tailieunhanh - Mastering Web Services Security phần 8

SOAP Header Initiator bố bảo mật nhận dạng / thuộc tính thẻ Đoàn ràng buộc bản sắc có thể hoạt động như đại biểu Transport Layer Giao thông vận tải nhận dạng (chứng chỉ) Hình Đoàn kịch bản. DOM. Những giao diện được, và làm thế nào chúng khác nhau từ các đối tượng. XML giao diện liên quan đến tồn tại gì? | Interoperability of Web Services Security Technologies 303 SOAP Header Figure Delegation scenario. Intermediate Object P2 Initiator Security Claims Identity attribute tokens Delegation Constraints Identities that may act as delegates Transport Layer Transport identity certificate Target Object Figure also shows the credential tokens that may be passed from intermediate P2 to the target object as part of the SOAP header. In this example the SOAP header transmits the delegation constraints which identify the intermediates that are permitted to act as delegates and the initiator security claims which contain the identity and other attributes of the initiating client. Although the standard WS-Security elements do not yet address constrained delegation we can use a separate non-standard but legal WS-Security element that contains the identities of delegates. These identities define the intermediates that the client trusts to act as delegates on the client s behalf. Initiator security claims may be transmitted as usual in a standard WS-Security element containing SAML or other tokens as described in Chapter 4. To ensure that the delegation constraints and initiator claims are bound to the SOAP message body the initiating client should provide a digital signature based on both WS-Security elements as well as the SOAP message body. The intermediate transmits its identity to the target object by the underlying secure transport layer using for example an certificate via SSL. The described implementation would work as follows for our delegation scenario When the accounting system target object receives the SOAP message it 1 verifies the identity of the purchasing system intermediate P2 by SSL mutual authentication 2 checks whether the purchasing system identity is in the delegation constraints list and 3 verifies the digital signature on the WS-Security elements and message body. If these checks succeed then the accounting system retrieves the initiating .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.