WS-Policy F2F Austin, TX July 2006 Report on WS-Policy Interop Workshop of April 2006 (Round 3) Toufic Boubez Layer 7 Technologies.

Slides:



Advertisements
Similar presentations
Andrea Maurino Web Service Design Methodology Batini, De Paoli, Maurino, Grega, Comerio WP2-WP3 Roma 24/11/2005.
Advertisements

1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
OGSA Security Profile 2.0 (a.k.a. Express Authentication Profile) DUANE MERRILL October 18, 2007.
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Primer Maryann Hondo, IBM Umit Yalcinalp, SAP. Current Proposal Introduction The WS-Policy specification defines a policy to be a collection of policy.
Jeff Mischkinsky Nickolas Kavantzas Goran Olsson Web Services Choreography.
® IBM Software Group © IBM Corporation WS-Policy Attachment- spec overview Maryann Hondo IBM.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
1 GRID applications control based on synchronizers, D. Kopanski *, J. Borkowski *, M. Tudruj The Cracow Grid Workshop 2004 D. Kopanski *, J. Borkowski.
Server Access The REST of the Story David Cleary
Week 2 The Object-Oriented Approach to Requirements
Research & development Towards a Versatile Contract Model to Organize Behavioral Specifications Philippe Collet 1, Alain Ozanne 2 and Nicolas Rivierre.
1 WSDL: Web Service Description Language Gary Sharp Mike Breakiron.
Siebel Web Services Siebel Web Services March, From
GETTING STARTED WITH WINDOWS COMMUNICATION FOUNDATION 4.5 Ed Jones & Grey Guindon.
Service Description: WSDL COMP6017 Topics on Web Services Dr Nicholas Gibbins –
EPOCH 1000 Series Software Update New Features - March 2010.
WS eHealth MediPrima Service presentation. 2 21/08/2012 Access to the WS  Access to the webservice “eCarmed” Certificate required Cfr : Schema eCarmed_WSDL_v1_0_4.zip.
IONA Technologies Position Paper Constraints and Capabilities for Web Services
WS-Policy Brian Garback. 2 Agenda  Introduction  Domain Terminology  Policy Expressions  Policy Assertions  Policy Attachments  Conclusion  Policy.
Claus von Riegen, SAP AG WS-Policy Overview W3C Workshop on Constraints and Capabilities for Web Services.
Service Component Architecture Assembly Model Specification Version 1.1 Assembly-33 – Long-Running Request-Response Operations.
Shortest Violation Traces in Model Checking Based on Petri Net Unfoldings and SAT Victor Khomenko University of Newcastle upon Tyne Supported by IST project.
On Specification and Verification of Location- Based Fault Tolerant Mobile Systems Alexei Iliasov, Victor Khomenko, Maciej Koutny and Alexander Romanovsky.
1: requestQuote 2: orderGoods 3: makePayment customer (client) supplier (Web service) The internal business logic of clients and Web services must support.
XML Web Services Monash University Semester 1, March 2006.
31242/32549 Advanced Internet Programming Advanced Java Programming
WS – Security Policy Prabath Siriwardena Director, Security Architecture.
Addition 1’s to 20.
Test B, 100 Subtraction Facts
Presentation 7 part 2: SOAP & WSDL.
Week 1.
1 XML Web Services Practical Implementations Bob Steemson Product Architect iSOFT plc.
Web Services Darshan R. Kapadia Gregor von Laszewski 1http://grid.rit.edu.
Web Services Nasrullah. Motivation about web service There are number of programms over the internet that need to communicate with other programms over.
Presentation 7 part 2: SOAP & WSDL. Ingeniørhøjskolen i Århus Slide 2 Outline Building blocks in Web Services SOA SOAP WSDL (UDDI)
Latest techniques and Applications in Interprocess Communication and Coordination Xiaoou Zhang.
Windows Communication Foundation and Web Services.
WSDL Web Services Description Language Neet Wadhwani University of Colorado 3 rd October, 2001.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Web Service Standards, Security & Management Chris Peiris
Module 14: WCF Send Adapters. Overview Lesson 1: Introduction to WCF Send Adapters Lesson 2: Consuming a Web Service Lesson 3: Consuming Services from.
James Holladay, Mario Sweeney, Vu Tran. Web Services Presentation Web Services Theory James Holladay Tools – Visual Studio Vu Tran Tools – Net Beans Mario.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
1 Web Service Description Language (WSDL) 大葉大學資工系.
1 Web Services Web and Database Management System.
Kemal Baykal Rasim Ismayilov
Introduction to Web Services. SOAP SOAP originally stood for "Simple Object Access Protocol". Web Services expose useful functionality to Web users through.
Web Services Security Patterns Alex Mackman CM Group Ltd
Introduction to Web Services Presented by Sarath Chandra Dorbala.
1 WS-Policy. 2 What’s the Problem? To use a web service a client needs more information than is provided in WSDL file. Examples: –Does service support.
Service Description: Addressing & Policy COMP6017 Topics on Web Services Dr Nicholas Gibbins –
Jackson, Web Technologies: A Computer Science Perspective, © 2007 Prentice-Hall, Inc. All rights reserved Chapter 9 Web Services: JAX-RPC,
Sabri Kızanlık Ural Emekçi
T Network Application Frameworks and XML Web Services and WSDL Sasu Tarkoma Based on slides by Pekka Nikander.
Implementing a service-oriented architecture using SOAP
Techniques to Invoke Web Services from SAS
Presentation transcript:

WS-Policy F2F Austin, TX July 2006 Report on WS-Policy Interop Workshop of April 2006 (Round 3) Toufic Boubez Layer 7 Technologies

WS-Policy F2F – July Logistics Host: SAP, Walldorf, Germany Dates: April 25-27, 2006 Participating companies: BEA, IBM, Microsoft, Layer 7, SAP, Sun, WSO2

WS-Policy F2F – July Purpose and Scenarios Purpose: To exercise substantial parts of the Policy Framework and Policy Attachment for WSDL in the context of a security policy domain; To ensure a shared understanding of the basic interoperability of the domain independent parts of the framework. Out of Scope: Acquisition of policy expressions; Cert exchanges; Round 1 and Round 2 testing.

WS-Policy F2F – July Round 1: Normalize, Merge and Intersect Normalize, Merge and Intersect exposed as WS operations. For example, Merge operation exchange: <s12:Envelope xmlns:s12=" xmlns:wsp=" > (... )+ <s12:Envelope xmlns:s12=" xmlns:wsp="

WS-Policy F2F – July Round 2: Computing Effective Policy Effective Policy computations exposed as WS operations. Operations take WSDL with Policy attachments and return effective policy for policy subject in normal form. Operations exposed are: EffectivePolicy4Input EffectivePolicy4Output EffectivePolicy4Fault EffectivePolicy4Operation EffectivePolicy4Endpoint EffectivePolicy4Service Service PortName OperationName

WS-Policy F2F – July Round 3 Configuration Simple echo Web service endpoint(s) exposed; Policy expressions attached to WSDL; Policy domain is WS-SecurityPolicy; WSDL provided out of band as part of the setup. One null scenario (test scenario - no policy); Two policy scenarios, with two test cases each: Scenario 1: Transport security policy Case T1: SSL with no client cert, Basic256Rsa15 as algorithm, timestamp required, no supporting UsernameToken; Case T3: Same as T1, but with UsernameToken appearing as SignedSupportingToken. Scenario 2: X509 security policy Case A11: X509v3 token, Basic256Rsa15, timestamp required, signing of body and header; Case A12: Same as A11, but with TripleDesRsa15 as algorithm.

WS-Policy F2F – July Echo Service WSDL <xs:schema targetNamespace=" blockDefault="#all" elementFormDefault="qualified" >

WS-Policy F2F – July Binding for Scenario 0: No Security

WS-Policy F2F – July Binding for Test Case T1

WS-Policy F2F – July Policy Expression for Test Case T1

WS-Policy F2F – July Policy Expression for Test Case T3: T1 + UsernameToken

WS-Policy F2F – July Binding for Test Case A11

WS-Policy F2F – July Policy Expression for Test Case A11 Binding

WS-Policy F2F – July Policy Expression for Test Case A11 Messages

WS-Policy F2F – July Policy Expression for Test Case A12: A11 with TripleDes

WS-Policy F2F – July Feedback No WS-Policy framework or WS-PolicyAttachment issues. Issues are mainly related to the practical specifics of the interop environment and security processing: Time synch: Certain clocks needed to be re-synched frequently throughout the day due to drift; conflicts about UTC local time. Whitespace: Line breaks and indentations in request SOAP Body causing problems for some toolkits (but only if the request was also encrypted).

WS-Policy F2F – July Clarifications and Observations WS-P: If assertion requires use of HTTPS transport level security and WSDL port address uses HTTP scheme, what is the recommendation? Should non-standard policy assertions be marked optional? There are behaviors that may be engaged for a Web service interaction. The provider will not fault if these behaviors are not engaged. These behaviors should be marked optional. For unrecognized assertions, tools should use a tolerant implementation strategy where they are consumed and designated for user intervention. The desire was expressed to create a more explicit description of the responsibilities and concerns between the policy framework level and policy assertion level. A primer would be a natural residence for this material. The desire was expressed to improve the readability of the fourth paragraph in section WS-Policy that describes the normalization rules for nested policy expression. WS-SP: WS-SecurityPolicy specifies default nested policy assertions. Should the provider explicitly state these assertions or be implicit? From intersection perspective at the policy framework level, these assertions must be explicitly stated to avoid false negatives. is an assertion parameter. Some suggested that it should be an assertion.

WS-Policy F2F – July Client/ ServerP1P2P3P4P5P6P7 P1 NoSe c T1 T3 A11 A12 P2 NoSe c T1 T3 A11 A12 P3 NoSe c T1 T3 A11 A12 P4 NoSe c T1 T3 A11 A12 P5 NoSe c T1 T3 A11 A12 P6 NoSe c T1 T3 A11 A12 P7 NoSe c T1 T3 A11 A12 Results