Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

SAML 2nd

       addresses

                problems with 2nd 3rd 4th

        assertions

                attribute 2nd

                authorizatin 2nd

                elements 2nd

                XML Schema

        attribute assertions

        attribute requests 2nd

        authentication assertions 2nd 3rd 4th 5th 6th

        authentication context 2nd 3rd

        authentication requests 2nd

        authorization assertions

        authorization requests 2nd 3rd 4th 5th

        bindings

        Microsoft Passport and 2nd 3rd

        overview 2nd 3rd 4th 5th 6th 7th

        PDP

        PEP

        portable trust and

        profiles 2nd 3rd

                Project Liberty

                WS Security and

                WS Security and 2nd

        Project Liberty

                digital identities 2nd 3rd

                federated identities

                profiles

                uses 2nd 3rd 4th

        protocols 2nd 3rd 4th 5th 6th

                responses 2nd

        PRP

        security tokens 2nd 3rd 4th 5th 6th 7th

        trust assertions 2nd

        WS Federation and

SAML (Security Assertion Markup Language)

SAML bindings 2nd 3rd 4th

secret key encryption

security

        authentication 2nd 3rd

        authorization 2nd 3rd

       built-in

                trust services and

        confidentiality

        cryptography

                public key 2nd

                shared key

        integrity 2nd

        keys

       message-based

                WebLogic Workshop Web services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th

       message-level

                WebLogic Workshop 2nd 3rd 4th

        non- repudiation 2nd 3rd

        overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

       role-based

                JWS and

                WebLogic Workshop

        SHA-1

        SOAP and

        tokens

       transport-level

                WebLogic Workshop and 2nd

                WebLogic Workshop Web services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

       Web Services

                issues 2nd 3rd

        WebLogic Security Framework

        WSDL and

        XML and 2nd 3rd 4th 5th 6th 7th

       XML Signature

                keys

                security model

security context establishment

security specifications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th

Security Token Services

        trust and

security tokens

        referencing 2nd 3rd 4th 5th

        SOAP 2nd 3rd 4th 5th

        WS Security 2nd 3rd

                BinarySecurityToken

                referencing

                XML tokens 2nd 3rd 4th

        WS Security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th

                BinarySecurityToken 2nd 3rd 4th 5th 6th

                referencing 2nd 3rd 4th 5th 6th 7th 8th

                UsernameToken 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

                validation 2nd

                XML tokens 2nd 3rd 4th 5th 6th 7th 8th 9th

        XML

                SAML 2nd 3rd 4th 5th 6th 7th

                XCBF

                XrML 2nd 3rd 4th

SecurityHeader assertion, WS SecurityPolicy 2nd

SecurityToken assertion, WS SecurityPolicy 2nd 3rd 4th 5th 6th 7th

service-oriented architectures

session keys

SGML (Standard Generalized Markup Language)

SHA-1

        security

SHA-1 (Secure Hash Algorithm 1)

SHA-1 (Secure Hash Algorithms)

        collision resistance 2nd

shared authentication

shared key

        public key comparison

shared key cryptography

shared key encryption 2nd 3rd 4th 5th

        block ciphers

        XML 2nd 3rd

        XML Encryption and

shared key technologies

        Kerberos 2nd 3rd

        limitations

shared key technology

        cryptography 2nd 3rd

shared keys

        Kerberos

shared technologies

        encryption 2nd 3rd 4th 5th

Signature element (XML Signature) 2nd 3rd 4th 5th

        CanonicalizationMethod element 2nd 3rd 4th 5th 6th 7th 8th

        DigestMethod element

        DigestValue element

        KeyInfo element 2nd 3rd 4th 5th 6th 7th

                KeyName element

                KeyValue element

                PGPData element

                Retrieval element

                SPKIData element

                X509Data element

        Object element 2nd 3rd 4th

                Manifest element

                SignatureProperties element

        SignatureMethod element 2nd

        SignatureValue element

        Transform element 2nd 3rd

                Base-64 transform

                canonicalization transform

                Enveloped Signature Transform 2nd

                XPath Filter 2.0 Transform 2nd

                XPath Filtering Transform 2nd

                XSLT Transform

SignatureMethod element (XML Signature) 2nd 3rd

SignatureProperties element (XML Signature)

signatures

        DSA Signatures 2nd 3rd 4th

        hash functions 2nd

SignatureValue element (XML Signature)

SignedInfo element (XML Signature)

signing

        digital signatures and

Silvio Micali, validation/revocation 2nd 3rd 4th 5th

SOA (service-oriented architecture)

SOAP

        attachments 2nd

        body 2nd 3rd

                RPC-style

        envelope

        extending with security 2nd 3rd 4th 5th

        header

        headers 2nd

        introduction 2nd 3rd

       message security

                transport level security and 2nd 3rd 4th 5th 6th 7th 8th 9th

       messages

                time stamps 2nd 3rd 4th 5th

        processors

        remote applications and 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

        security and

        security tokens 2nd 3rd 4th 5th

       WS Security

                encrypted attachments

       WS Security and

                security token references

        WSDL and 2nd

        WS SecureConversation and 2nd 3rd 4th 5th 6th 7th 8th 9th

       WS Security

                encrypted attachments 2nd 3rd

                headers

                XML encryption 2nd 3rd 4th 5th 6th 7th

        WS Security and

                message integrity validation

                security token references 2nd

                security token validation 2nd

SOAP (Simple Object Access Protocol)

        history 2nd 3rd 4th 5th 6th

SpecVersion assertion, WS Policy

SSL

        client certificates

SSL (Secure Socket Layer) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

SSL (Secure Sockets Layer) protocol 2nd 3rd

SSO (Single Sign-on Services)

super encryption

symmetric encyription

 <  Day Day Up  >    

Категории