SlideShare uma empresa Scribd logo
1 de 244
Baixar para ler offline
Security In SOA


 WSO2 Security Team
Do we need
security.. It’s extra
   cost right…?
Everything comes
at a cost… security
 is not an option
… not an
option.. But
  a must..
Security is NOT
an option – it’s
     a must
Security should
be by design –
 not an after
    thought
We run
 everything on
HTTPS – aren’t
we yet secured…?
It’s NOT the best
      of the
 assumptions in
 the world you
  could make…
LISTEN..!!! I
   know
 HTTPS….
HTTPS helps
you transfer
data from one
  point to
   another
   point..
 Securely..
That is..
 HTTPS helps
you to encrypt
     data
 transferred
  between a
 client and a
    server
That’s all about
confidentiality –
   how about
    integrity?
Confidentiality
  The assurance
 that a message
has not been read
 by anyone other
than the intended
     reader
Integrity
The assurance
that data is
complete and
  accurate
Authentication
The verification
 of a claimed
   identity
With HTTPS we
    can have
Confidentiality,
 Authentication
       &
   Integrity
Service
         Authentic     Service
         ates to the
           client




Client
Mutual     Service
         Authentic
           ation




Client
Don’t think all
our clients want to
  have their own
 certificates – can
   we have user
  name/password
     instead???
Easy thing –
use BasicAuth
 over HTTPS
Wait…. Basic
  auth sends
   username /
  password in
clear text..right?
But – we are
on HTTPS and
it won’t be an
  issue… BTW
 what are the
other options…
The other
Option is to
use Digest…
Let’s
summarize..
               Securing
                 web
               services
              with HTTPS
Let’s
summarize..
                1.Provides
              confidentiality
                  through
                encryption
Let’s
summarize..     2.Service
              authenticates
              to the client
                   via
              certificates
Let’s      3.Client can
summarize..
              authenticate
                   via
              certificates,
              basic auth /
                 digest
I need a better subject…
     any guesses???
That’s actually
Transport-level
   security
OMG….I remember
 somebody saying
  Transport level
security – can be
 insufficient….???
 Who said that…?
Patience….
 Sir.. It’s
  me….
I can
explain….
Transport
level security
  secures a
 message only
  during the
transfer from
 one point to
another point.
In other
words.. Only
  while the
message is on
  the wire…
HTTPS   HTTPS
When we use
Transport level
 security [SSL]
our messages are
 not secured on
‘intermediaries’
Not – just that –
  we cant even
 encrypt only a
   part of the
message – if we
   depend on
 transport level
    security
Need a way to
    get rid of
transport level
   security….
We can
    handle
security at the
message level…
That way – we
  can protect
entire message
 or even just a
  part of it….
Just –
confidentiality is
NOT enough – we
  need to think
  about adding
  Integrity and
Authentication at
   the Message
      level…
Let’s start with
one by one – can
 anyone tell me
   how do we
     support
authentication at
   the message
    level….???
It’s simple – I
  will add a
custom SOAP
    HEADER
<Credentials>
<UserName></UserName>
 <Password></Password>
     </Credentials>
I don’t like having custom
    headers… that kills
    interoperability….
Yes – true – we
should not try to re-
implement the wheel..
Okay – then
somebody explain –
what do we have on
   our hands…?
Haven’t you
guys heard of
     WS-
  Security….
It defines how
    to achieve
confidentiality,
  integrity and
authentication
     on SOAP
    messages…
Let me clarify – ws-
   security doesn’t
define new security
     technology….
It focuses on
  applying existing
security technologies
 to SOAP messages…
Wow… exactly
  what we
  wanted…
For
authentication –
  WS-Security
     defines
 UsernameToken
<wsse:UsernameToken wsu:Id="Example-1">
     <wsse:Username> ... </wsse:Username>
     <wsse:Password
          Type="..."> ... </wsse:Password>
     <wsse:Nonce
          EncodingType="..."> ... </wsse:Nonce>
      <wsu:Created> ... </wsu:Created>
</wsse:UsernameToken>
I looked into the
WS-Security spec
– but it does NOT
 provide enough
    details on
UsernameToken….
    Where else
  should I look
      into..?
Here it is – you
need to look into
       the
UsernameToken
  Profile spec…
Let’s summarize..
Your findings on    Securing
  Message level
   security and       web
Username Token…
                    services
                      with
                    Message
                     level
                    Security
Let’s summarize..
Your findings on
  Message level
   security and     1.Defined in
Username Token…
                    WS-Security
                    specification
Let’s summarize..
Your findings on
  Message level
   security and     2.End to end
Username Token…     security with
                    support for
                    confidentiality,
                    integrity and
                    authentication
Let’s summarize..
Your findings on
  Message level
   security and     3.UsernameToken
Username Token…
                    can be used to
                    authenticate
                    users to the
                    service.
Let’s summarize..
Your findings on
  Message level
   security and     4.UsernameToken
Username Token…
                    can have
                    password in
                    clear text or
                    as a digest.
Let’s summarize..
Your findings on
  Message level
   security and     5.UsernameToken
Username Token…
                    defined in
                    UsernameToken
                    Profile
                    specification.
Let’s move forward –
      how about
  Encryption with
     Message level
       security
With WS-Security
 we can encrypt
Body, Header and
any of those sub-
   structures…
Can somebody
explains me how
 this encryption
   happens???
That is basically a
shared symmetric
       key….
It can be with a key
   already shared or
  known to both the
service and the client
We are going off
the topic here..
Anyway here’s
  some basic
explanation….
Symmetric key
 encryption
uses a shared
key for both
 encryption
     and
 decryption…
Public key
encryption
   uses
 different
 keys for
encryption
    and
decryption…
Let me add more….
Symmetric key
encryption is
    fast…
It can
operate on
large plain
   text
 messages…
Symmetric key
 encryption
 uses public
     key
encryption to
manage shared
     key
distribution
  securely
Okay..okay.. I know…
  AES, 3DES are
    shared key
    encryption
    algorithms
Back to the topic….
 WS-Security can
 also use wrapped
key encryption as
       well…
Got the point…. If
shared key being
 used then both
client and service
have to share the
      key…..
If client doesn’t have
    a key – then a
  shared key will be
  derived through a
     key wrapping
    algorithm with
  service’s certificate
That sounds good –
  even client not
having a cert – we
   still can have
 encryption…. Let’s
 move to the other
aspect… Integrity…..
WS-Security brings
XML Signature in to
  SOAP messages to
 achieve integrity….
BTW.. Signature not
    only gives you
 integrity – but also
the non-repudiation
Let me add little
more… if you need
to know bit more
   about XML
    Signature
XML Signature
defines three types
  of Signatures –
    enveloping,
  enveloped and
  detached. WS-
 Security utilizes
 only Detached…
Okay – that’s
 enough… let’s start
  building the big
  picture on WS-
Security now… from
   what we have
 discussed so far….
WS - Security




                   XML            Username       X.509 Token
XML Signature
                Encryption       Token Profile      Profile
Now we
know how to
authenticate
 users with
message level
 security….
Also how to
     add
confidentiali
     ty…
And..
Integrity and
    non-
repudiation…
Now – the
 question is…
who should be
able to access
our system???
All our
 employees
need access…
Some of our
   partner
 companies
  also need
   access…
We maintain
the credentials
     of our
employees - so
 we can easily
 authenticate
    them…
How can we
authenticate
 users from
  partner
companies…
Let’s create
  individual
  accounts to
 each of them
and maintain
 those records
   locally….
What a dumb idea
is that… you want
    to maintain
   thousands of
external domain
   user accounts
    internally…
We need not to trust
each individual belong
     to our partner
 companies… we only
 trust them until they
 belong to our partner
      companies…
Exactly – we only trust
our partners only… But
    we can let their
employees to access our
system if the company
  says it’s okay to give
         access…
In simple terms now
we need to find out a
way to establish trust
between our partner
     companies…
That’s simple… let’s
accept requests from
out-siders - only if
those requests being
 signed by a trusted
      partner…
That sounds cool..
    So we’ll be
maintaining a set
 of public certs of
trusted partners to
validate signatures
This only solves
     part of the
  problem… how
  about our users
who need access to
 external system….
How do we sign all
the requests when
   they go out to
external services…
Listen… I found
    some thing
 interesting – WS-
Trust – this exactly
     solves our
     problem….
We’ll be
maintaining
  an STS –
  which is
connected to
our internal
 user store
Any of our
users who needs
 access to an
    external
 service will
send a request
to our internal
      STS
Need to
 authenticate
  him with a
Username Token
Since the
internal STS is
connected to the
 internal user
store – STS can
  verify user
  credentials
Once the
  credentials
 validated, the
STS will issue a
 token with the
required claims
 and sign it by
our private key
If the external
service trusts
 our STS – our
users will let
      in…
Sounds GREAT..!!!
  It’s the same for
external users who
needs access to our
 services… we will
  only trust their
         STS…
Let me build
   the BIG
picture once
  again…..
WS - Trust




                 WS - Security



              XML        Username   X.509
   XML
            Encryptio      Token    Token
Signature
                n         Profile   Profile
Now we have
 secured our
   system…..
Also we know
 who to trust
 and how….
But – how do we
 let other’s who
  work with us
 know security
  standards we
       use….
Ah… yes… when
   external users
accessing our system
 they must provide
their email address
   with all their
     requests….
Not – just that –
  they also have to
        know
encryption/signature
 algorithms we use….
Also – we are not
going to encrypt entire
 message – only some
 parts – so we need to
tell them which parts
      to encrypt…
I am going to prepare
   a document which
    includes all our
security requirements..
- Requires Email address…

- Encryption algorithms
AES
- Encryption key size
256
- Encryption algorithms
AES
- All the parts in the
<Body> must be signed

- Parts to be encrypted
depends on the service…
Looks good… we need
   to extend this
further…And this is
our security policy…
There should be a
  standard way of
communicating our
 security policy to
   others… let me
      Google….
Oh.. Yes.. WS-
SecurityPolicy…
We can use it to express
security requirements of
a Web service according
           to,
    What needs to be
       protected…
  What tokens to use…
  Algorithms, reference
       types, etc….
We need to have different
   security policies for
 different services… how
    can we associate a
 security policy with a
      given service….
That’s simple – you
can point to a policy
   from the WSDL
But .. People may
 access our service
with SOAP1.1 over
 HTTP, SOAP 1.2
over HTTPS, SOAP
  1.1 over JMS…
We may need to change
   our policy based on
  different ways people
 access…. If we have this
  pointed in WSDL – it
will be same for all those
     cases… right….?
Okay – you want
   to change the
  policy based on
the message format
 and the protocol
That is… you want
 to have different
 security policies
    for different
‘bindings’… that is
  possible and it’s
         the
recommendation…
<wsdl:binding name="HelloServiceSoap11Binding“
              type="ns:HelloServicePortType">
        <wsp:PolicyReference xmlns:wsp=“"
                              URI="#SgnEncrUsername" />
        <soap:binding
          transport=http://schemas.xmlsoap.org/soap/http
          style="document" />
        <wsdl:operation name="greet">
            <soap:operation soapAction="urn:greet“
                            style="document" />
            <wsdl:input>
                <soap:body use="literal" />
            </wsdl:input>
            <wsdl:output>
                <soap:body use="literal" />
            </wsdl:output>
        </wsdl:operation>
</wsdl:binding>
Now.. Let’s see how
  we can express
   some of our
 requirements in
WS-SecurityPolicy
UsernameToken
   should be
  included….
<wsp:Policy>
     <sp:UsernameToken sp:IncludeToken=“”/>
</wsp:Policy>
We should accept
UsernameToken –
 only if they are
     signed…
<sp:SignedSupportingTokens xmlns:sp="">
        <wsp:Policy>
          <sp:UsernameToken sp:IncludeToken=“"/>
        </wsp:Policy>
</sp:SignedSupportingTokens>
Will be using
AES with 256
  key size…
<sp:AlgorithmSuite>
    <wsp:Policy>
       <sp:Basic256/>
    </wsp:Policy>
</sp:AlgorithmSuite>
We need entire
<Body> of the
message to be
   signed…
<sp:SignedParts>
    <sp:Body/>
</sp:SignedParts>
How about
encrypting just a
   part of the
    <Body>….
<sp:EncryptedElements XPathVersion="xs:anyURI"? ... >
         <sp:XPath>xs:string</sp:XPath>+ ...
</sp:EncryptedElements>
Also… we need to
   express the
requirement for
  the required
   claim set….
<sp:RequestSecurityTokenTemplate xmlns:t="">
  <t:TokenType>
   http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
 </t:TokenType>
 <t:KeyType >
   http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
  </t:KeyType>
  <t:KeySize>256</t:KeySize>
  <t:Claims Dialect=http://wso2.org/claims xmlns:ic="">
   <ic:ClaimType Uri="http://wso2.org/claims/email" />
  </t:Claims>
</sp:RequestSecurityTokenTemplate>
That’s it… let’s move
forward… Now we are
  secured.. We know
who to trust and how
       to trust…
We also know how to
  communicate our
security requirements
     to the rest….
Let me build
   the BIG
picture once
  again…..
WS - Trust
   WS-
SecurityPo
   licy
                              WS - Security



                           XML        Username   X.509
                XML
WS-Policy                Encryptio      Token    Token
             Signature
                             n         Profile   Profile
Now we need to
find out a way to
   put this all-
    together…
We should not expose
   all our services
 directly to external
      domain…
Agreed – having
 multiple entry point
into the system could
create security holes…
Let’s make sure
we authenticate
 and authorize
users centrally….
And we can load
balance on that
  end point….
So let’s not expose any
 of our services to out
          side….
We can have proxy
 service and in front
     and only the
  authenticated and
 authorized requests
 will flow through to
the internal services…
Authentication Module



     Authorization Module




Service    Service     Service
   A          B           C
This is a familiar
security pattern…
Message Interceptor
    Gateway…
Let me improve
the diagram a
     bit…..



                        Authentication Module



                         Authorization Module


             LDAP

                    Service    Service     Service
                       A          B           C
Anybody knows what
 the authorization
 module does…? We
 need fine grained
  authorization….
Yes.. Exactly… we need
  a way to say.. Users
 belong to the role X
can access Resource Y
   only during this
   particular time…
We should also be
  able to say – any
users belong to role Z
  cannot access any
      resources….
That’ s simple – give
me your requirement
 – I’ll right a policy
      for it –and
   Authorization
module will evaluate
           it…
Oh..NO… don’t panic
   – we need not to
reinvent the wheel…
  this what exactly
    XACML does…..
Sounds good – we
should go ahead with
   the standards….
I know XACML….
It’s a
  specification
  which defines
      how to
 implement fine
     grained
authorization in
a standard way…
Let me add
XACML to out
 architecture
  diagram…
Now – under
   the XACMl
terminology, our
 Authorization
module will act
  as the Policy
   Evaluation
   Point [PEP]
Authentication Module


         Authorization Module [PEP]


LDAP

       Service    Service     Service
          A          B           C
PEP is not just
enough – we need to
have a XACML engine
  to act as a Policy
  Decision Point….
Yes…. Policy
 decision is made
   at the PDP –
 PEP will build
    the Auth’Z
    request and
  contact PDP…
let’s bring PDP to
   the picture…
Authentication Module


         Authorization Module [PEP]


LDAP

       Service    Service     Service
                                        PDP
          A          B           C
Then again –
  PDP has to
retrieve XACML
policies from a
 policy store….
Authentication Module


         Authorization Module [PEP]


LDAP

       Service    Service     Service
                                           PDP
          A          B           C




                                        Policy Store
How do we going to
add new policies… we
 also need to have a
policy administration
        point…
Authentication Module              PAP



         Authorization Module [PEP]


LDAP

       Service    Service     Service
                                           PDP
          A          B           C




                                        Policy Store
Let’s celebrate – we
   completed the
security design for
    our backend
      services…
Now… we need to
think about how we
 authenticate users
 at the front-end….
I hate passwords…
     how many
passwords I have to
   remember even
 now… If this going
   to add another
password to that list
 – I am against it…
I agree – too many
   password is a
     problem…
See… even
  within our
 company we
 need to have
   different
 passwords to
access different
   systems…
Okay… let’s solve the
too many passwords
     problem…
Hey…. We need not to
  worry about it…
 OpenID is for that…
Also – OpenID
     facilitates
decentralized single
      sign on…
That’s great – if we
use OpenID – we only
    sign in once…
How can we
implement this…?
First thing… our web
application needs to
be an OpenID relying
 party…. That is our
  application will
    accept OpenID
       logins….
Also – we can
run our own
   OpenID
  Provider…
Then all our
web applications
  will redirect
users to our own
OpenID Provider
       for
authentication….
I don’t like
OpenID – it’s
   phishing
   heaven…
Hey.. Man… You got it
wrong… Phishing is a
  separate issue –
OpenID doesn’t try to
 address Phishing…
Then who’s
going to solve the
   problem of
     solving
   phishing…?
Heard of
  Information
 Cards…??? It’s
going to address
   the issue of
    phishing…
I know Information
   cards… it’s an
application of WS-
      Trust….
We already decided
 to run an STS – so
we can easily become
an information cards
    provider too…..
Then what…???
Then – at the OpenID
  provider – we can
      ask users to
  authenticate with
 information cards –
     in a phishing
  resistant manner….
Great.. That
sounds perfect….
Okay.. We are
almost done…
But… yet we need
to figure out how
  to implement
       this…
Remember guys….
The cost matters
   the most….
Yes.. We can’t let
product vendors
     kill us…
So… let’s figure out
  available open
  source options
      first….
Let’s use WSAS to
   deploy our
     services…
Who knows more
 about WSAS….?
It is an open
source, enterprise-
    ready, Web
  services engine
 based on Apache
      Axis2….
Authentication Module            PAP



         Authorization Module [PEP]


LDAP


                                         PDP

       Service   Service    Service
          A         B          C

                                      Policy Store
Now… What..
Anybody knows
an open source
XACMl engine….
WSO2 Identity
Server can do it
   for sure…
It’s not just an
 XACML engine…
 we can use it as
    our OpenID
Provider as well…
Also… it comes
     with an
Information Card
    provider…
Wow… that looks
 perfect for us…
let’s see how this
   fits into our
   architecture
    diagram….
Authentication Module
                                           PAP


         Authorization Module [PEP]
                                           PDP

LDAP




       Service   Service    Service
          A         B          C      Policy Store
Looks good….
hmm… a question
– can we deploy
 Identity Server
 over our LDAP
    server…?
Yes…. That’s a
must – we need to
 use our existing
   user store….
That’s easy – you
    can simply
 connect Identity
   Server to our
  LDAP server…
Exactly – it’s a
matter of a simple
 configuration…
Okay…. That sounds
 good.. So… Identity
 Server will be our
   XACMl engine,
OpenID Provider and
also the Information
  Card provider….
Authentication Module
                                           PAP


  Authorization Module [PEP]
                                           PDP




Service   Service    Service   LDAP
   A         B          C             Policy Store
How about the
STS…? Can we use
Identity Server for
      that…?
One more thing…
we need the STS to
 be claim aware…
… it should
  connect to our
 LDAP and pick
the user attributes
 from there… can
Identity Server do
         it?
Look at this… you
  can do it with
 Identity Server…
… it has this claim
     management
 component… we can
   easily configure
Identity Server STS to
   use our LDAP…
Authentication Module
                                      PAP




                                                     STS
  Authorization Module [PEP]
                                      PDP




Service   Service    Service   LDAP
   A         B          C             Policy Store
Looks perfect….
  What else
  missing…
How about using
 WSO2 ESB… as
  the service
    bus…?
Yes… that helps
us implementing
     Message
   Interceptor
Gateway pattern
     easily…
See this… it comes
     with an
   Entitlement
   Mediator –
    which can
  connect to the
 Identity Server’s
 XACMl engine…
Wow…!!! I like
whatever makes
 us less work…
Who knows
 more about
WSO2 ESB….?
It enables the loose-
coupling of services,
 connecting systems
    in a managed
     virtualized
      manner….
…. allowing
  administrators to
 control and direct
   communication
 without disrupting
existing applications
PAP
   Authentication Module




                                      STS
 Authorization Module [PEP]    PDP




Service   Service    Service   LDAP         Policy Store
   A         B          C
Okay…. Now we
 need a policy
    store….
Let me.. Suggest
this time… WSO2
   Governance
 Registry will do
      that….
So.. Clever 
 I also found the
  same… It’s very
 much more than
just a policy store
 – or a registry…
…It is an
enterprise-ready
   open source
   product for
 governing SOA
 deployments…
Sounds great.. Let’s
    update the
 diagram… we are
 almost getting to
    the end….
PAP
   Authentication Module




                                            STS
 Authorization Module [PEP]           PDP




Service    Service   Service   LDAP
   A          B         C
Looks great..!!!
Finally we came
up with a fully
   open source
solution for our
security design…
Thanks a lot… for
      your
 participation…
Time for
questions… I am
 sure you guys
have many….???
…also you can reach us
          through…
       http://wso2.com,
http://wso2.com/about/contact
               &
       bizdev@wso2.com
Thank You…!!!

Mais conteúdo relacionado

Semelhante a Securing SOA services with Message level Security and Username Token

Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systemsAbdulaziz Mohd
 
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David JohanssonOWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David JohanssonDavid Johansson
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSylvain Maret
 
Secured SOA
Secured SOASecured SOA
Secured SOAWSO2
 
Identity, Security and XML Web Services
Identity, Security and XML Web ServicesIdentity, Security and XML Web Services
Identity, Security and XML Web ServicesJorgen Thelin
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Mumbai Academisc
 
WSO2 SOA Security
WSO2 SOA SecurityWSO2 SOA Security
WSO2 SOA SecurityWSO2
 
SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications nishchal29
 
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, WorteksParis Open Source Summit
 
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for DummiesWorteks
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer SecurityByronKimani
 
Identity patterns and anit-patterns in real world web services
Identity patterns and anit-patterns in real world web servicesIdentity patterns and anit-patterns in real world web services
Identity patterns and anit-patterns in real world web servicesPrabath Siriwardena
 

Semelhante a Securing SOA services with Message level Security and Username Token (20)

Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
Ssl
SslSsl
Ssl
 
Documentation20
Documentation20Documentation20
Documentation20
 
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David JohanssonOWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
Secured SOA
Secured SOASecured SOA
Secured SOA
 
Identity, Security and XML Web Services
Identity, Security and XML Web ServicesIdentity, Security and XML Web Services
Identity, Security and XML Web Services
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
 
Getting authentication right
Getting authentication rightGetting authentication right
Getting authentication right
 
WSO2 SOA Security
WSO2 SOA SecurityWSO2 SOA Security
WSO2 SOA Security
 
Secured SOA
Secured SOASecured SOA
Secured SOA
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications
 
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
 
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 
Identity patterns and anit-patterns in real world web services
Identity patterns and anit-patterns in real world web servicesIdentity patterns and anit-patterns in real world web services
Identity patterns and anit-patterns in real world web services
 

Mais de WSO2

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in ChoreoWSO2
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023WSO2
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzureWSO2
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfWSO2
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in MinutesWSO2
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityWSO2
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...WSO2
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfWSO2
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoWSO2
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsWSO2
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital BusinessesWSO2
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)WSO2
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformationWSO2
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesWSO2
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready BankWSO2
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIsWSO2
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native DeploymentWSO2
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”WSO2
 

Mais de WSO2 (20)

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in Choreo
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on Azure
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdf
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos Identity
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdf
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing Choreo
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected Products
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital Businesses
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformation
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking Experiences
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready Bank
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
 

Último

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Último (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Securing SOA services with Message level Security and Username Token