DOC PREVIEW
SJSU CS 265 - WS-Security

This preview shows page 1-2-3-4-5 out of 15 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 15 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

WS-Security ProtocolWeb Services (WS)Consuming a Web ServiceWS is not secureWS-SecuritySlide 6SOAP Security HeaderWS-Security TokensXML EncryptionSlide 10XML SignatureXML Signature SchemaWS-Security DemoConclusionQ&AWS-Security ProtocolRamkumar ChandrasekharanCS 265Web Services (WS) A service available over Internet Standard protocols: HTTP, SMTP, FTPIs based on XML messaging systemSOAP (Simple Object Access Protocol), XML-RPCA WS should be self describingWSDL: Web Services Description LanguageDiscoverableUDDI: Universal Description Definition InterfaceConsuming a Web Service1) Client discovers the WS from UDDI registry to which WS has published itself2) Client retrieves the WSDL file pointed by UDDI3) Client Creates SOAP packets with the appropriate Web Service calls4) Invokes Web Service method over HTTP, SMTP etc5) Response is received from the WS as a SOAP packet as wellWS is not secureXML messages over the network. Anybody can easily sniff and read the text.Secure with SSL at transport layer but does not guarantee end to end security. SSL also encrypts everything which could be resource expensive.Many ways of securing at message layer for WS is possible, WS-Security is a standard way of securing WS.WS-SecurityWS-* SpecsStandardizing various pieces of Web Service for e.g., Security, Policy, Messaging etc.Various Standards Orgs (OASIS, W3C etc.) and corporations (IBM, MS, Verisign etc.) are involvedWS-SecuritySOAP header carries security infoXML Encryption standard is used for encryption XML Signature standard is used for Digital SignatureSOAP Security Header<soap:Envelopexmlns:soap=http://schemas.xmlsoap.ord/soap/envelopexmlns:wsse=”http://schemas.xmlsoap.ord/ws/2002/12/secext”><soap:Header><wsse:Security soap:role=”….”>All the security related mechanisms like security tokens, encryption and signatures goes here</wsse:Security>WS-Security TokensAuthentication mechanisms:UsernameTokenPlaintext, Hashed (Base64 Encoding (SHA-1 (Nonce + Created + Password))Binarysecuritytoken based on Kerberos or X.509 certificatesXML EncryptionProvides End to end securitySelective EncryptionVery simple to do, lets say if there is an XML doc for e.g.,XML EncryptionXML before encryption:<?xml version=‘1.0’?><CreditCard><Name>John </Name><Number> 1234567</Number><Code>123</Code><Expiry>0106</expiry></CreditCard>XML After encryption<?xml version=‘1.0’?><CreditCard><Name>John </Name><EncryptionData><CipherData><CipherValue>asdgsd45454</CipherValue></CipherData></EncryptionData></CreditCardXML SignatureStandard Schema for digital signature XML docsSelective Signing of XML docs, that is portions of XML docs can be signed Its not as simple as XML encryptionXML Signature Schema<Signature><SignedInfo><CanonicalizationMethod /><SignatureMethod /><Reference URI=“ “> (0 or more)<Transforms/><DigestMethod/><DigestValue/></Reference></SignedInfo><SignatureValue /> - Digest of SignedInfo<KeyInfo/> (Optional)</Signature>WS-Security DemoUsing WSE 2.0ConclusionWeb service is going to create revolution in distributed computing and with standards like WS-Security helps achieve security into Web Services.With Web Services the vision of Vint Clif “father of the Internet’ could be achieved. He said “it wont be long before your bathroom scale surreptitiously transmits your weight to your doctor, who might command a stop to the rocky road ice cream your fridge automatically orders for you from


View Full Document

SJSU CS 265 - WS-Security

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download WS-Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view WS-Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view WS-Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?