List of Tables

 

Chapter 1. SOA requires new approaches to security

Table 1.1. Evidence you, the user, can present to prove your identity to an application

Table 1.2. Possible authentication strategies in different service invocation scenarios

Table 1.3. Currently available options for implementing SOA security in different scenarios

Chapter 2. Getting started with web services

Table 2.1. Prerequisites for running examples in this book

Table 2.2. Instructions for installing Axis

Table 2.3. Instructions for setting up examples

Table 2.4. Instructions for running example 1

Table 2.5. The four faultCode values predefined by SOAP 1.1 specification

Table 2.6. Instructions for consuming the brokerage service with a .NET-based client

Chapter 3. Extending SOAP for security

Table 3.1. Fault codes defined by WS-Security. These fault codes are to be used by any WS-Security implementation when it reports the problem with a security header entry.

Table 3.2. Steps to add a header entry

Chapter 4. Claiming and verifying identity with passwords

Table 4.1. Steps that illustrate how WS-Security supports username- and password–based authentication

Table 4.2. Client-side implementation logic for password digest based-authentication

Table 4.3. Server-side implementation logic for password digest-based authentication

Chapter 5. Secure authentication with Kerberos

Table 5.1. Requirements an authentication system should satisfy if it is to be appropriate for use in SOA