Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004.

Slides:



Advertisements
Similar presentations
Managing Service-Oriented Architectures Jim Bole VP Professional Services Infravio, Inc June 7,
Advertisements

0 McLean, VA August 8, 2006 SOA, Semantics and Security.
Service Oriented Architecture Terry Woods Session 50.
Web Services Security Enterprise Architect Summit – 2004 Mark O’Neill CEO.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
Lecture 23 Internet Authentication Applications
Oracle Fusion Middleware
Service Oriented Architecture Concepts March 27, 2006 Chris Armstrong
Federal Student Aid Technical Architecture Initiatives Sandy England
Independent Insight for Service Oriented Practice Communicating SOA.
Leveraging Technology to Enhance PeopleSoft Web Services (SOA) System Efficiency Lorne Kaufman, Managing Director.
SOA with Progress Philipp Walther Consultant. © 2007 Progress Software Corporation2 Agenda  SOA  Enterprise Service Bus (ESB)  The Progress SOA Portfolio.
6/4/2015Page 1 Enterprise Service Bus (ESB) B. Ramamurthy.
CSC-8530: Distributed Systems Christopher Salembier 28-Oct-2009.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Security in Service Oriented and REST architectures SiliconIndia Java Conference, Nimhans, Bangalore 29 Oct 2010 Srinivas Padmanabhuni, Ph.D. Principal.
Realising the Potential of Service Oriented Architecture Kris Horrocks Connected Systems Division Microsoft.
Automated Policy Enforcement Adam Vincent, Layer 7 Federal Technical Director
Peoplesoft: Building and Consuming Web Services
Web services security I
Enterprise Resource Planning
CONNECT EVERYTHING. ACHIEVE ANYTHING. ™ Top Ten Enterprise Service Bus (ESB) Myths Gordon Van Huizen CTO, Sonic Software March 17, 2005.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SOA, BPM, BPEL, jBPM.
Web Service Standards, Security & Management Chris Peiris
“This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
Ganesh Kirti Roger Sullivan Oracle Corporation “This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
Web Services (Part 1) Service-Oriented Architecture Overview ITEC 625 Web Development Fall 2006 Reference: Web Services and Service-Oriented Architectures.
C Copyright © 2009, Oracle. All rights reserved. Appendix C: Service-Oriented Architectures.
PROJECT NAME: DHS Watch List Integration (WLI) Information Sharing Environment (ISE) MANAGER: Michael Borden PHONE: (703) extension 105.
Web Services and HL7v3 in IHE profiles Vassil Peytchev Epic.
© 2009 IBM Corporation Integrating WSRR and DataPower Andrew White – Software Developer 18 March 2010.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
FIORANO FOR SAAS.  Fiorano addresses the need for integration technology that bridge the gap between SaaS providers and Consumers.  Fiorano enables.
INT-11: It’s Monday Morning, Do You Know Where Your Service Has Been? Service Management with Sonic ™ and Actional Marv Stone Progress Software.
What is Service Oriented Architecture ? CS409 Application Services Even Semester 2007.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
CSI302 实施 BTS 的策略与技巧 郑开颜应用架构顾问产品部微软有限公司. What We Will Cover: Interoperability w/ BizTalk Server Composite Business Processes Integration Broker Internals.
1 Advanced Software Architecture Muhammad Bilal Bashir PhD Scholar (Computer Science) Mohammad Ali Jinnah University.
1 Geospatial and Business Intelligence Jean-Sébastien Turcotte Executive VP San Francisco - April 2007 Streamlining web mapping applications.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Databases JDBC (Java Database Connectivity) –Thin clients – servlet,JavaServer Pages (JSP) –Thick clients – RMI to remote databases –most recommended way.
Enterprise Computing: Web Services
Infrastructure Service Approach to Handling Security in Service-Oriented Architecture Business Applications Doina Iepuras.
Kemal Baykal Rasim Ismayilov
Deconstructing API Security
David Smiley SOA Technology Evangelist Software AG Lead, follow or get out of the way Here Comes SOA.
1 Web Services Policy Management Greg Pavlik Web Services Architect Oracle Corporation May 11, 2005.
SOA-05: Building an Enterprise SOA Using ESB Dave Chappell Vice President & Chief Technology Evangelist, Sonic Software.
BEA position on W3C ‘Web Services’ Standards Jags Ramnarayan 11th April 2001.
Web Services Security Mike Shaw Architectural Engineer.
SAP Integration with Oracle 11g Muhammad Raza Fatmi.
Service Oriented Architecture (SOA) Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Sabri Kızanlık Ural Emekçi
Ian Goldsmith – VP, Product Management, SOA Software
Enterprise Service Bus (ESB) (Chapter 9)
Service Oriented Architecture (SOA)
Presentation transcript:

Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Successful Internet Standards Person SMTP S/MIME Instant Messaging PersonProgram HTML DHTML Applets XML Schema SOAP WSDL WS-Security Broadly Accepted Loosely Coupled Cross Organization Extensible

Service-Oriented Architecture (SOA) organizing business systems as reusable components not fixed processes SOA = standards based + loosely-coupled + robust Reusable =

Diverse Web Services XML allows all to play Most heavily used Services have most primitive standards support. Systems doing billions in transactions today began development 18+ months ago New code written with current version of J2EE and.NET Legacy applications, Packaged applications, Specialized devices

Diverse Service Consumers Outsourced Call Center Accounts Receivable On-line Marketing Programs Employees’ Contact Managers Independent Agents Common Customer Data Repository

Key Characteristics Thousands of distinct consumers Identity of human that triggered the request is commonly used in program-to-program communication Spread over hundreds of organizations With different tools and IT teams. In practice it is unknowable to service what tools will be used by consumer. At different levels of standards support XML Schema, SOAP, WSDL, WS- Security, WS-Policy Outsourced Call Center Accounts Receivable On-line Marketing Programs Employees’ Contact Managers Independent Agents Common Customer Data Repository

Key Characteristics With different network architectures and transports in use HTTP, HTTPS, MQ, TIBCO, JMS With different security mechanisms deployed Authentication, encryption, signature, content scanning, malicious attack protections, message validation With identity data in multiple non- federated systems Directories, ID management systems, certificates supported by PKIs, single sign-on systems, etc. Outsourced Call Center Accounts Receivable On-line Marketing Programs Employees’ Contact Managers Independent Agents Common Customer Data Repository

Key Question How do you secure all Web Services while enabling appropriate access, given diversity of security mechanisms and policies?

What to do –Make every endpoint behave the same way –Make single repository for all shared data –Make every endpoint capable of behaving every way –Negotiate preferences at runtime –Have federated sharing across multiple repositories –Use infrastructure to define Service Views –Services and consumers stay as is –Service View abstraction layer mediates between them Naïve Response Elegant Response Practical Response

Service Views Present Secure Interfaces Each Service View Provide instant security, interoperability, monitoring, routing, and auditing Enables contracts between consumer and provider supporting local and global policies Automatically supports latest standards Support instant interoperability Leverage existing infrastructure Hide back end complexity Requires No Change of Base Services Service View.NET J2EE Packaged App Legacy System ESB, MQ,JMS Composite Services Security for SOA Infrastructure Security Management Standards Interoperability XML Acceleration SOA Related Infrastructure Flexible Deployment Scalable Administration Auth Directory Identity Mgmt PKI Network Mgmt UDDI System Mgmt

Advantages of Service Views design Base web service does not change Consumer does not change Service View appears as native web service to consumer Allows different security mechanism assumptions at service and consumer Allows different standards assumptions at service and consumer Allows different transport assumption at service and consumer Offloads from service developer need to support full range of security standards and mechanisms Is deployable today Implements loose-coupling while satisfying practical requirements

Implementation of Secure Service Views Needed Web Services infrastructure goes by many names: Service Virtualization, Web Services Management Platform, XML Firewall, SOAP Gateway, Web Service Gateway, etc. etc. Multiple vendors provide offerings Key Review Criteria: Security Monitor, Report, Alert Interoperability Interface Management

Security Authentication, Access Control Encryption, Signature Malicious Attack, Content Inspection Schema Validation, Standards Westbridge XMS Service Consumer Existing Security Infrastructure Web Service Network Firewall Authentication, Access Control Authorities, RSA, Oblix, Netegrity, LDAP, SAML,X.509, HTTP, Authentication, Active Directory, PKI Infrastructure, CRL, OCSP, 3DES, SHA, XML Encryption, XML Signature, WS Security Existing Security Infrastructure Network Attack Application Attack HTTP JMS MQ HTTPS

Last Request Latency Messages per Second Avg. Message Size Failed Requests SLA Monitoring Troubleshooting Perf. Monitoring Real-time View Malicious Attacks Requests > $10,000 Authorization Failed Weekend Activity Audit Trails Regulatory Debugging SLA Reporting Malicious Attack Paging Exceed Message Rate sends SNMP Trap Triggers Exceptions Debugging SLA Enforcement Example Benefits Monitor, Report, Alert Variety of status notifications can be utilized Service Tracker Monitors connected services SAP Mainframe.NET PeopleSoft J2EE MS Excel Monitoring ReportingAlerting Service Tracker

Interoperability Standards Support XML, SOAP, WSDL.NET, SunOne, IBM, WS-I, Oasis, W3C, BEA, Oracle, Microsoft, etc. Transport –HTTP, HTTPS (SSL), JMS, MQ, Tibco Security –XML Signature, signatures (RSA-SHA1, DSA SHA1), XML Encryption, encryption (RSA Keys, 3DES, AES, 128/192/256 bit keys), –SAML, LDAP, WS-Security, HTTP-based authentication –Active Directory, XKMS, OCSP, PKI Infrastructure (including PKCS#7, #10, #11, #12), CRL, X.509 Certificates, XML –XML Schema, DTD –XPath, XSLT –Alerting: SNMP and SMTP Data Transformation Routing Transport Mediation Credential Mapping X.509Liberty XMS Gateway SAMLLDAPWS Sec.Etc… Web Services XMS Gateway Web Service XMS Gateway Web ServicesWeb Service Web Services Service Consumer

Interface Management Publishing Workflow Service Upgrades Provisioning Versioning XMS Manager Configure StageTest Publish Customers Partners Sales Web Service Service View

Summary Real-world considerations create barriers to the loosely- coupled vision of Web Services and SOA, while maintaining required security. The “naïve” response creates tight-coupling and does not scale up The “elegant” response requires a couple more generations of standards and tools development The “practical” response uses current tools to implement Service Views.