Tim Bornholtz Director of Technology Services

Slides:



Advertisements
Similar presentations
UDDI v3.0 (Universal Description, Discovery and Integration)
Advertisements

Web Service Security CS409 Application Services Even Semester 2007.
A Public Web Services Security Framework Based on Current and Future Usage Scenarios J.Thelin, Chief Architect PJ.Murray, Product Manager Cape Clear Software.
Integration Considerations Greg Thompson April 20 th, 2006 Copyright © 2006, Credentica Inc. All Rights Reserved.
1 Security Assertion Markup Language (SAML). 2 SAML Goals Create trusted security statements –Example: Bill’s address is and he was authenticated.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Web services security I
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Service Standards, Security & Management Chris Peiris
1 Web Services and E-Authentication Adele Marsh, AES Charlie Miller, RIHEAA Session 35.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Web Services Description Language (WSDL) Jason Glenn CDA 5937 Process Coordination in Service and Computational Grids September 30, 2002.
WSDL Tutorial Ching-Long Yeh 葉慶隆 Department of Computer Science and Engineering Tatung University
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
XML – An Introduction Structured Data Mark-up James McCartney CSCE 590, Cluster and Grid Computing.
WS-Trust Joseph Calandrino Vincent Noël Department of Computer Science University of Virginia February 9, 2004.
An XML based Security Assertion Markup Language
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
WS-Trust “From each,according to his ability;to each, according to his need. “ Karl marx Ahmet Emre Naza Selçuk Durna
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Dr. Rebhi S. Baraka Advanced Topics in Information Technology (SICT 4310) Department of Computer Science Faculty of Information Technology.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Kemal Baykal Rasim Ismayilov
1 E-Authentication and Web Services Charlie Miller, RIHEAA.
Security Assertion Markup Language (SAML) Interoperability Demonstration.
Introduction to Web Services Presented by Sarath Chandra Dorbala.
The Secure Sockets Layer (SSL) Protocol
Access Policy - Federation March 23, 2016
TOPIC: HTTPS (Security protocol)
GEOSS Federated Single Sign-On
Federation made simple
OGSA-WG Basic Profile Session #1 Security
A Web Services Journey on the .NET Bus
HMA Identity Management Status
Cryptography and Network Security
Secure Sockets Layer (SSL)
Web Service Interview/VIVA
Unit – 5 JAVA Web Services
Introduction to Web Services
Web Services Security.
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
THE STEPS TO MANAGE THE GRID
Web Services UNIT 5.
Using SSL – Secure Socket Layer
Overview of Web Services
Web Services Security Challenges
Implementing a service-oriented architecture using SOAP
Pooja programmer,cse department
Chapter 9 Web Services: JAX-RPC, WSDL, XML Schema, and SOAP
Multi-party Authentication in Web Services
Multi-party Authentication in Web Services
The Secure Sockets Layer (SSL) Protocol
WEB SERVICES DAVIDE ZERBINO.
InfiNET Solutions 5/21/
Presentation transcript:

Tim Bornholtz Director of Technology Services tim@prioritytech.com Securing Web Services Tim Bornholtz Director of Technology Services tim@prioritytech.com ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved Web Services Web applications that use programmatic interfaces for application to application communications. Most definitions include these technologies: XML SOAP WSDL UDDI ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved Concerns Using web services for basic system integration and XML interfaces is relatively stable Largest concern today is on securing web services ©2001 Priority Technologies, Inc. All Rights Reserved

Security Requirements Three capabilities must exist for secure web services: Credential Transfer Message Integrity Message Confidentiality ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved Why isn’t SOAP secure? SOAP is simply a standard for sending messages over HTTP using XML The SOAP specification does not address security at all. SOAP contains no protocol limitations Can use HTTP or HTTPS Can use just about any known protocol ©2001 Priority Technologies, Inc. All Rights Reserved

Security Standards The Internet Engineering Task Force (IETF) Organization for the Advancement of Structured Information Standards (OASIS) World Wide Web Consortium (W3C) Have worked on at least 13 different web services security standards. ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved WS-Security W3C standards used XML Encryption XML Signatures Other extension functions Joint effort of many standards bodies and industries IBM Microsoft Verisign ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved WS-Security Generally considered to be the best bet to emerge as the standard. WS-Security interoperability exists for Web Services Enhancements 1.0 for Microsoft .NET IBM Web Services ToolKit 3.3.2 Apache Axis with Apache XML Security ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved Interoperability Interoperability exists depending on which algorithms are used. Common algorithms such as RSA and DSA work fine Each vendor may support algorithms that may not be interoperable with other toolkits ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved XML Encryption Encrypt XML documents and use an XML syntax to represent: Encrypted Content – All encrypted content is still well formed XML Information that enables the intended recipient to decrypt the data ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved XML Signatures XML syntax for representing the signature of a document Procedures for computing and verifying the signature. XML Encryption and XML Signatures are different standards and the use of one does not necessarily imply the use of the other ©2001 Priority Technologies, Inc. All Rights Reserved

Security Assertion Markup Language (SAML) Framework for exchanging security information Assertions about subjects (people or computers) which have an identity in the network. Assertions are issued by SAML authorities - authentication authorities, attribute authorities, and policy decision points. ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved SAML Assertions Authentication Previous authentication acts Assertions should not usually contain passwords Attributes Profile information Preference information Authorization Given the attributes, should access be allowed? ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved Typical Assertion Issuer ID and issuance timestamp Assertion ID Subject Name and security domain Conditions under which the assertion is valid Assertion validity period (NotBefore and NotOnOrAfter) Audience restrictions Target restrictions (intended URLs for the assertion) Application specific conditions ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved Meteor Security All security in Meteor is through the use of industry standard technologies. Centralized registry SAML XML Signatures SSL ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved Centralized Registry Meteor uses a centralized LDAP server to contain: Public keys of all participants Network status information (active, pending, suspended) Contact Information ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved SAML Assertions Meteor SAML Assertions contain Authentication Statement Timestamp, Creator, and Locality (machine) Attributes Subject (Creator) Attribute Name Attribute Namespace Attribute Value ©2001 Priority Technologies, Inc. All Rights Reserved

Authentication Statement <saml:AuthenticationStatement AuthenticationInstant="2002-08-27T03:12:01CDT" AuthenticationMethod="nchelp.org/meteor"> <saml:Subject> <saml:NameIdentifier Name="ED.TIM" SecurityDomain="nchelp.org/meteor"/> </saml:Subject> <saml:AuthenticationLocality DNSAddress="meteor.prioritytech.com" IPAddress="10.110.1.48"> </saml:AuthenticationLocality> </saml:AuthenticationStatement> ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved Attributes <saml:AttributeStatement> <saml:Subject> <saml:NameIdentifier Name="ED.TIM" SecurityDomain="nchelp.org/meteor"> </saml:NameIdentifier> </saml:Subject> <saml:Attribute AttributeName="Role" AttributeNamespace="nchelp.org/meteor"> <saml:AttributeValue>BORROWER</saml:AttributeValue> </saml:Attribute> </saml:AttributeStatement> ©2001 Priority Technologies, Inc. All Rights Reserved

Multiple Security Assertions One SAML Assertion may contain authentication, authorization, and attribute information from several different authorities. Not necessary to have separate assertions for each different SAML authority. ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved XML Signatures The SAML assertion is signed by the entity that created it. When signed, all irrelevant white-space is removed. Sample: Signed Assertion Once signed, the document may not be modified in any way. The entire request is not signed. ©2001 Priority Technologies, Inc. All Rights Reserved

©2001 Priority Technologies, Inc. All Rights Reserved Encryption Meteor does not use XML Encryption The Specification was not available when we began development Plan to move to this as the technology matures Currently all communication is over SSL ©2001 Priority Technologies, Inc. All Rights Reserved

Meteor Security Requirements Three capabilities must exist for secure web services: Credential Transfer SAML Assertions Message Integrity XML Signatures and SSL Message Confidentiality SSL ©2001 Priority Technologies, Inc. All Rights Reserved

Planning an Implementation When planning your own Web Services: Gain a detailed understanding of the potential risks (viruses, hackers, natural disasters) Make a proactive analysis of the consequences and countermeasures in relation to risks Create an implementation strategy for integrating security measures into your enterprise network. ©2001 Priority Technologies, Inc. All Rights Reserved