37
Prabath Siriwardena – Software Architect, WSO2

Web Service Security

Embed Size (px)

DESCRIPTION

@ApacheCon 2011

Citation preview

Page 1: Web Service Security

Prabath  Siriwardena  –  Software  Architect,  WSO2  

Page 2: Web Service Security

Patterns

Standards

Implementations

Plan for the session

Page 3: Web Service Security

Recurring Problems

Page 4: Web Service Security

Patterns

Authentication Patterns

Confidentiality Patterns

Authorization Patterns

Page 5: Web Service Security

1995 1997

Page 6: Web Service Security
Page 7: Web Service Security

1999

Page 8: Web Service Security

2004

Page 9: Web Service Security

2005

SAML2 Web SSO

Page 10: Web Service Security

2008/May

Page 11: Web Service Security

Authentication Patterns

Direct Authentication

Brokered Authentication

Page 12: Web Service Security

Basic Authentication

Mutual Authentication

2-legged OAuth

Direct Authentication for Web Services

Tran

sport  L

evel  

Page 13: Web Service Security

UsernameToken Profile with WS-Security

Signing – X.509 Token Profile with WS-Security

Direct Authentication for Web Services

Message

 Lev

el  

Page 14: Web Service Security

Mutual Authentication

2-legged OAuth

Brokered Authentication for Web Services

Tran

sport  L

evel  

Page 15: Web Service Security

WS-Trust / STS

WS-Federation

Brokered Authentication for Web Services

Message

 Lev

el  

Signing – X.509 Token Profile with WS-Security

Kerberos Token Profile for WS-Security

Resource  STS  

Page 16: Web Service Security
Page 17: Web Service Security

2006/April

Page 18: Web Service Security

2006/June

Page 19: Web Service Security

2008/2009

Page 20: Web Service Security

2008/2009

Page 21: Web Service Security

2008/2009

Page 22: Web Service Security

2007/Dec

Page 23: Web Service Security

2007/Dec

Page 24: Web Service Security

Authorization Patterns

Direct Authorization

Delegated Authorization

Page 25: Web Service Security

Authorization Patterns

Direct Authorization

Delegated Authorization

ActAs  in  WS-­‐Trust  1.4  

Page 26: Web Service Security

2005/Feb

Page 27: Web Service Security

Message Interceptor Gateway Pattern

Trusted Sub System Pattern

Security Solution Patterns Message

 Lev

el  

Page 28: Web Service Security

UsernameToken Profile

SOAP Security Message

 Lev

el  

Page 29: Web Service Security

X.509 Token Profile & Key Referencing

Message

 Lev

el  

SOAP Security

Key  Identifiers  

Direct  References  

Page 30: Web Service Security

Symmetric Binding Vs Asymmetric Binding

Message

 Lev

el  

SOAP Security

Page 31: Web Service Security

Message

 Lev

el  

SOAP Security

•  WS-­‐Security  secures  SOAP  –  focuses  on  message  level  security  

•  Focuses  on  a  single  message  authentication  model  

•  Each  message  contains  everything  necessary  to  authenticate  it  self  

•  Suitable  for  a  coarse  grained  messaging  in  which  a  single  message  at  a  time  from  the  same  requestor  is  received  WS  –  Se

cure  Con

versation  

Page 32: Web Service Security

Message

 Lev

el  

SOAP Security WS  –  Se

cure  Con

versation   •  What  SSL  does  at  the  transport  level  in  point-­‐to-­‐point  

communication,  WS-­‐SecureConversation  does  at  the  SOAP  layer  

•  Removes  the  need  of  individual  SOAP  message  carrying  authentication  information.  

•  Establishes  a  mutually  authenticated  security  context  in  which  a  series  of  messages  are  exchanged.  

•  Uses  public  key  encryption  to  exchange  a  shared  secret  and  then  onwards  uses  the  shared  key  

Page 33: Web Service Security

WS-Trust

Message

 Lev

el  

SOAP Security

Page 34: Web Service Security

Sender Vouches – Subject Confirmation

Message

 Lev

el  

SOAP Security

Page 35: Web Service Security

Message

 Lev

el  

SOAP Security

Holder-of-Key – Subject Confirmation

Page 36: Web Service Security

http://wso2.org/library/3786

SOAP Security

http://wso2.org/library/3132

WS – Security Policy

Page 37: Web Service Security