WHITE PAPER SECURITY IN A WEB SERVICES WORLD
|
|
|
- Molly Dawson
- 9 years ago
- Views:
Transcription
1 WHITE PAPER SECURITY IN A WEB SERVICES WORLD Author: Tim Moses Date: 3 February 2004 Copyright 2004 Entrust. All rights reserved.
2 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All Entrust product names are trademarks of Entrust, Inc. or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners. The material provided in this document is for information purposes only. It is not intended to be advice. ENTRUST DOES NOT WARRANT THE QUALITY, ACCURACY OR COMPLETENESS OF THE INFORMATION CONTAINED IN THIS ARTICLE. SUCH INFORMATION IS PROVIDED "AS IS" WITHOUT ANY REPRESENTATIONS, WARRANTIES AND/OR CONDITIONS OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY, BY USAGE OF TRADE, OR OTHERWISE, AND ENTRUST SPECIFICALLY DISCLAIMS ANY AND ALL REPRESENTATIONS, WARRANTIES AND/OR CONDITIONS OF MERCHANTABILITY, SATISFACTORY QUALITY, TITLE, NON-INFRINGEMENT, OR FITNESS FOR A SPECIFIC PURPOSE. All rights reserved. Page i
3 TABLE OF CONTENTS 1. WEB SERVICES AND EDI WEB SERVICES AND DISTRIBUTED COMPUTING WEB SERVICES DEPLOYMENT MODEL WEB SERVICES AND SECURITY SECURITY POLICY WEB SERVICES IN A SINGLE POLICY DOMAIN WEB SERVICES BETWEEN POLICY DOMAINS SECURITY POLICY MANAGEMENT SERVICE PROVISIONING SERVICE IDENTIFICATION ENFORCEMENT ASSURANCE TRANSACTION AUDIT SERVICES CONCLUSION ABOUT ENTRUST All rights reserved. Page 2
4 1. WEB SERVICES AND EDI Through the 1980s and 1990s large retail and manufacturing companies implemented Electronic Data Interchange (EDI) programs to achieve dramatic reductions in inventory cost and improvements in product quality and customer satisfaction, by eliminating redundant data-entry steps from their business processes. However, the significant non-recurring costs of re-engineering business processes to take advantage of EDI have prevented all but the largest companies from achieving these benefits. This, in turn, has prevented these large companies from fully benefiting, because they also need to expose some of their business interfaces to small and medium-sized enterprises (SMEs) and individuals. So EDI protocols, on their own, are not sufficient to totally eliminate redundant data-entry steps from a company s business processes. For this reason, the Web was pressed into service so that SMEs and individuals could use the ubiquitous browser and the Internet to interact directly with a large company s business process interfaces. While this approach addressed the concerns of the large companies, it did not deliver the benefits of EDI to everyone. In addition, the user experience associated with the browser of today can be slow and cumbersome. While the browser experience can be improved through the use of Java applets and ActiveX controls, this approach comes with limitations: unsigned applets restrict client communication to the domain from which the applet was downloaded, thereby placing severe limitations on the business models that can be implemented; and signed applets introduce additional and confusing user dialogues. The Web services architecture is the new distributed computing architecture designed to address these limitations and unlock the benefits of business process integration on a larger scale. 2. WEB SERVICES AND DISTRIBUTED COMPUTING The Web services architecture is not the first attempt to define a standard architecture for distributed computing. DCE and CORBA are just two of the previous attempts. Each promised to deliver cost reductions from business process integration within and across enterprise boundaries. And each failed to deliver on that promise. The Web services architecture is simply the current generation. What makes us think that Web services will succeed where previous attempts have failed? Previous generations of distributed computing demanded a degree of coordination between the developers of services and their clients that is not practical in many enterprise-scale and inter-enterprise applications. Web services promises to solve this through the use of a common language for the messages flowing between end-points, regardless of the computing platforms on which they operate. It also takes a lesson from EDI in adopting a document-centric, as opposed to an object-centric, approach to system design. Concerns over security and interoperability are two further reasons why previous attempts to solve distributed computing have fallen short of their promise. If an enterprise is going to open up interfaces to its business processes from outside its boundary, it needs strong assurance that the security of its networks and information assets will not be compromised. Furthermore, it is not practical to expect all of ones business partners to choose the same vendor, or even the same distributed computing technology, to expose their process interfaces. Therefore, in order for distributed computing to scale beyond the enterprise boundary, careful attention must be paid to technology-neutrality and multi-vendor interoperability. Previous generations of distributed computing failed in both of these regards. The basic Web services architecture addresses the security concern primarily through its use of textbased protocols that invoke specific, well-defined, operations. The messages that flow between interfaces are instances of extension languages based on XML and can be examined to ensure that they All rights reserved. Page 3
5 are properly-formed. Improperly-formed messages, potentially containing malicious content, can be prevented from entering the internal network. In addition, the security solution that is being developed for Web services includes a technology-neutral framework, capable of accommodating the full-range of available authentication technologies, such as X.509 and Kerberos. This is a significant departure from previous attempts to standardize security for distributed computing, which required all participants to adopt the same authentication technology. The interoperability concern is being addressed by the main platform vendors, who have made a significant commitment to achieving multi-vendor interoperability through collaboration in standards bodies and participation in interoperability trials. 3. WEB SERVICES DEPLOYMENT MODEL So, how does the Web services architecture work? The basic deployment model is shown in Figure 1. Figure 1 - Web Services Deployment In this model, the service is developed (1) and the executable code is distributed to the servers on which it is to be hosted (2). In practice, a Web-service may be nothing more than an interface to legacy data or business operations. As a by-product of service development, a definition of the service interface is automatically generated (3). This interface definition is in the form of a Web services Description Language (WSDL) instance, which contains definitions for the various operations and messages that the service provides. To the interface definition is added information about how to communicate with a All rights reserved. Page 4
6 specific instance of the service, i.e. what transport-layer protocol and network address to use. The WSDL instance is distributed by means of a registry (4), such as UDDI (Universal Description, Discovery & Integration), so that it can be located and retrieved by the client developer (5). The client development environment automatically generates the stub code needed by the client executable to invoke the service. The client code may be distributed by conventional means or it may be downloaded incrementally on demand (6). Where the client domain is not a peer domain, for instance in a B2C or B2E setting, the client development may be performed in the service domain, in which case it is the client executable that has to be distributed across the enterprise boundary. In a variant of this model, the interfaces are defined by an industry association or similar body and both the client stub and service header code can be generated automatically from the standard definition. This variant is more in-keeping with the document-centric approach to system design. It is interesting to note that, in B2B applications, it is not sufficient for the parties to agree the syntax of the interface, they additionally must agree the meaning of each interface element. This can be achieved either through bilateral agreement or by conformance with an appropriate industry standard. The messages that flow between client and service are carried in an extensible message format, called SOAP. Intermediaries may exist in the message path for purposes of load-balancing, compression, caching and security operations. 4. WEB SERVICES AND SECURITY Satisfying the security requirements of the EDI architecture is relatively straightforward. First of all, a policy authority is required to choose suitable security mechanisms. And, in the case of EDI, the Value- Added Network (VAN) serves this purpose. Authenticity and confidentiality of the messages flowing between the VAN and its large customers are commonly provided by leased-line communications. Accountability is achieved by the presence of an independent third-party, in the form of the VAN, and the transaction records that it keeps. Communications over the Web with SMEs and individuals are protected by server-auth SSL and username/password authentication. Historically, confidentiality of communications has not been a major concern for supply-chain integration applications of EDI. But, for government and healthcare applications it is critical. Business process integration by means of the Web services architecture can eliminate the common policy authority. In B2C and B2E applications, one party (i.e. the B in B2C ) may act as the policy authority, and the other party may simply conform with the policy chosen by the authority. But, in B2B applications, this may not be appropriate, as each party may have its own security policy governing transactions flowing between them. 5. SECURITY POLICY In the previous section we introduced the term security policy. The Internet security glossary defines security policy to be: A set of rules and practices that specify or regulate how a system or organization provides security services. Generally, the term is used to describe a set of plain-language documents that define how the security goals of the organization are to be met through a combination of technical, physical, procedural and personnel safeguards. While the way we use the term here is not inconsistent with this definition, we use All rights reserved. Page 5
7 it to mean something more concrete; that is a statement of the actions that must be taken to enforce the controls listed in Table 1. Table 1 - Elements of Security Policy Only authorized end-points can be exposed. Only authorized clients can invoke a service. Only approved end-point authentication mechanisms are accepted. Only approved end-point authentication parameters are accepted. End-points do not rely on stale authentication events. Only approved confidentiality mechanisms are used. Only approved confidentiality parameters are used. Only properly-formed messages are admitted. Data is released only if authorized by its owner. Message elements are properly protected. Necessary evidence is collected. Necessary commitments are obtained from partners. Necessary assurances are obtained from partners. Alarms are triggered when required. These topics cover all aspects of information security, including: confidentiality, data integrity, system integrity, availability, authentication, authorization, accountability and privacy. In order to minimize the cost of establishing secure business partnerships, security policy statements must be in a structured form, so that system components can respond to them and automatically enforce and apply the policy, without the intervention of system administrators. Enforcing a policy means rejecting messages that violate the policy, whereas applying a policy means creating messages that will not be rejected on the grounds that they violate the policy. Enforcing policy makes sure that corporate assets are not compromised by policy violation, potentially at the expense of business operations. Whereas, policy application makes sure that business operations are not compromised as a result of policy enforcement. 6. WEB SERVICES IN A SINGLE POLICY DOMAIN In B2C and B2E applications of the Web services architecture, there may be a single authority that defines the security policy and implements a security architecture to enforce it. All rights reserved. Page 6
8 Figure 2 Single Policy-Domain Deployment In order to enforce the security policy, the basic deployment model of Figure 1 has to be extended as shown in Figure 2. Security intermediaries are introduced into the message path to protect both the client and the service. And a step is introduced into the deployment process in which the security policy is defined. Policy as it applies to both service requests, responses and fault messages can be distributed in exactly the same way as the interface definition, using WSDL and UDDI. The client security intermediary can then apply the policy to requests and enforce it on response and fault messages, and the service security intermediary can enforce the policy on service requests and apply it to response and fault messages. In variants of this model, policy development takes place as an integral part of service development and client and service security operations are integral parts of the client and service, respectively. However, building security policy into the application places the responsibility for administering security policy in the hands of the development organization, making it more difficult to modify in the light of changing requirements and a changing threat environment. In another variant of this model, the client interacts with services from a number of different domains in the course of a single session. There may be no coordination between the various service domains involved, or the service domains may collaborate directly to provide a seamless user experience. This latter approach raises privacy concerns that have to be dealt with through careful system and user interface design. Security services must be placed carefully in relation to other SOAP intermediaries (see Figure 3). Compression, for instance, must be performed on plain-text messages and, unless care is taken in the system design, load-balancing may interfere with authentication and confidentiality, because a different end-point may be involved in each message exchanged within a session. All rights reserved. Page 7
9 Placing security functions close to the application environment allows them to protect against threats in both the external and internal networks. However, sound security practice demands that some security services also be placed at the boundary. For instance, a confidential tunnel can be terminated at the boundary using server-auth SSL. Terminating the confidential tunnel at the boundary ensures that plaintext is available to any other intermediary that requires it. Authentication and coarse-grained authorization can also be performed at the boundary, using any one of a variety of authentication mechanisms, such as conventional Web-access management techniques or one of the available federated identity solutions. This ensures that messages must pass a rigorous test before being allowed into the internal network. When interfaces must be exposed to unauthenticated clients, messages must be subjected to a different test. In this case, schema-validation is a suitable test. Schema-validation, fine-grained authorization and other aspects of security policy can be enforced close to the application environment. This allocation of security services also supports an appropriate division of responsibilities between network administrators, who are responsible for the integrity of the internal network and who must have the controls necessary to do that, and application administrators, who are responsible for policy enforcement in the applications and who must have the controls necessary to do that. Figure 3 Placement of Security Services Security intermediaries must be furnished with credentials for authentication and the security services that build on authentication, such as confidentiality, authorization, privacy and accountability. Therefore, solutions are required for managing these credentials. 7. WEB SERVICES BETWEEN POLICY DOMAINS The situation gets more complicated in B2B applications, where one party cannot simply conform to the security policy dictated by the other party. For one thing, the other party s policy may not meet the first party s security requirements. Secondly, if there is more than one partner, whose policy should govern? Almost all aspects of security policy can only be enforced if all the parties involved implement identical mechanisms and parameter values. This can be a problem where policies have been defined by different All rights reserved. Page 8
10 authorities, working independently. It can also be a problem within an enterprise, where systems have been built from a variety of products, each with its own set of security services. The difficulty could be overcome by requiring that all system components implement all possible security mechanisms, with a broad range of parameter values. This, however, would add unacceptable cost to every system component. Some standard protocols designed to operate across enterprise boundaries acknowledge this problem and provide a way for communicating parties to negotiate a mutuallyacceptable set of security parameters within a common mechanism. SSL is an example, in which the cipher-suites available to each party are listed in order of preference and negotiation results in the identification of the single cipher-suite that is most acceptable to both parties. This is then used for securing subsequent communications. We also see this approach today in the realm of privacy, where the service provider can describe its privacy policy using P3P and the client can describe its policy by means of its browser settings. The policies are combined in the browser and, if they are incompatible, then a warning is raised. In the future, equivalent approaches will be required for other aspects of security policy, including confidentiality, integrity, authentication, authorization and accountability. The situation is complicated further when each party may choose different and incompatible authentication technologies. This leads to an architecture in which a mapping of security policies has to take place. The external security policy is negotiated with partners, and the internal security policy has to adapt to the requirements of the internal applications, each of which may be different. One implication of this solution is that security policies must be fine-grained and as liberal as possible, given the application owner s tolerance for risk. This minimizes the impact of security on interoperability without raising risk to an unacceptable level. Figure 4 Multiple Policy-Domain Deployment All rights reserved. Page 9
11 Where a service s client community (or a client s service community for that matter) is heterogeneous, the security policy applied to each transaction may vary. Therefore, policies must be located, retrieved, combined, cached, applied and enforced automatically at run-time, as illustrated in Figure 4. The service s security policy for requests can be distributed as described above, using WSDL and UDDI. The client security policy for response and fault messages can be conveyed in the same way, or as part of the corresponding request. An interface s security policy may include a public key for privacy purposes and the input parameters to the procedure for verifying signed messages that are sent to the interface (e.g. a trusted-certificate list). 8. SECURITY POLICY MANAGEMENT In order to minimize the cost and delay associated with establishing a secure relationship between armslength partners, security policy must be located, retrieved, combined, cached, applied and enforced automatically by system components. Therefore, it must be in a machine-readable form. The syntax of the policy must be such that it can be interpreted as a set of rules for the purpose of enforcement and as a set of instructions for choosing and performing security operations that result in policy-compliant transactions. At the same time, good governance dictates that security policy be developed, reviewed, approved and audited in accordance with corporate policy. Therefore, it must be possible to produce human-readable versions of the policies that faithfully reflect what is being enforced within the system. Security policy may change in response to a changing threat environment. And if it changes, then accountability requirements make it necessary to identify the policy that was in effect at the time the transaction in question was processed. Therefore, policy version control and archival is necessary. 9. SERVICE PROVISIONING Web-service end-points may expose highly sensitive internal resources and functions. Therefore, security policy should include controls over the development process, including approval for the deployment of a Web-service interface, its policies and credentials. Particularly sensitive interfaces may require multiple approval steps to ensure that no individual acting on his or her own can subvert the corporate security policy. This safeguard can be achieved by means of administrative controls on the issuance of the authorization aspect of security policy, thereby ensuring that access to a service interface is only allowed if it conforms to corporate policy. In this case, any policy that governs access to an interface must have been issued in accordance with the appropriate administrative policy. 10. SERVICE IDENTIFICATION Service identification and authentication in the conventional Web model builds on the services of Trusted Third Parties (TTPs). The choice of this trust model is dictated by the fact that, in the Web, users are required to authenticate Web-sites operated by companies with whom they have had no previous dealings. It remains the most cost-effective approach for the Web services architecture used in B2C applications. The situation is different for inter-enterprise business process integration. The limited liability offered by TTPs and the relative ease with which credentials can be exchanged bilaterally will encourage the emergence of different models, leveraging the Web services architecture meta-data distribution mechanism. All rights reserved. Page 10
12 11. ENFORCEMENT ASSURANCE Another area in which new solutions are required involves measuring the effectiveness of a partner s policy enforcement. Where portions of the business process are out-sourced to service-providers or sensitive customer data are entrusted to partners, the onus remains with the primary customer interface to ensure that its declared policy is adhered to throughout the lifecycle of the data, despite the fact that the primary customer interface has little or no oversight of the partner s handling of the sensitive data. In some circumstances, self-certification by a partner is adequate, when accompanied by appropriate guarantees. In other circumstances, certification by an independent third party will be necessary. New standards are required to make these controls cost-effective. 12. TRANSACTION AUDIT SERVICES Executives in all fields are under increasing pressure from shareholders and regulatory bodies to demonstrate that they are managing the assets of the enterprise in a sound manner. Before technologies for business-process integration were available, humans were involved in all processes that could lead to the disbursement of assets; they represented a natural point of control. From time to time, this control failed. But, at least there was someone identifiable to hold accountable for the failure. As humans are increasingly removed from business processes, alternative techniques are required to ensure that policy violations are prevented or, at least, detected. This includes alarms and audit analysis tools. 13. CONCLUSION The extension of business processes beyond the enterprise boundary offers the real promise of productivity improvements to the broad community. However, it also introduces new security requirements, demanding new solutions. The Web services architecture has the potential to provide the necessary solutions in a cost-effective manner. However, careful system design is required to ensure that security requirements are satisfied in a way that has minimal impact on achieving the business objectives. Moreover, several important pieces of the puzzle have yet to be introduced into vendors product suites. 14. ABOUT ENTRUST Entrust, Inc. [Nasdaq:ENTU] is a world leader in securing digital identities and information, enabling businesses and governments to transform the way they conduct online transactions and manage relationships with customers, partners and employees. Entrust's solutions promote a proactive approach to security that provides accountability and privacy to online transactions and information. The company s portfolio of solutions provides security for the broad range of technologies organizations are using today, and planning to use tomorrow including: desktop applications ( , e-forms, files/folders, VPNs and wireless LANs), Web portals, Web services and Identity Management. Over 1,200 enterprises and government agencies in more than 40 countries use Entrust's security solutions, and most recently, both the U.S. Government and the Canadian Government purchased Entrust solutions to secure their network environments. For more information, please visit the Entrust website: All rights reserved. Page
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
SOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith [email protected] SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
How To Manage A Password Protected Digital Id On A Microsoft Pc Or Macbook (Windows) With A Password Safehouse (Windows 7) On A Pc Or Ipad (Windows 8) On An Ipad Or Macintosh (Windows 9)
Overview November, 2006 Copyright 2006 Entrust. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. All other Entrust product names and service names are
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
White paper. Implications of digital certificates on trusted e-business.
White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security
Service Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
White Paper September 2009 Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations Page 2 Contents 2 Executive
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
Building Remote Access VPNs
Building Remote Access VPNs 124 Grove Street, Suite 309 Franklin, MA 02038 877-4-ALTIGA www.altiga.com Building Remote Access VPNs: Harnessing the Power of the Internet to Reduce Costs and Boost Performance
A Comprehensive Solution for API Management
An Oracle White Paper March 2015 A Comprehensive Solution for API Management Executive Summary... 3 What is API Management?... 4 Defining an API Management Strategy... 5 API Management Solutions from Oracle...
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
National Student Clearinghouse's Web Services Network
Case Studies, B. Lheureux Research Note 3 January 2003 National Student Clearinghouse's Web Services Network NSC provides access to U.S.-based college and university student records via electronic data
Realizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
Content Protection in Silverlight. Microsoft Corporation
Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting
Getting Started with Service- Oriented Architecture (SOA) Terminology
Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
Certificate Policies and Certification Practice Statements
Entrust White Paper Certificate Policies and Certification Practice Statements Author: Sharon Boeyen Date: February 1997 Version: 1.0 Copyright 2003 Entrust. All rights reserved. Certificate Policies and
An Oracle White Paper November 2009. Oracle Primavera P6 EPPM Integrations with Web Services and Events
An Oracle White Paper November 2009 Oracle Primavera P6 EPPM Integrations with Web Services and Events 1 INTRODUCTION Primavera Web Services is an integration technology that extends P6 functionality and
A BIAN Building Block Service Repository and Registry
Banking Industry Architecture Network A BIAN Building Block Repository and Registry Author: BIAN Working Group Repository Version: 1.0 Last Change: July 1, 2009 Organization Authors Role Name Company Bruno
IBM Policy Assessment and Compliance
IBM Policy Assessment and Compliance Powerful data governance based on deep data intelligence Highlights Manage data in-place according to information governance policy. Data topology map provides a clear
PeopleSoft Enterprise Directory Interface
PeopleSoft Enterprise Directory Interface Today s self-service applications deliver information and functionality to large groups of users over the internet. Organizations use these applications as a cost-effective
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
http://support.oracle.com/
Contract Management System Architecture Data Sheet October 2012 Legal Notices Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle
The Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Testing Web Services Today and Tomorrow
Copyright Rational Software 2002 http://www.therationaledge.com/content/oct_02/m_webtesting_jb.jsp Testing Web Services Today and Tomorrow by Jason Bloomberg Senior Analyst ZapThink LLC With all the attention
Best Practices for Choosing a Content Control Solution
Best Practices for Choosing a Content Control Solution March 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
Driving Down the High Cost of Storage. Pillar Axiom 600
Driving Down the High Cost of Storage Pillar Axiom 600 Accelerate Initial Time to Value, and Control Costs over the Long Term Make a storage investment that will pay off in rapid time to value and low
NIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
2016 Firewall Management Trends Report
2016 Firewall Management Trends Report A survey of trends in firewall use and satisfaction with firewall management JANUARY 2016 Copyright 2016 Skybox Security, Inc. All rights reserved. Skybox is a trademark
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
Identifying Broken Business Processes
Identifying Broken Business Processes A data-centric approach to defining, identifying, and enforcing protection of sensitive documents at rest, in motion, and in use 6/07 I www.vericept.com Abstract The
Safeguarding the Corporate Portal: A Review of Portal Security
Safeguarding the Corporate Portal: A Review of Portal Security by Colin J. White DataBase Associates Version 1, January 2001 Sponsored by Viador Inc. DataBase Associates TABLE OF CONTENTS PORTAL SECURITY:
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
HP Operations Agent for NonStop Software Improves the Management of Large and Cross-platform Enterprise Solutions
HP Operations Agent for NonStop Software Improves the Management of Large and Cross-platform Enterprise Solutions HP Operations Agent for NonStop software manages HP NonStop servers and brings NonStop
Business Process Management IBM Business Process Manager V7.5
Business Process Management IBM Business Process Manager V7.5 Federated task management overview This presentation gives you an overview on the federated task management feature in IBM Business Process
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
BES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
ITS. Java WebService. ITS Data-Solutions Pvt Ltd BENEFITS OF ATTENDANCE:
Java WebService BENEFITS OF ATTENDANCE: PREREQUISITES: Upon completion of this course, students will be able to: Describe the interoperable web services architecture, including the roles of SOAP and WSDL.
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Six Steps to SSL Certificate Lifecycle Management
Six Steps to SSL Certificate Lifecycle Management Why you need an SSL certificate management solution and how to get started +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Consequences
Boundary Encryption.cloud Deployment Process Overview
Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Documentation version: 1.0 Legal Notice Legal Notice Copyright 2011 Symantec Corporation. All
how can I comprehensively control sensitive content within Microsoft SharePoint?
SOLUTION BRIEF Information Lifecycle Control for Sharepoint how can I comprehensively control sensitive content within Microsoft SharePoint? agility made possible CA Information Lifecycle Control for SharePoint
IBM Tivoli Netcool Configuration Manager
IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage
WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
Enterprise effectiveness of digital certificates: Are they ready for prime-time?
Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1
WatchGuard SSL 2.0 New Features
WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features
Mobility Information Series
SOAP vs REST RapidValue Enabling Mobility XML vs JSON Mobility Information Series Comparison between various Web Services Data Transfer Frameworks for Mobile Enabling Applications Author: Arun Chandran,
BEST PRACTICES FOR SECURE REMOTE ACCESS A GUIDE TO THE FUTURE
BEST PRACTICES FOR SECURE REMOTE ACCESS A GUIDE TO THE FUTURE The future trend is towards a universal access control model, one which inverts the network so that the protective perimeter is concentrated
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage
Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we
MD Link Integration. 2013 2015 MDI Solutions Limited
MD Link Integration 2013 2015 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY
BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY
1 2 BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY 1 Carmen RĂDUŢ, 2 Maria STĂNILOIU 1 Universitatea Constantin Brâncoveanu PITEŞTI 2 Universitatea
Web Service Implementation Methodology
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 Web Service Implementation Methodology Public Review Draft 1.0, 05 September 2005
The Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
IBM Tivoli Netcool network management solutions for enterprise
IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals
BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use
Product Data Sheet BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use BEA AquaLogic Integrator delivers the best way for IT to integrate, deploy, connect and manage process-driven
An Oracle White Paper June 2009. Integration Technologies for Primavera Solutions
An Oracle White Paper June 2009 Integration Technologies for Primavera Solutions Introduction... 1 The Integration Challenge... 2 Integration Methods for Primavera Solutions... 2 Integration Application
Microsoft Windows DCOM Configuration. Windows XP SP3 and Server 2003 SP2 Configuration Guide
Microsoft Windows DCOM Configuration Windows XP SP3 and Server 2003 SP2 Configuration Guide Microsoft Windows DCOM Configuration Windows XP SP3 and Server 2003 SP2 Configuration Guide This manual is a
New Security Features
New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing
Impact of Service Oriented Architecture on ERP Implementations in Technical Education
Impact of Service Oriented Architecture on ERP Implementations in Technical Education Swati Verma Department of Computer Science & Engg, B.T. Kumaon Institute of Technology, Dwarahat, 263653, India. E-mail:
ORACLE MANAGED FILE TRANSFER
ORACLE MANAGED FILE TRANSFER ENTERPRISE FILE EXCHANGE FAST AND FLEXIBLE LARGE FILE HANDLING KEY FEATURES End to End Auditability, Control and Reporting Built-in Security, Identity management, LDAP and
Service-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
AquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004
Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory
Best Practices for Secure Mobile Access
Best Practices for Secure Mobile Access A guide to the future. Abstract Today, more people are working from more locations using more devices than ever before. Organizations are eager to reap the benefits
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
Case Study: CMS Data-Sharing Project Highlights the Benefits of a Multiplatform Approach
Case Study: CMS Data-Sharing Project Highlights the Benefits of a Multiplatform Approach 9 November 2009 Jay Heiser, John Girard Gartner RAS Core Research Note G00168944 The U.S. government agency responsible
A Quick Introduction to SOA
Software Engineering Competence Center TUTORIAL A Quick Introduction to SOA Mahmoud Mohamed AbdAllah Senior R&D Engineer-SECC [email protected] Waseim Hashem Mahjoub Senior R&D Engineer-SECC Copyright
CommonWell Health Alliance Concepts. Last Modified: October 21, 2014. 2013 2014 CommonWell Health Alliance Inc. All rights reserved.
CommonWell Health Alliance Concepts Last Modified: October 21, 2014 2013 2014 CommonWell Health Alliance Inc. All rights reserved. 2013 2014 CommonWell Health Alliance Inc. All rights reserved. The CommonWell
About Contract Management
Contract Management System Architecture Data Sheet June 2015 About Contract Management Oracle Primavera Contract Management is a multi-user, multi-project Web-based application that manages all aspects
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...
5 WAYS STRUCTURED ARCHIVING DELIVERS ENTERPRISE ADVANTAGE
5 WAYS STRUCTURED ARCHIVING DELIVERS ENTERPRISE ADVANTAGE Decommission Applications, Manage Data Growth & Ensure Compliance with Enterprise IT Infrastructure 1 5 Ways Structured Archiving Delivers Enterprise
Web Services Manageability Concepts (WS-Manageability)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 Web Services Manageability Concepts (WS-Manageability) Version 1.0 September
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8
Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
Setting Up an AS4 System
INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; [email protected], www.entsog.eu,
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft
