This Presentation Courtesy of the International SOA Symposium October 7-8, 2008 Amsterdam Arena www.soasymposium.com info@soasymposium.com Founding Sponsors Platinum Sponsors Gold Sponsors Silver Sponsors The Future of SOA Security (as far as I can guess) Toufic Boubez, Ph.D. Chief Technology Officer Layer 7 Technologies tboubez@layer7tech.com www.layer7tech.com 1
  • 2. 24-10-2008 Agenda  LOTS of material to cover!!  No time for Agenda!! © Toufic Boubez - Layer 7 Technologies Speaker Introduction  Current:  Layer 7 Co-Founder and Chief Technology Officer.  Co-Editor: WS-Policy W3C Work Group  Co-Author: WS-Trust, WS-SecureConversation, WS-Federation.  OASIS WS-RM TC, WS-SX TC  Books: Building Web Services with Java (12/2001), Java P2P Unleashed (8/2002).  Background:  IBM Lead Architect for Web Services.  IBM Lead Architect for Web Services Toolkit.  Co-Author of UDDI V1 specification.  Technical Chair/Track Chair for the XML Web Services One Conferences.  OASIS WS-Security TC, UDDI TC, SAML TC, WS-I Sample Apps WG  IBM technical lead for UN/OASIS ebXML. © Toufic Boubez - Layer 7 Technologies 2
  • 3. 24-10-2008 Drivers for SOA  Growth and increased productivity:  Inside the organization, EAI (Enterprise Application Integration) is essential for increased productivity;  Outside the organization, integration with partners is essential for growth.  Flexibility and agility:  Easily integrate disparate internal and external resources and functionalities as needed;  Easily add and change integrations with business partners;  Easily add and change IT platforms – avoid vendor lock-in;  Runtime Configurable Models.  Just-in-time integration as required:  Loose coupling as a fundamental architectural principle. © Toufic Boubez - Layer 7 Technologies Scenario: Fluid Communities Of Interest Situation 1 Organization A Organization B Organization C Situation 2 © Toufic Boubez - Layer 7 Technologies 3
  • 4. 24-10-2008 Issues: Runtime Constraints and Capabilities Situation 1 Organization A Organization B Identity Transport Trust API/Syntax Security Description Platform Discovery Auth/Auth Semantics Availability Context Response Organization C © Toufic Boubez - Layer 7 Technologies Theory vs. Practice  Web Services technology will solve these problems (will it?)  In theory, theory and practice are the same.  In practice, they're not!  Two major issues:  All kidding aside, why would I expose my backend systems on the Web? Security, Privacy, Reliability … anyone? anyone?  So, whatever happened to loose coupling? © Toufic Boubez - Layer 7 Technologies 4
  • 5. 24-10-2008 Dealing with Security © Toufic Boubez - Layer 7 Technologies Fundamentals of Security ISO 7498-2, 10181 © Layer 7 Technologies 5
  • 6. 24-10-2008 The Present: Essential Security Requirements for SOA  SOA brings new requirements:  Messages may pass through multiple transports/hops  Can’t rely on transport security  Can’t rely on socket continuity  At any intermediary, certain parts of the message may need to be processed  Only encrypt what we need to support the security policy Web Services Security © Layer 7 Technologies 11 The Present: New Security Model for SOA  SOA necessitates a new security model:  Need to decouple security from transport  Need to include security information in the message:  Credentials or tokens for AuthN/AuthZ  Encryption of message parts  Signing of message parts Web Services Security © Layer 7 Technologies 12 6
  • 7. 24-10-2008 WS-Security  The security architecture for Web services  Defines SOAP security headers:  Tokens:  Binary Tokens (X.509)  Username, SAML, Kerberos  Encryption of message whole or parts  Signing of message whole or parts  Unifying standard that brings together a number of standards efforts, defining how they are to be used in SOAP messaging  Eg: W3C XML encryption, c14n, and digital signatures, OASIS SAML, etc. © Toufic Boubez - Layer 7 Technologies <SOAP-ENV:Envelope> <SOAP-ENV:Header> <wsse:Security> <wsu:TimeStamp> Web Service Server Certificate <wsse:BinarySecurityToken> <xenc:EncryptedKey> Reference <ds:KeyInfo> Encrypt <xenc:EncryptedData> <xenc:DataReference> Web Service Client Certificate <ds:Signature> Copy of <ds:Reference> <ds:Reference> Sign <ds:KeyInfo> <SOAP-ENV:Body> <xenc:EncryptedData> © Toufic Boubez - Layer 7 Technologies 7
  • 8. 24-10-2008 What’s Next: Dealing with Identity and Trust What’s Missing From WS-Security?  We now have a basic mechanism to secure SOAP messages on a one-by-one basis.  Key questions:  Where do the tokens come from?  What if I don’t want to propagate identities?  What I need additional information to make authorization decisions?  What if the message exchange pattern requires more than one request and response pair?  Missing:  Portable identity, entitlements, attributes  Trust, federation, token distribution  Sessions © Toufic Boubez - Layer 7 Technologies 8
  • 9. 24-10-2008 The Two Sides of SOA  SOA brings new challenges:  The combination of loose coupling and distributed resources, both fundamental SOA tenets, are a double edged sword – along with the potential for much greater IT flexibility and business agility, they bring the potential for harder oversight.  New regulatory environment that requires much more stringent oversight, monitoring and enforcement of corporate and IT governance policies:  SOX, HIPAA, etc.  Cross industries: Financial, Health, etc.  Non-compliance is expensive; also involves personal responsibility for executives. © Toufic Boubez - Layer 7 Technologies Identity Requirements for Policy Compliance Monitoring  Identity: Who?  can access information;  has accessed information;  owns information;  is subject of information;  has performed action.  Audit:  Identity-based audit trail.  Policy:  Framework of identity centric corporate security and privacy rules.  Trust:  How to establish loosely coupled trust between disparate organizations? © Toufic Boubez - Layer 7 Technologies 9
  • 10. 24-10-2008 The Federation Challenge in Web Services Islands of Blue’s Server Identity Blue’s Directory Green’s Server Directory Server Firewall Green’s Client Alex Scott Francis Organization Blue Need to share not only Michelle authentication and authorization Dimitri Organization information, but also identity Program Green attribute information X Big privacy and confidentiality issues… © Toufic Boubez - Layer 7 Technologies What Hasn’t Worked in the Past Issues • Online access through firewall mazes • Latency in replication • People leave, fired, etc Blue’s Directory Green’s Server Remote Directory Directory Server Firewall Access Organization Blue Directory Synchronization Michelle Dimitri Organization Program Green X © Toufic Boubez - Layer 7 Technologies 10
  • 11. 24-10-2008 What We Really Need is Effective Separation of Concerns Authentication Blue’s Directory Green’s Server Directory Server Authorization Trust Organization Blue Core Requirements Michelle • Build dynamic trust relationships Dimitri • Transport the security context so that Organization authentication and authorization can be Program Green X distributed • Enforce privacy issues • Time out sessions/global logout © Toufic Boubez - Layer 7 Technologies The Mechanism: Global Trust of Local Tokens Blue’s Directory Green’s Server Identity Server Trust 2. Validate token here according to trust model Michelle Dimitri 1. Acquire trusted token with Program statement of authentication (and X possibly authorization, entitlements, attributes) in this security domain © Toufic Boubez - Layer 7 Technologies 11
  • 12. 24-10-2008 The Standards: SAML, WS-Trust, WS-SecureConversation Next Steps in SOA Security  Portable, canonical assertions:  SAML  Token distribution:  WS-Trust  Sessions:  WS-SecureConversation © Toufic Boubez - Layer 7 Technologies 12
  • 13. 24-10-2008 What is SAML?  Security Assertion Markup Language  “XML standard for exchanging authentication and authorization data between security domains” (Wikipedia)  Cross-platform, XML-based, vendor-neutral standards for:  Single Sign-On  Issuing and communicating trusted identity claims and associated proofs  Really multiple standards, assertions and various protocols and profiles © Toufic Boubez - Layer 7 Technologies SAML Assertions: What’s inside?  A SAML assertion can have:  Subject: who am I talking to (or about)?  Authentication Statements: how was the Subject authenticated?  Attribute Statements: what attributes does the Subject have?  Authorization Decision Statements: what is the Subject permitted to do?  Signature: who is making the statements about the Subject, and how can you decide whether to trust them?  Unfortunately they're all optional, but in practice SAML Assertions will conform fairly closely to a few stereotypes. © Toufic Boubez - Layer 7 Technologies 13
  • 14. 24-10-2008 What is WS-Trust?  Specifies an abstract protocol for exchanging security tokens with a Security Token Service (STS)  Some examples of security tokens:  UsernameTokens (login plus password or digest)  SAML Assertions  Encrypted symmetric keys (or partial keys)  Security Context Tokens (WS-SecureConversation sessions)  WS-Trust itself provides no concrete examples; use cases have come from:  Informal but widespread consensus:  Issuing SAML Assertions  Other standards efforts:  WS-SecureConversation / WS-SecureExchange © Toufic Boubez - Layer 7 Technologies WS-Trust and SAML: Typical Use Case  Requester sends UsernameToken with username and password to Identity Provider STS in <RequestSecurityToken> message.  STS authenticates credentials, issues signed SAML Assertion containing AuthenticationStatement, sends it back in <RequestSecurityTokenResponse>  Requester caches SAML Assertion, includes it in SOAP Security Header of outbound messages  Recipient verifies assertion signature, validates that signer is a trusted SAML issuer  SAML Assertion can be re-used until it expires © Toufic Boubez - Layer 7 Technologies 14
  • 15. 24-10-2008 <SOAP-ENV:Envelope> <SOAP-ENV:Header> <SAML:Assertion> Statement 1 Issuing Authority … signature covers assertion and binds Statement n statements to Subject’s public key <SubjectConfirmation> <KeyInfo> <ds:Signature> Issuing Authority <ds:Signature> The key used in Subject’s signature Subject signs across the message body is the analogue Subject its message of the one bound into the assertion. <SOAP-ENV:BODY> © Toufic Boubez - Layer 7 Technologies The Mechanism: Global Trust of Local Tokens Blue’s Directory Green’s Server Identity Server SAML Trust SAML 2. Validate token here according to trust model Michelle Dimitri 1. Acquire trusted token with Program statement of authentication (and X possibly authorization, entitlements, attributes) in this security domain © Toufic Boubez - Layer 7 Technologies 15
  • 16. 24-10-2008 WS-Trust: Typical Token Validation Request <soapenv:Envelope> <soapenv:Body> <wst:RequestSecurityToken> <wst:Base> Incoming token <wsse:UsernameToken> <wsse:Username>testuser</wsse:Username> <wsse:Password Type="...#PasswordText">pass</wsse:Password> </wsse:UsernameToken> </wst:Base> <wst:Issuer> <wsa:Address>http://myemployer.example.com/</wsa:Address> </wst:Issuer> Issuer of Incoming token <wsp:AppliesTo> <wsa:EndpointReference> <wsa:Address>http://samlpart.com/sso</wsa:Address> </wsa:EndpointReference> Scope of intended use </wsp:AppliesTo> <wst:RequestType>...Validate</wst:RequestType> </wst:RequestSecurityToken> </soapenv:Body> </soapenv:Envelope> What the STS should do with Incoming token © Toufic Boubez - Layer 7 Technologies WS-Trust: Typical Token Response <soapenv:Envelope> <soapenv:Body> <wst:RequestSecurityTokenResponse> <wst:RequestedSecurityToken> <saml:Assertion> <ds:Signature/> </saml:Assertion> </wst:RequestedSecurityToken> Returned Token <wst:RequestedTokenReference> <wss:KeyIdentifier ValueType="saml:Assertion"> Assertion-uuidd0dad954-0101-e072-018a-b935cd071747 </wss:KeyIdentifier> </wst:RequestedTokenReference> <wst:Status> <wst:Code>http://schemas.xmlsoap.org/ws/2004/04/security/trust/status/valid</w WS-Security plumbing st:Code> </wst:Status> </wst:RequestSecurityTokenResponse> </soapenv:Body> </soapenv:Envelope> © Toufic Boubez - Layer 7 Technologies 16
  • 17. 24-10-2008 WS-SecureConversation  WS-Security provides security on a message by message basis.  Frequently, there is a need to exchange multiple messages between consumer and provider in a single conversation.  A Security Context is a convenient mechanism to provide a form of a session, without the need to generate new keys for every message.  WS-SC provides a mechanism to generate and exchange a SecurityContextToken.  The SCT can be used until it expires.  SCT’s are requested and issued through specific WS-Trust bindings. © Toufic Boubez - Layer 7 Technologies What About Loose Coupling? © Toufic Boubez - Layer 7 Technologies 17
  • 18. 24-10-2008 The Potential of Web Services – A Governance Nightmare? SOAP over http SOAP over http XML encryption AD based ACL Digital Signature Text logging Guaranteed QoS Inventory getLevel Non-repudiation audit logging update Procurement SOAP over https LDAP based ACL Text logging order SOAP over http XML encryption Digital Signature Guaranteed QoS Non-repudiation audit logging © Toufic Boubez - Layer 7 Technologies How to Introduce Flexibility into a System  Software engineering principles:  Decouple the variable part of an implementation from the invariant part.  Invariant is the business functionality of the Web service  Variable is the layers of policy  Introduce flexibility into the system through the use of policies:  Decouple the policy part of Web services from the business logic part. © Toufic Boubez - Layer 7 Technologies 18
  • 19. 24-10-2008 A Simple Analogy: Audio Systems  Monolithic, proprietary  RCA Jack: standard design interfaces and data format; component  Fixed architecture and design capabilities  Flexible architecture  Vulnerable to  Future-proof technology change  Vendor-neutral  Single-source vendor  Competition drives  Expensive prices down © Toufic Boubez - Layer 7 Technologies One Step Further: Professional Sound Systems  Abstract out input  Abstract out requester devices and output origination points and devices. provider endpoints.  Syndicate a variety of  Syndicate a variety of inputs to a variety of services to a variety outputs. of consumers.  Complete control over  Complete control over input and output provider and parameters. consumer policies. © Toufic Boubez - Layer 7 Technologies 19
  • 20. 24-10-2008 From Business Drivers To Web Services: Reusable Components Framework Business Drivers (Inputs) -Revenue/Profit Web Services Business Services -Market share -getInventoryBySKU -Get Inventory Levels -Agility -getInventoryByPC -Inventory Updates -Forecasting Business Services Web Services Business Service Types -Get Customer Account -removeSKUItems -Inventory -Inventory Updates -addSKUItems -CRM -Forecasting -HR Web Services … -Accounting Business Services… -… Registry (MetaData) Reusable Business Components Framework © Toufic Boubez - Layer 7 Technologies Corporate And Architecture Drivers: Runtime Policy Framework Corporate Policy Drivers (Inputs) Corporate Architectural Drivers (Inputs) -Governance -Flexibility and Reuse -Compliance -Platform Independence -Security -Integration with existing infrastructure -Security, Scalability, Availability, Performance Security SLA Reliability -WS-Security -Response Time -WS-RM -X509TokenProfile -Availability Platform -SAMLTokenProfile -IP Range, ToD -Load Balancing -XML Encryption -Throughput Limits -WS-Addressing -XML Signatures -Non-repudiation Transport Threat Protection Message X-Form -HTTP -Schema Validation -Versioning -TLS -Virus Scanning -Localization -JMS -Attachments -DS (ACORD, FIX) Registry (MetaData) Runtime Policy Framework © Toufic Boubez - Layer 7 Technologies 20
  • 21. 24-10-2008 Joining The Two Frameworks: Policy Driven SOA Reusable Business Components Framework Reusable Business Components Framework Managed Communications Infrastructure Runtime Policy Framework Runtime Policy Framework © Toufic Boubez - Layer 7 Technologies Decoupling Policy in Practice: The Policy Enforcement Point WSDL Document Policy Enforcement Point Policy Document Web Services Web Services Policy Provider Consumer Registry © Toufic Boubez - Layer 7 Technologies 21
  • 22. 24-10-2008 Decoupling Policy in Practice: The Policy Application Point Policy WSDL Application Document Point Policy Conforming SOAP Policy Request Enforcement Point Policy Document Web Services Web Services Policy Provider Consumer Registry Signed Policy Document © Toufic Boubez - Layer 7 Technologies PEPs in the Architecture Firewalls (Perimeter PEPs) Service Service Service External Service Endpoint Endpoint Endpoint PEP PEP PEP External Service Centralized Intermediary Intermediary PEP PEP PEP External Service Endpoint Endpoint Endpoint DMZ PEP PEP PEP External Service Service Service Service Courtesy: Anne Thomas Manes, Burton Group © Toufic Boubez - Layer 7 Technologies 22
  • 23. 24-10-2008 Main WS-Policy Specifications  WS-Policy  Assertion framework to describe requirements and capabilities of a service, e.g. transport bindings, QoS requirements, etc.  Sometimes known as WS-PolicyFramework.  WS-PolicyAssertions  A set of common message policy assertions related to language preferences, versioning and predicates.  WS-SecurityPolicy  Assertions, using the WS-Policy format, relevant to WS- Security.  Model for other types of WS-*Policy to be defined by interest groups.  WS-PolicyAttachment  How to associate policy assertions to Web services descriptions in WSDL and UDDI © Layer 7 Technologies WS-Policy Example <wsp:Policy xmlns:wsse="..." xmlns:wssx="..."> <wsp:ExactlyOne> <wsp:All wsp:Usage="wsp:Required"> <wsse:SecurityToken> <wsse:TokenType>wsse:Kerberosv5TGT</wsse:TokenType> </wsse:SecurityToken> <wssx:Privacy /> </wsp:All> <wsp:All wsp:Usage="wsp:Required"> <wsse:SecurityToken> <wsse:TokenType>wsse:UsernameToken</wsse:TokenType> </wsse:SecurityToken> <wssx:Audit /> </wsp:All> </wsp:ExactlyOne> </wsp:Policy> © Layer 7 Technologies 23
  • 24. 24-10-2008 Conclusions  Security, Identity are becoming increasingly important as organizations move to SOA  Cross-domain, distributed services  Increased regulations  Move from transport-based to message-based security necessitates a new set of standards:  WS-Security  SAML  WS-Trust  WS-Policy  Loose coupling necessitates separating business logic from policy infrastructure:  The emergence of Policy Enforcement Points © Toufic Boubez - Layer 7 Technologies Some References on WS-*  WS-Security:  http://www.oasis- open.org/committees/tc_home.php?wg_abbrev=wss  WS-SecureExchange (WS-SX):  http://www.oasis- open.org/committees/tc_home.php?wg_abbrev=ws-sx  W3C WS-Policy Workgroup  http://www.w3.org/TR/WS-Policy/ "Policy-It's More Than Just Security“, T. Boubez, S. Morrison, M. Hondo, XML Journal  http://www.sys-con.com/xml/article.cfm?id=772 © Toufic Boubez - Layer 7 Technologies 24
  • 25. 24-10-2008 Thanks!  Thank you very much for making it through!  Email questions or comments or presentation requests to:  tboubez@layer7tech.com © Toufic Boubez - Layer 7 Technologies 25