10 steps to achieve better SOA security
Introduction: This series provides a roadmap to secure implementation of a service-oriented architecture (service-oriented architecture, SOA). A total of three parts of this series, this is the 1th part of this article, which will cover a 10-step process to help you work from building an
ArticleDirectory
SOAP message monitoring
SAML and Federated identity verification
Application proxy
Contract Management
Certificates, keys, and encryption
XML Encryption
Digital Signature
Protection and audit of replay attacks
The advice provided by wise managers: do not let security scare you
Conclusion
Article from: http://dev2dev.bea.com.cn/techdoc/20060720848.html
This article describes the
At first glance, there seems to be nothing special about SOA security. After all, it (as with other architectural scenarios) involves the same basic topics as authentication, authorization, identity, trust, confidentiality, integrity, and policy management.
Even so, the SOA architecture is more difficult to control safely-enough to make
expand in other areas, so we've launched an XML accelerator." ”
However, Negm stressed that accelerators have become part of the Forum Sentry SOA gateway and Forum Xwall WEB Services firewall from the beginning. "When we are attacked, the XML accelerator has always been the basis for the product to be trusted, so we always consider it a basic function to speed up transaction processing for the user." In the past, we just wanted to focus our energies
based security or identity based security as a supplementary mechanism, at this time, we also need to fully combine the characteristics of the combination mode and iterator mode to solve the issue of authorization at different levels.
If you have browsed design patterns before --Based on C #Engineering implementation and expansion of gof23The introduction of t
Public key system and distributed environment requirements
Vision Wang)
2009-02-10 Summary
As a continuation of the first version of "Design Patterns-engineering implementation and expansion based on C #", we plan to launch the security design patterns series and integration pattern series) data pattern, data access pattern, XML application pattern, and UX p
Address: http://pan.baidu.com/s/1dFhBu2d Password: peasTurn a play code, more than 200 lessons! This course is for the MVC5 version of ASP. NET MVC, but also involves too much of the underlying implementation of content, so most of them can not find out-of-the-box resources, mostly from the instructor's analysis of the source code and test proof, there are shortcomings, please understand, each chapter of this course will provide a series of examples of demonstration, You can find the correspondi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.