did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780672326516

Securing Web Services with WS-Security Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

by ;
  • ISBN13:

    9780672326516

  • ISBN10:

    0672326515

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2004-05-12
  • Publisher: Sams Publishing
  • Purchase Benefits
List Price: $49.99

Summary

You know how to build Web service applications using XML, SOAP, and WSDL, but can you ensure that those applications are secure? Standards development groups such as OASIS and W3C have released several specifications designed to provide security -- but how do you combine them in working applications?

Author Biography

Dr. Jothy Rosenberg is a serial entrepreneur. He's a founder, director and CEO of Service Integrity, a Prior to Service Integrity, Jothy co-founded certificate authority GeoTrust, Previously, Jothy was a Duke University professor, and has written extensively on a variety of technical topics. David Remy, CISSP, is a director of product engineering responsible for security, Web services, and XML for BEA System's WebLogic Workshop. Prior to BEA David was co-founder and chief architect for GeoTrust. Previously David was chief technology officer at Netstock, director of technology at Corbis, director of architecture at PEMCO Financial, and advisory systems engineer at IBM.

Table of Contents

Forewordsp. xx
Introductionp. 1
Who This Book Is Forp. 1
About This Bookp. 1
How This Book Is Organizedp. 2
Basic Concepts of Web Services Securityp. 5
Web Services Basics: XML, SOAP, and WSDLp. 6
XML and XML Schemap. 6
SOAPp. 7
WSDLp. 9
UDDIp. 9
Application Integrationp. 9
B2B Business Process Integrationp. 10
Portalsp. 11
Service-Oriented Architecturesp. 11
Definition of Web Servicesp. 12
Security Basicsp. 12
Shared Key and Public Key Technologiesp. 13
Security Concepts and Definitionsp. 16
Web Services Security Basicsp. 19
XML Signaturep. 19
XML Encryptionp. 20
SAMLp. 20
WS-Securityp. 21
Trust Issuesp. 22
Other WS-Security-Related Specsp. 22
Summaryp. 22
The Foundations of Web Servicesp. 25
The Gestalt of Web Servicesp. 25
Application Integrationp. 25
The Evolution of Distributed Computingp. 28
The Inevitability of Web Servicesp. 32
Security Challengesp. 35
XML: Meta-Language for Data-Oriented Interchangep. 37
Where XML Came From and Why It's Importantp. 38
XML and Web Servicesp. 39
XML Namespacesp. 39
XML Schemap. 42
XML Transformationsp. 43
XML's Role in Web Services Securityp. 46
SOAP: XML Messaging and Remote Application Accessp. 49
Where SOAP Came From and Why It's Importantp. 50
SOAP Envelopep. 52
SOAP Headerp. 53
SOAP Bodyp. 53
SOAP Processingp. 55
SOAP Attachmentsp. 55
SOAP and Web Services Securityp. 55
WSDL: Schema for XML/SOAP Objects and Interfacesp. 56
Where WSDL Came From and Why It's Importantp. 56
WSDL Elementsp. 58
WSDL and SOAPp. 61
WSDL and Web Services Securityp. 61
UDDI: Publishing and Discovering Web Servicesp. 62
ebXML and RosettaNet: Alternative Technologies for Web Servicesp. 65
The Web Services Security Specificationsp. 65
Summaryp. 67
The Foundations of Distributed Message-Level Securityp. 69
The Challenges of Information Security for Web Servicesp. 69
Security of Distributed Systems Is Hardp. 69
Security of Exchanged Information (Messages) Is Harderp. 70
Security of Web Services Is Hardestp. 71
Shared Key Technologiesp. 72
Shared Key Encryptionp. 72
Kerberosp. 75
Limitations of Shared Key Technologiesp. 76
Public Key Technologiesp. 76
Public Key Encryptionp. 76
Limitations of Public Key Encryptionp. 79
Digital Signature Basicsp. 80
A Digital Signature Expressed in XMLp. 85
Public Key Infrastructurep. 86
SSL Transport Layer Securityp. 97
Summaryp. 102
Safeguarding the Identity and Integrity of XML Messagesp. 105
Introduction To and Motivation for XML Signaturep. 105
A W3C Standardp. 105
Critical Building Block for WS-Securityp. 105
Close Associations with Web Services Securityp. 106
The Goal of Ensuring Integrity (and Usually Identity) and Non-repudiation Persistentlyp. 106
XML Signature and XML Encryption: Fundamental Web Services Security Technologiesp. 106
XML Signature Fundamentalsp. 107
XML Signature Structurep. 107
Basic Structurep. 108
Specifying the Items Being Signedp. 109
Types of XML Signaturesp. 109
The Signature Element Schemap. 113
XML Signature Processingp. 116
XML Signature Generationp. 117
XML Signature Validationp. 119
The XML Signature Elementsp. 120
The SignedInfo Elementp. 120
The CanonicalizationMethod Element and Canonicalizationp. 120
The SignatureMethod Elementp. 125
The Reference Elementp. 125
The Transform Elementp. 127
The DigestMethod Elementp. 132
The DigestValue Elementp. 133
The SignatureValue Elementp. 133
The Object Elementp. 133
The KeyInfo Elementp. 137
Security Strategies for XML Signaturep. 140
Using Transformsp. 140
Knowing the Security Modelp. 141
Knowing Your Keysp. 142
Signing Object Elementsp. 142
Signing DTDs with Entity Referencesp. 142
Summaryp. 144
Ensuring Confidentiality of XML Messagesp. 147
Introduction to and Motivation for XML Encryptionp. 147
Relating XML Encryption and XML Signaturep. 147
Critical Building Block for WS-Securityp. 148
The Goal Is to Ensure Confidentiality of Messages from End to End with Different Recipientsp. 149
Think Shared Key Cryptography When You Think of XML Encryptionp. 149
XML Encryption Will Become Part of the Infrastructure Like XML Signaturep. 149
XML Encryption Fundamentalsp. 150
XML Encryption Structurep. 151
EncryptedData: The Core of XML Encryptionp. 151
EncryptedData Schemap. 152
EncryptedTypep. 153
EncryptionMethodp. 154
CipherDatap. 154
EncryptionPropertiesp. 155
KeyInfop. 156
EncryptedKeyp. 157
AgreementMethodp. 159
ReferenceListp. 160
CarriedKeyNamep. 161
Super Encryptionp. 162
XML Encryption Processingp. 163
Encryption Processp. 163
Decryption Processp. 164
Using XML Encryption and XML Signature Togetherp. 165
The Decryption Transform for XML Signaturep. 168
XML Encryption and XML Signature Strategiesp. 175
Summaryp. 176
Portable Identity, Authentication, and Authorizationp. 177
Introduction to and Motivation for SAMLp. 178
The Problems SAML Addressesp. 179
Transporting Identity or "Portable Trust"p. 181
The Concept of Trust Assertionsp. 181
How SAML Worksp. 181
SAML Assertionsp. 184
SAML Producers and Consumersp. 188
SAML Protocolp. 189
Authorization Requestp. 191
SAML Bindingsp. 192
SAML Profilesp. 194
Using SAML with WS-Securityp. 195
The WS-Security SAML Profilep. 196
Applying SAML: Project Libertyp. 197
The Identity Problemp. 197
Federated Identityp. 197
How Liberty Uses SAMLp. 198
The Microsoft Passport Alternative Approachp. 199
Summaryp. 200
Building Security into SOAPp. 201
Introduction to and Motivation for WS-Securityp. 201
Problems and Goalsp. 201
The Origins of WS-Securityp. 205
WS-Security Is Foundationalp. 206
Extending SOAP with Securityp. 206
Security Tokens in WS-Securityp. 208
UsernameTokenp. 209
BinarySecurityTokensp. 212
XML Tokensp. 215
Referencing Security Tokensp. 220
Providing Confidentiality: XML Encryption in WS-Securityp. 222
Shared Key XML Encryptionp. 222
Wrapped Key XML Encryptionp. 223
Encrypting Attachmentsp. 224
WS-Security Encryption Summaryp. 227
Providing Integrity: XML Signature in WS-Securityp. 227
XML Signature for Validating a Security Tokenp. 227
XML Signature for Message Integrityp. 228
XML Signature in WS-Security Considerationsp. 228
WS-Security XML Signature Examplep. 228
Signing a Security Token Referencep. 229
Message Time Stampsp. 230
Summaryp. 232
Communicating Security Policyp. 235
WS-Policyp. 235
WS-Policy and WSDLp. 236
WS-Policy and WS-SecurityPolicyp. 236
The WS-Policy Frameworkp. 237
WS-Policy Detailsp. 238
WS-PolicyAssertionsp. 240
WS-PolicyAttachmentp. 241
Specifying WS-Policy in WSDLp. 242
WS-SecurityPolicyp. 245
SecurityTokenp. 245
Integrityp. 248
Confidentialityp. 250
Visibilityp. 251
SecurityHeaderp. 252
MessageAgep. 253
Summaryp. 253
Trust, Access Control, and Rights for Web Servicesp. 255
The WS-* Family of Security Specificationsp. 255
WS-* Security Specifications for Trust Relationshipsp. 258
WS-* Security Specifications for Interoperabilityp. 265
WS-* Security Specifications for Integrationp. 269
XML Key Management Specification (XKMS)p. 272
Origins of XKMSp. 272
Goals of XKMSp. 272
The XKMS Servicesp. 273
eXtensible Access Control Markup Language (XACML) Specificationp. 279
The XACML Data Modelp. 280
XACML Operationp. 281
XACML Policy Examplep. 282
eXtensible Rights Markup Language (XrML) Management Specificationp. 284
The XrML Data Modelp. 285
XrML Use Case Examplep. 285
Summaryp. 290
Building a Secure Web Service Using BEA's WebLogic Workshopp. 293
Security Layer Walkthroughp. 294
Transport-Level Securityp. 295
Message-Level Securityp. 296
Role-Based Securityp. 297
WebLogic Workshop Web Service Walkthroughp. 297
Transport Securityp. 302
Message-Based Securityp. 312
Summaryp. 330
Security, Cryptography, and Protocol Background Materialp. 331
The SSL Protocolp. 331
Testing for Primalityp. 333
RSA Cryptographyp. 334
Choosing RSA Key Pairsp. 335
Paddingp. 335
RSA Encryptionp. 335
RSA Decryptionp. 336
DSA Digital Signature Algorithmsp. 336
DSA Key Generationp. 336
DSA Algorithm Operationp. 337
Block Cipher Processingp. 337
Block Cipher Padding (PKCS#5)p. 337
Block Cipher Feedbackp. 338
DES Encryption Algorithmp. 338
AES Encryption Algorithmp. 339
Hashing Details and Requirementsp. 339
Motivation for Using Hash Functionsp. 340
Requirements for Digital Signaturep. 340
SHA1p. 340
Collision Resistancep. 341
Securityp. 341
Simplicity and Efficiencyp. 341
Silvio Micali's Fast Validation/Revocationp. 341
Validity Checkp. 342
Revocationp. 343
Canonicalization of Messages for Digital Signature Manifestsp. 343
Canonicalization V1 Transform Stepsp. 343
Canonicalization Subtleties: Exclusive Canonicalizationp. 344
Base-64 Encodingp. 345
PGPp. 346
Glossaryp. 347
Indexp. 367
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program