Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y]

W3C

        XML Signature and

Web

        forms

        protocols

Web services

        definition

        inevitability

        overview

Web Services

        security issues 2nd 3rd

Web services

        specifications 2nd 3rd 4th

       WebLogic Workshop

                overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th

                views 2nd 3rd

        XML and 2nd

WebLog Workshop

       Web services

                message-based security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th

WebLogic Security Framework

WebLogic Workshop

        encryption

        message-level security 2nd 3rd 4th

        overview 2nd 3rd 4th 5th 6th 7th 8th 9th

        role-based security

        tokens 2nd

        transport-level security 2nd

       Web services

                overview 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th

                transport-level security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th

                views 2nd 3rd

        WS-Security configuration

        XML Signatures

WebLogic Workshop IDE

white pages (UDDI)

WIDL (Web Interface Definition Language)

wrapped key encryption

        XML 2nd 3rd 4th 5th

WS Security

        security tokens 2nd 3rd

                BinarySecurityToken

                referencing

                XML tokens 2nd 3rd 4th

       XML encryption

                attachments

        XML signatures example

WS-Policy

        trust issues

WS-Security 2nd

        goals 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

        WebLogic Workshop configuration

WSDL

       documents

                LESSdefinitions tag

        history 2nd 3rd 4th

        introduction 2nd

        LESSbinding tag

        LESSmessage tag

        LESSportType tag

        LESSservice tag

        ports

        security and

        SOAP and 2nd

        WS Policy and 2nd 3rd 4th 5th 6th

        XML Schema and

WSDL (Web Services Description Language)

        WS Policy and 2nd

WSS (Web Services Security)

WS Authorization 2nd

WS Federation 2nd 3rd 4th 5th 6th 7th

WS Policy 2nd

        Arbitrary Resource Attachment

        assertions

                Language

                MessagePredicate

                SpecVersion

                TextEncoding

        framework 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

                WS PolicyAssertions 2nd 3rd

                WS PolicyAttachment 2nd 3rd

        interoperability and 2nd

        WSDL and 2nd 3rd 4th 5th 6th 7th 8th

        WS Security and 2nd 3rd 4th

WS PolicyAssertions 2nd 3rd

WS PolicyAttachment 2nd 3rd

WS Privacy 2nd 3rd 4th

WS SecureConversation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

WS Security

        as foundational technology

       message integrity

                validation

        namespaces

        origins

        security tokens 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th

                BinarySecurityToken 2nd 3rd 4th 5th 6th

                referencing 2nd 3rd 4th 5th 6th 7th 8th

                UsernameToken 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

                validation 2nd

                XML tokens 2nd 3rd 4th 5th 6th 7th 8th 9th

       SOAP

                security headers

        SOAP and

        WS Policy and 2nd 3rd 4th

        XML encryption 2nd 3rd 4th 5th 6th 7th 8th

                attachments 2nd 3rd 4th

        XML signatures and 2nd

        XML signatures example 2nd

WS SecurityPolicy

        Confidentiality assertion 2nd 3rd 4th 5th

        Integrity assertion 2nd 3rd 4th 5th 6th

        MessageAge assertion 2nd

        SecurityHeader assertion 2nd

        SecurityToken assertion 2nd 3rd 4th 5th 6th 7th

        Visibility assertion 2nd

WS Trust 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

 <  Day Day Up  >    

Категории