Part II. Building blocks of SOA security

 

Part II introduces the techniques you can use for addressing the following fundamental concerns of SOA security:

  • Claiming and verifying identity (authentication)
  • Protecting confidentiality of messages (chapter 6)
  • Verifying message integrity and guarding against repudiation (chapter 7)

The techniques we will describe in this part form the basis for most of the discussion in part III, where we discuss enterprise SOA security. In this sense, we can think of the techniques described in part II as the fundamental building blocks of SOA security. Examples used in this part are deliberately kept simple and academic, as the goal here is to illustrate one building block of SOA security at a time.

You will learn about PKI, Kerberos, XML Encryption, XML Signatures, WS-Security, and WS-SecureConversation. You will use Apache Axis and JAX-RPC handlers, first introduced in part I along with Apache XML Security libraries, Java Authentication and Authorization Service (JAAS) framework, and the Java bindings of the General Security Services (JGSS) API to see each of the technologies we introduce in this part in action.

Chapter 4. Claiming and verifying identity with passwords

This chapter covers

  • Password-based authentication
  • Plain-text passwords
  • Digest authentication

4.1. Authentication with username and password

4.2. Using password digest for authentication

4.3. Is password authentication the right solution for you?

4.4. Summary

Suggestions for further reading

Chapter 5. Secure authentication with Kerberos

5.1. Authentication requirements in SOA

5.2. Introduction to Kerberos

5.3. Implementing Kerberos with JAAS and GSS APIs

5.4. Using Kerberos with WS-Security

5.5. What authentication scheme to use?

5.6. Summary

Suggestions for further reading

Chapter 6. Protecting confidentiality of messages using encryption

6.1. Encryption in action: an example

6.2. The basics of encryption

6.3. Programming with digital certificates

6.4. Encrypting SOAP messages

6.5. Practical issues with encryption

6.6. Summary

Suggestions for further reading

Chapter 7. Using digital signatures

7.1. The basics of XML signatures

7.2. Signing SOAP messages

7.3. Practical issues with signatures

7.4. Summary

Suggestions for further reading

sitemap