Web Services Security

Source: Internet
Author: User
This series will introduce Web Services Security-related content, including technologies such as XML Signature, XML Encryption, SAML, WS-Security, and WS-Trust. In this series of articles, I will focus on its principles and my personal understanding of related technologies. In the continuously updated WSE series of MS, security is an important part. If possible, WSE can be used in combination with the principle for some technical practices.

Web Services Security --- Introduction
In this article, we will give a brief introduction to some of the problems facing WS security, and point out its shortcomings based on the introduction of the existing SSL-based Web Service Security Solutions, this section introduces WS-Security.

XML-Signature
This section describes the structure of XML-Signature and the creation and verification process.

XML-Encryption
This section describes the structure of XML-Encryption and the creation and verification process.

WS-Security Core
This article describes the relationship between WS-Security and XML-Signature and XML-Encryption and their organizational structure.
UsernameToken
This article introduces the Security Token using Username & Password in WS-Security in combination with WSE.
BinaryToken
KerberosToken
This article introduces the Security Token of Kerberos protocol in WS-Security in combination with WSE.
X.509Token
This article introduces the Security Token for using the X.509 Certificate in WS-Security in combination with WSE.
 
Identity Federation
This article introduces the background of identity Federation and the defects of previous methods, and introduces a new method, WS-Federation.
Technologies involved: SSO, SAML, WS-Security, WS-Trust, and WS-Federation.
Part 1
Background and existing solutions are introduced. In order to avoid previous defects, this article introduces the method of implementing Portabel Identity using SAML, and briefly introduces the syntax and principle of SAML.
Part 2
This section describes a complete example of using SAML, WS-Trust, and WS-Security to implement identity Federation. It describes how to obtain and use SAML tokens to ensure the Security of Web Services. At the end of the article, we will introduce the WS-Federation specification.

Related Resources
WS-Addressing from theory to practice-introduction to basic SOA specifications

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.