Part III. Enterprise SOA security

 

In the final part of this book, we discuss how you can combine the building blocks you learned in part II to construct SOA security services in an enterprise.

Part III consists of chapters 8, 9, and 10.

In chapter 8, we show how you can offer SOA security as a service in an enterprise. You will learn about Security Assertion Markup Language (SAML), WS-Trust, WS-Addressing, and Application-Oriented Networking (AON). These are technologies that are evolving to help you offer security as a horizontal service. We will also show you an example security service in action using Apache Axis and OpenSAML, an open source library.

In chapter 9, we will show you how to codify security policies to enable declarative security and enhance interoperability. WS-Policy and WS-SecurityPolicy will be introduced in this chapter.

In chapter 10 we will discuss all the real-world issues you need to tackle when implementing SOA security in an enterprise. As with any other real-world design problem, there is no “one size fits all” SOA security architecture. In chapter 10 we discuss the issues you will need to tackle and the choices you have to address for each issue. Deployment architectures and XML vulnerability management are two of the important topics discussed in this chapter.

Chapter 8. Implementing security as a service

This chapter covers

  • SAMLAssertions
  • OpenSAML
  • WS-Trust and SAML protocol

8.1. Security as a service

8.2. Analyzing possible uses of a security service

8.3. Conveying the findings of a security service: SAML

8.4. Example implementation using OpenSAML

8.5. Standards for security service interfaces

8.6. Summary

Suggestions for further reading

Chapter 9. Codifying security policies

9.1. Introducing declarative security

9.2. Interoperability challenges in SOA security

9.3. Web services policy framework

9.4. WS-SecurityPolicy

9.5. Summary

Suggestions for further reading

Chapter 10. Designing SOA security for a real-world enterprise

10.1. Meeting the demands of enterprise IT environments

10.2. Securing diverse services

10.3. Choosing a deployment architecture

10.4. Making the solution industrial-strength

10.5. Vulnerability management

10.6. Summary

Suggestions for further reading

sitemap