Laying the groundwork for Web services

Source: Internet
Author: User
Tags soap mail web services visual studio
Web|web Services as Microsoft eventually released Visual Studio. NET and the. NET Framework, many IT companies are also starting to rebuild their product systems to support Web services
。 Although IBM, Microsoft and Sun, as well as other consortium members, have embarked on a number of technical specifications to define and design a Web services environment (including SOAP and XML), in order to make Web services a viable platform for communication across applications, based on the internet, People still need to do a lot of work.

Due to the reliability and security considerations of the new technology system for Web services, many CIOs in the company are not sure whether it is the right time to start deploying systems that rely on Web services. Since standards are already being developed and developed, CIOs should at least be able to develop internal systems when the appropriate issues are easier to manage, while at the same time waiting for organizations to publicly release the final approved technical standards. Once the technical standards are passed by the responsible organization, it is much simpler to establish interoperable systems outside the firewall.

Companies such as IBM and Microsoft have designed and written a large number of technical drafts around Web services technology and submitted them to the new Web services proposal, and so far, the-ws-inspection, Ws-referral, ws-routing, Ws-security and Ws-licensing have been presented to the Consortium for discussion. Let's talk about the parts of the Web services system that need to be done, and how these specifications solve these problems.

Direct Discovery Service
The existing common description, discovery, and integration (Uddi:universal Description, Discovery, and integration) standards describe the discovery and use of Web services in the event of a Web service location unknown. UDDI works much like a phone book directory of Yellow Pages, which allows applications to discover and contact servers that provide a given Web service. However, in most cases, the location of the Web service is known, and it is inefficient to use UDDI at the outset to find service addresses. So, like UDDI, a central repository for discovery services may be useful to publishers of services that want to provide services, but for consumers who want to connect to those services, the efficiency is not satisfactory.

On the other hand, Ws-inspection relies on a completely distributed pattern to provide information about services. The service description exists at the service delivery point, and the request to obtain the information is directed directly to the service-providing site. ws-inspection, in XML format, can help requesting a Web service's host (calling) application query to expose a known site for its available services. It defines a set of rules that specifically specify how the site should expose its relevant inspection information to the requesting caller. The Ws-inspection document also provides several methods for pooling the indexes of pre-existing service documents, regardless of the original format they take. According to this standard, the service information returned after the query takes on existing standards, such as WSDL (Web Service Description Language: Web Services Description Language). These standards allow the host system to directly use the returned Web service information without any modification of the information.

Establish a reliable system
The initial implementation of the SOAP protocol is simple, but it is a one-way call to another system
。 The Ws-referral and ws-routing specifications provide the core technology to help system designers build more robust systems. The above two normative synergies, together define the concept of the SOAP router, with SOAP routers, system designers and system developers can use it to develop load balancing, mirroring and customer authentication and other Web services. For example, there is a Web service that can transfer part of its processing tasks to a 3rd party service, and the result can be returned to the original user of the service, but the user does not know what is happening inside.

The Ws-referral specification defines how a SOAP router establishes a message path between multiple service points, while ws-routing defines how the message path is described. Ws-routing also adds the ability to define a reverse message path, resulting in a communication system that enables bidirectional message exchange modes, such as requests/responses, Peer-to-peer sessions, and return message confirmations and errors. These initiatives have greatly increased system reliability based on the SOAP platform.

Establish a secure system
An existing SOAP system passes its payload in the form of an XML text string. While doing so allows communication to be established between any two systems regardless of their architecture, this also creates a serious security problem. Existing standards allow the encryption of information in a communication pipeline (with SSL over HTTP) or directly to the pipe itself (with Internet Protocol Security or IPSec). But these are all either an all-or-nothing extreme form, lacking the necessary regulatory granularity in safe management. It is not possible to implement more granular security measures unless both sides of the conversation adopt a consistent format for securing the message itself.

The Ws-security Joint Ws-license specification enhances the granularity security of the soap system. Ws-security defines the ability to exchange trusts, check message integrity, and enhance the confidentiality of messages, which can be used either separately or jointly. With ws-security, the message is associated with the license (including, but not limited to, X.509 certificates or Kerberos bills). Ws-license describes the trust coding process that is used with ws-security. Ws-security includes technical specifications that guarantee message integrity and confidentiality (using Ws-license) by supporting the overall or partial encryption of the message, while providing a way to receive a message on one side of the system to decode the message.

Editor: Xiao Li (email:li_shuangzhen@zdnet.com.cn)

TechRepublic is an online community and resource Center for all types of IT professionals, and we provide in-depth technical articles written by IT experts, facing readers of IT specialists. In addition to providing a variety of articles from Windows to e-mail to firewalls, we also provide IT industry analytics, downloads, Management Essentials, discussion groups, and news mail services.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.