web services security patterns , practices & threats

37
Web Services Security Patterns, Practices & Threats Prabath Siriwardena – Software Architect, WSO2

Upload: violet

Post on 23-Feb-2016

40 views

Category:

Documents


0 download

DESCRIPTION

Web Services Security Patterns , Practices & Threats. Prabath Siriwardena – Software Architect, WSO2. Plan for the session. Patterns. Standards. Implementations. Recurring Problems. 1995. 1997. 1999. 2004. 2005. SAML2 Web SSO. 2008/May. Direct Authentication for Web Services. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Web Services Security Patterns , Practices & Threats

Web Services Security

Patterns, Practices

&

Threats

Prabath Siriwardena – Software Architect, WSO2

Page 2: Web Services Security Patterns , Practices & Threats

Patterns

Standards

Implementations

Plan for the session

Page 3: Web Services Security Patterns , Practices & Threats

Recurring Problems

Page 4: Web Services Security Patterns , Practices & Threats

Patterns

Authentication Patterns

Confidentiality Patterns

Authorization Patterns

Page 5: Web Services Security Patterns , Practices & Threats

1995 1997

Page 6: Web Services Security Patterns , Practices & Threats
Page 7: Web Services Security Patterns , Practices & Threats

1999

Page 8: Web Services Security Patterns , Practices & Threats

2004

Page 9: Web Services Security Patterns , Practices & Threats

2005

SAML2 Web SSO

Page 10: Web Services Security Patterns , Practices & Threats

2008/May

Page 11: Web Services Security Patterns , Practices & Threats

AuthenticationPatterns

Direct Authentication

Brokered Authentication

Page 12: Web Services Security Patterns , Practices & Threats

Basic Authentication

Mutual Authentication

2-legged OAuth

Direct Authentication for Web Services

Tran

spor

t Lev

el

Page 13: Web Services Security Patterns , Practices & Threats

UsernameToken Profile with WS-Security

Signing – X.509 Token Profile with WS-Security

Direct Authentication for Web Services

Mes

sage

Lev

el

Page 14: Web Services Security Patterns , Practices & Threats

Mutual Authentication

2-legged OAuth

Brokered Authentication for Web Services

Tran

spor

t Lev

el

Page 15: Web Services Security Patterns , Practices & Threats

WS-Trust / STS

WS-Federation

Brokered Authentication for Web Services

Mes

sage

Lev

el

Signing – X.509 Token Profile with WS-Security

Kerberos Token Profile for WS-Security

Resource STS

Page 16: Web Services Security Patterns , Practices & Threats
Page 17: Web Services Security Patterns , Practices & Threats

2006/April

Page 18: Web Services Security Patterns , Practices & Threats

2006/June

Page 19: Web Services Security Patterns , Practices & Threats

2008/2009

Page 20: Web Services Security Patterns , Practices & Threats

2008/2009

Page 21: Web Services Security Patterns , Practices & Threats

2008/2009

Page 22: Web Services Security Patterns , Practices & Threats

2007/Dec

Page 23: Web Services Security Patterns , Practices & Threats

2007/Dec

Page 24: Web Services Security Patterns , Practices & Threats

AuthorizationPatterns

Direct Authorization

Delegated Authorization

Page 25: Web Services Security Patterns , Practices & Threats

AuthorizationPatterns

Direct Authorization

Delegated Authorization

ActAs in WS-Trust 1.4

Page 26: Web Services Security Patterns , Practices & Threats

2005/Feb

Page 27: Web Services Security Patterns , Practices & Threats

Message Interceptor Gateway Pattern

Trusted Sub System Pattern

Security Solution PatternsM

essa

ge L

evel

Page 28: Web Services Security Patterns , Practices & Threats

UsernameToken Profile

SOAP SecurityM

essa

ge L

evel

Page 29: Web Services Security Patterns , Practices & Threats

X.509 Token Profile & Key Referencing

Mes

sage

Lev

elSOAP Security

Key Identifiers

Direct References

Page 30: Web Services Security Patterns , Practices & Threats

Symmetric Binding Vs Asymmetric Binding

Mes

sage

Lev

elSOAP Security

Page 31: Web Services Security Patterns , Practices & Threats

Mes

sage

Lev

elSOAP Security

• WS-Security secures SOAP – focuses on message level security

• Focuses on a single message authentication model

• Each message contains everything necessary to authenticate it self

• Suitable for a coarse grained messaging in which a single message at a time from the same requestor is receivedW

S – S

ecur

e Co

nver

satio

n

Page 32: Web Services Security Patterns , Practices & Threats

Mes

sage

Lev

elSOAP Security

WS

– Sec

ure

Conv

ersa

tion

• What SSL does at the transport level in point-to-point communication, WS-SecureConversation does at the SOAP layer

• Removes the need of individual SOAP message carrying authentication information.

• Establishes a mutually authenticated security context in which a series of messages are exchanged.

• Uses public key encryption to exchange a shared secret and then onwards uses the shared key

Page 33: Web Services Security Patterns , Practices & Threats

WS-Trust

Mes

sage

Lev

elSOAP Security

Page 34: Web Services Security Patterns , Practices & Threats

Sender Vouches – Subject ConfirmationMes

sage

Lev

elSOAP Security

Page 35: Web Services Security Patterns , Practices & Threats

Mes

sage

Lev

elSOAP Security

Holder-of-Key – Subject Confirmation

Page 36: Web Services Security Patterns , Practices & Threats

WS-Security Policy

Mes

sage

Lev

elSOAP Security

Page 37: Web Services Security Patterns , Practices & Threats

Thank You…!!!

[email protected]