Digital Signature Web Service Interface
|
|
|
- Howard Baldwin
- 10 years ago
- Views:
Transcription
1 1 2 Digital Signature Web Service Interface Introduction This document describes an RPC interface for a centralized digital signature web service that enforces policy controls on who can request signatures for specific transactions. The signature is calculated using a private key owned by the web service for the purpose of producing an organization signature. Thus, anyone within the organization authorized to obtain an organization signature can obtain it simply by request to the web service. 1.1 Motivation A digital signature provides: Authentication: A digital signature is unique to the private key used in its creation, and as a result it provides strong authentication of an individual when that individual signs a contract or e- business transaction. Support for Non-repudiation: Once a contract or transaction has been digitally signed, the signer cannot disclaim or "repudiate" the signature after the fact. This means, for example, that both parties to an online purchase are bound to the terms of the deal - and thus that both parties to the transaction are protected from online fraud. Data integrity: Included in a digital signature is protection of the signed data against any accidental or intentional tampering of the data. For example, the value of an online transaction cannot be compromised without detection, once it has been digitally signed. Most current implementations of digital signatures bind the public key with a specific individual that is responsible for the content of any data signed with the corresponding private key. However, there is a need, especially in the web services paradigm, for signatures that represent "organizations" (not individuals within organizations) and this need is becoming more apparent over time. Distributing the "organization" private key among all end users authorized to use it creates a number of security concerns. It makes sense then to provide a centralized service which applies all "organization" signatures using a private key unique to the organization. Thus, this document describes an RPC interface for a centralized digital signature web service that enforces policy controls on who can request signatures for specific transactions.
2 Terminology The key words must, must not, required, shall, shall not, should, should not, recommended, may, and optional in this document are to be interpreted as described in [RFC2119] General Interface Design Issues The major design goals of this specification are simplicity, extensibility and efficiency. 3.1 Related Standards This specification seeks to leverage both existing and emerging web service standards whenever possible. The following are particularly noted as relevant standardization efforts Existing Standards WSDL Defines how abstract interfaces and their concrete realizations are defined. SOAP Defines how to invoke remote interfaces. UDDI Defines how web services are published, queried and found using standardized directories. SSL/TLS Defines secure transport mechanisms. URL Defines URI (includes URL) syntax and encoding Character set encoding XML Digital Signatures Defines how portions of an XML document are digitally signed. SAML Defines how authentication and authorization information may be exchanged. P3P Defines how a Producer/entity may publish its privacy policy so that a Consumer could enforce End-User privacy preferences Emerging Standards XML Encryption Defines how to encrypt/decrypt portions of an XML document. WS-Security Defines how document level security standards apply to SOAP messages. XACML Defines a syntax for expressing authorization rules Digital Signature Interfaces Digital signature interfaces define all operations by the Digital Signature Server that produce a digital signature upon request by a Digital Signature Client. 2
3 envelopingsignxmldata The envelopingsignxmldata() operation returns an enveloping XML Digital Signature on the provided XML markup data. envelopingsignxmldataresponse = envelopingsignxmldata(tobesignedxmldata); tobesignedxmldata is the XML markup data to be signed. It is of type string envelopingsignxmldataresponse is the XML markup of the enveloping signature on tobesignedxmldata computed by the Digital Signature Server. It is of type string envelopingsign The envelopingsign() operation returns an enveloping XML Digital Signature on the data pointed to by the given URI. envelopingsignresponse = envelopingsign(tobesigneduri); tobesigneduri is the URI pointing to the data to be signed. It is of type string envelopingsignresponse is the XML markup of the enveloping signature on the data pointed to by tobesigneduri computed by the Digital Signature Server. It is of type string detachedsign The detachedsign() operation returns a detached XML Digital Signature on the data pointed to by the given URI. detachedsignresponse = detachedsign(tobesigneduri); tobesigneduri is the URI pointing to the data to be signed. It is of type string detachedsignresponse is the XML markup of the detached signature on the data pointed to by tobesigneduri computed by the Digital Signature Server. It is of type string. 94 3
4 envelopedsign The envelopedsign() operation returns an enveloped XML Digital Signature on the data pointed to by the given URI. envelopedsignresponse = envelopedsign(tobesigneduri, signatureposition); tobesigneduri is the URI pointing to the data to be signed. It is of type string. The data being pointed to MUST be XML markup signatureposition is the name of an XML element in the resource to be signed to be used as the insertion point for the signature by the Digital Signature Server. If null, the signature is inserted as the first child element under document root. It is of type string envelopedsignresponse is the XML markup of the enveloped signature on the data pointed to by tobesigneduri computed by the Digital Signature Server. It is of type string envelopedsignxmldata The envelopedsignxmldata() operation returns an enveloped XML Digital Signature on the XML markup data in the request. envelopedsignxmldataresponse = envelopedsignxmldata(tobesignedxmldata, signatureposition); tobesignedxmldata is the XML markup data to be signed. It is of type string signatureposition is the name of an XML element in the resource to be signed to be used as the insertion point for the signature by the Digital Signature Server. If null, the signature is inserted as the first child element under document root. It is of type string envelopedsignxmldataresponse is the XML markup of the enveloped signature on the data pointed to by tobesigneduri computed by the Digital Signature Server. It is of type string
5 Security Digital Signature Servers will be exposed to many of the same security issues as other web service systems. For a representative summary of security concerns, refer to the Security and Privacy Considerations document produced by the XML-Based Security Services Oasis TC The Digital Signature Web Server MUST only produce a signature upon request from an authorized digital signature requester. Thus, the requester MUST be authenticated and policy controls determining who is authorized MUST be enforced. 5.1 Authentication of Consumer Digital Signature Server authentication of a requester may be achieved at the transport level through the use of client certificates in conjunction with SSL/TLS. 5.2 Authentication of Digital Signature Server Since the requester will likely be sending sensitive data to the Digital Signature Server to be signed, the Server should be authenticated before the data is sent. Authentication of the server may be achieved at the transport level through the use of server certificates in conjunction with SSL/TLS. 5.3 Confidentiality & Message Integrity SSL/TLS may be used to ensure the contents of messages are neither tampered with nor decipherable by an unauthorized third party For Digital Signature Server - requester communications, the use of SSL/TLS is provided by the Server s WSDL declaring an https: entrypoint. 5.4 Access control A Digital Signature Server MUST implement access control mechanisms that restrict which end entities are authorized to request digital signatures on documents WSDL Interface Definition <?xml version="1.0" encoding="utf-8"?> <definitions xmlns:s=" xmlns:http=" xmlns:soap=" xmlns:soapenc=" xmlns:tns="urn:digsig" targetnamespace="urn:digsig" xmlns=" <message name="envelopingsignxmldata"> <part name="tobesignedxmldata" 5
6 <message name="envelopingsignxmldataresponse"> <message name="envelopingsign"> <part name="tobesigneduri" <message name="envelopingsignresponse"> <message name="detachedsign"> <part name="tobesigneduri" <message name="detachedsignresponse"> <message name="envelopedsign"> <part name="tobesigneduri" <part name="signatureposition" <message name="envelopedsignresponse"> <message name="envelopedsignxmldata"> <part name="tobesignedxmldata" <part name="signatureposition" <message name="envelopedsignxmldataresponse"> 6
7 <porttype name="digsigporttype"> <operation name="envelopingsignxmldata"> <input message="tns:envelopingsignxmldata" <output message="tns:envelopingsignxmldataresponse" <operation name="envelopingsign"> <input message="tns:envelopingsign" <output message="tns:envelopingsignresponse" <operation name="detachedsign"> <input message="tns:detachedsign" <output message="tns:detachedsignresponse" <operation name="envelopedsign"> <input message="tns:envelopedsign" <output message="tns:envelopedsignresponse" <operation name="envelopedsignxmldata"> <input message="tns:envelopedsignxmldata" <output message="tns:envelopedsignxmldataresponse" </porttype> <binding name="digsigsoapbinding" type="tns:digsigporttype"> <soap:binding style="rpc" transport=" <operation name="envelopedsignxmldata"> <soap:operation soapaction="" <operation name="envelopingsignxmldata"> <soap:operation soapaction="" <operation name="envelopingsign"> 7
8 <soap:operation soapaction="" <operation name="detachedsign"> <soap:operation soapaction="" <operation name="envelopedsign"> <soap:operation soapaction="" </binding> <service name="digsig"> <documentation>todo: add your documentation here</documentation> <port name="digsigport" binding="tns:digsigsoapbinding"> <soap:address location=" </port> </service> </definitions> References 7.1 Normative [RFC2119] S. Bradner, Key words for use in RFCs to Indicate Requirement Levels, IETF RFC 2119, March PARTICULAR PURPOSE. 8
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
T-110.5140 Network Application Frameworks and XML Web Services and WSDL 15.2.2010 Tancred Lindholm
T-110.5140 Network Application Frameworks and XML Web Services and WSDL 15.2.2010 Tancred Lindholm Based on slides by Sasu Tarkoma and Pekka Nikander 1 of 20 Contents Short review of XML & related specs
Representation of E-documents in AIDA Project
Representation of E-documents in AIDA Project Diana Berbecaru Marius Marian Dip. di Automatica e Informatica Politecnico di Torino Corso Duca degli Abruzzi 24, 10129 Torino, Italy Abstract Initially developed
Web Services Description Language (WSDL) Wanasanan Thongsongkrit
Web Services Description Language (WSDL) Wanasanan Thongsongkrit WSDL Development History at W3C WSDL 1.1 was submitted as a W3C Note by Ariba, IBM and Microsoft March 2001 WSDL 2.0 Merging 3 previous
How to consume a Domino Web Services from Visual Studio under Security
How to consume a Domino Web Services from Visual Studio under Security Summary Authors... 2 Abstract... 2 Web Services... 3 Write a Visual Basic Consumer... 5 Authors Andrea Fontana IBM Champion for WebSphere
Java Security Web Services Security (Overview) Lecture 9
Java Security Web Services Security (Overview) Lecture 9 Java 2 Cryptography Java provides API + SPI for crypto functions Java Cryptography Architecture Security related core classes Access control and
The presentation explains how to create and access the web services using the user interface. WebServices.ppt. Page 1 of 14
The presentation explains how to create and access the web services using the user interface. Page 1 of 14 The aim of this presentation is to familiarize you with the processes of creating and accessing
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1
1 2 3 4 Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1 OASIS Standard, 1 February 2006 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Document identifier:
e-filing Secure Web Service User Manual
e-filing Secure Web Service User Manual Page1 CONTENTS 1 BULK ITR... 6 2 BULK PAN VERIFICATION... 9 3 GET ITR-V BY TOKEN NUMBER... 13 4 GET ITR-V BY ACKNOWLEDGMENT NUMBER... 16 5 GET RETURN STATUS... 19
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Run-time Service Oriented Architecture (SOA) V 0.1
Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...
[MS-BDSRR]: Business Document Scanning: Scan Repository Capabilities and Status Retrieval Protocol
[MS-BDSRR]: Business Document Scanning: Scan Repository Capabilities and Status Retrieval Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft
NIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
Web Services Trust and XML Security Standards
Web Services Trust and XML Security Standards Date: April 9, 2001 Version: 1.0 Copyright 2001-2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States
Bindings for the Service Provisioning Markup Language (SPML) Version 1.0
1 2 3 Bindings for the Service Provisioning Markup Language (SPML) Version 1.0 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 OASIS Standard, Approved October 2003 Document identifier:
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Feide Integration Guide. Technical Requisites
Feide Integration Guide Technical Requisites Document History Version Date Author Comments 1.1 Apr 2015 Jaime Pérez Allow the use of the HTTP-POST binding. 1.0 Oct 2014 Jaime Pérez First version of this
XML Signatures in an Enterprise Service Bus Environment
XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany [email protected] Dieter Kessler Research
A Service Oriented Security Reference Architecture
International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 1, No.1, October 2012, Page: 25-31, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com A Service
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Authentication Context Classes for Levels of Assurance for the Swedish eid Framework
Authentication Context Classes for Levels of Assurance for the Swedish eid Framework Version 1.0 2013-07-01 1 (5) 1 INTRODUCTION 3 2 DEFINED AUTHENTICATION CONTEXT CLASSES 3 2.1 LEVEL OF ASSURANCE LEVEL
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
A Signing Proxy for Web Services Security. Dr. Ingo Melzer RIC/ED
A Signing Proxy for Web Services Security Dr. Ingo Melzer RIC/ED What is a Web Service? Infrastructure Web Service I. Melzer -- A Signing Proxy for Web Services Security 2 What is a Web Service? basic
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
Authentication and Authorization Systems in Cloud Environments
Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
Web Services Implementation Methodology for SOA Application
Web Services Implementation Methodology for SOA Application Siew Poh Lee Lai Peng Chan Eng Wah Lee Singapore Institute of Manufacturing Technology Singapore Institute of Manufacturing Technology Singapore
Network Security. Chapter 10. Application Layer Security: Web Services. Part I: Introduction to Web Services
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Part I: Introduction to Web Services Network Security Chapter 10 Application Layer Security:
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup. Version 1.1 Last Updated: April 14, 2014
Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup Version 1.1 Last Updated: April 14, 2014 Table of Contents SSL Certificate Creation... 3 Option 1: Complete the Provider
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Digital Signing without the Headaches
Digital Signing without the Headaches Nick Pope 1 Juan Carlos Cruellas 2 1 Security & Standards Associates Grays, Essex, United Kingdom [email protected] 2 Universitat Politècnica de Catalunya Barcelona,
Common definitions and specifications for OMA REST interfaces
Common definitions and specifications for OMA REST interfaces Candidate Version 1.0 11 Jan 2011 Open Mobile Alliance OMA-TS-REST_Common-V1_0-20110111-C OMA-TS-REST_Common-V1_0-20110111-C Page 2 (20) Use
Web Services Implementation: The Beta Phase of EPA Network Nodes
Web Services Implementation: The Beta Phase of EPA Network Nodes Connie Dwyer and Chris Clark U.S. Environmental Protection Agency, 1200 Pennsylvania Avenue, N. W., Washington, D.C. [email protected]
Web Service Security Vulnerabilities and Threats in the Context of WS-Security
Web Service Security Vulnerabilities and Threats in the Context of WS-Security Jesper Holgersson Eva Söderström University of Skoevde, Sweden SIIT 2005, ITU, Geneva, September 2005 Outline of presentation
Security Assertion Markup Language (SAML)
CS 595G 02/14/06 Security Assertion Markup Language (SAML) Vika Felmetsger 1 SAML as OASIS Standard OASIS Open Standard SAML V2.0 was approved in March, 2005 Blending of two earlier efforts on portable
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
[MS-SPEMAWS]: SharePoint Email Web Service Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-SPEMAWS]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Developer Guide to Authentication and Authorisation Web Services Secure and Public
Government Gateway Developer Guide to Authentication and Authorisation Web Services Secure and Public Version 1.6.3 (17.04.03) - 1 - Table of Contents Government Gateway 1 Developer Guide to Authentication
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
Service Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
Oracle Service Bus. User Guide 10g Release 3 Maintenance Pack 1 (10.3.1) June 2009
Oracle Service Bus User Guide 10g Release 3 Maintenance Pack 1 (10.3.1) June 2009 Oracle Service Bus User Guide, 10g Release 3 Maintenance Pack 1 (10.3.1) Copyright 2007, 2008, Oracle and/or its affiliates.
Web Services Distributed Management: Management of Web Services (WSDM-MOWS) 1.1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Web Services Distributed Management: Management of Web Services (WSDM-MOWS) 1.1 OASIS Standard, 01 August
[MS-DVRD]: Device Registration Discovery Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-DVRD]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Web Services Manageability Concepts (WS-Manageability)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 Web Services Manageability Concepts (WS-Manageability) Version 1.0 September
Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team
Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team Presented by: Tom Connolly, Jason Lieberman Company: BizTech Session ID: #10351 Overview Introductions Background Web
WEB SERVICES TEST AUTOMATION
WEB SERVICES TEST AUTOMATION Notes for Facilitated Discussion at September 2013 Meeting of Northern Virginia Test Automation Interest Group By Rick Hower [email protected] and Jim Moore [email protected]
Creating Web Services in NetBeans
Creating Web Services in NetBeans Fulvio Frati [email protected] Sesar Lab http://ra.crema.unimi.it 1 Outline Web Services Overview Creation of a Web Services Server Creation of different Web Services
[MS-MDM]: Mobile Device Management Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-MDM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Lesson 4 Web Service Interface Definition (Part I)
Lesson 4 Web Service Interface Definition (Part I) Service Oriented Architectures Module 1 - Basic technologies Unit 3 WSDL Ernesto Damiani Università di Milano Interface Definition Languages (1) IDLs
Using mobile phones to access Web Services in a secure way. Dan Marinescu
Using mobile phones to access Web Services in a secure way Dan Marinescu March 7, 2007 Abstract Web Services is a technology that has gained in acceptance and popularity over the past years. The promise
HTTP and HTTPS Statistics Services
CHAPTER 9 This chapter describes the HTTP and HTTPS Statistics service, which returns HTTP and HTTPS connection information and statistics for individual WAEs, device groups, and for the WAAS network,
4. Concepts and Technologies for B2C, B2E, and B2B Transaction
4. Concepts and Technologies for B2C, B2E, and B2B Transaction 4.4 Exchanging Information within Open Business Communities 4.4.1 Pre-Internet B2B standards: EDI, Interactive EDI, Universal EDI, OpenEDI
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0 Committee Specification 01 22 November 2012 Specification URIs This version: http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/cs01/saml-async-slo-v1.0-
Web Services. Seminar on Semantic Web & Web Services. - W3C Finland - 6th May 2003. Suresh Chande,
Web Services Seminar on Semantic Web & Web Services - W3C Finland - 6th May 2003 Suresh Chande, Software Technology Laboratory Nokia Research Center, [email protected] Acknowledgements: Markku Laitkorpi
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008
Web Services Security: What s Required To Secure A Service-Oriented Architecture An Oracle White Paper January 2008 Web Services Security: What s Required To Secure A Service-Oriented Architecture. INTRODUCTION
Consuming and Producing Web Services with Web Tools. Christopher M. Judd. President/Consultant Judd Solutions, LLC
Consuming and Producing Web Services with Web Tools Christopher M. Judd President/Consultant Judd Solutions, LLC Christopher M. Judd President/Consultant of Judd Solutions Central Ohio Java User Group
Web Services Technologies: State of the Art
Web Services Technologies: State of the Art Definitions, Standards, Case Study W O R K I N G P A P E R A B D A L D H E M A L B R E S H N E, P A T R I K F U H R E R, JACQUE S P A S Q U I E R September 2009
Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006
Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006 This FAQ addresses frequently asked questions relating to Oracle Application Server 10g Release 3 (10.1.3.1) Web Services
Identity in the Cloud Use Cases Version 1.0
Identity in the Cloud Use Cases Version 1.0 Committee Note 01 08 May 2012 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloud-usecases/v1.0/cn01/idcloudusecases-v1.0-cn01.pdf (Authoritative)
Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents
Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents Farrukh Najmi and Eve Maler [email protected], [email protected] Sun Microsystems, Inc. Goals for today's
Gigaset IP and IP-PRO Phones Provisioning / Remote Management. last modifications by J. Stahl, Bocholt, January the 18 th 2011
Gigaset IP and IP-PRO Phones Provisioning / Remote Management last modifications by J. Stahl, Bocholt, January the 18 th 2011 Agenda Provisioning / Remote Management for Gigaset IP phones Introduction
The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5
The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5 Vetuma Authentication and Payment Table of Contents 1. Introduction... 3 2. The General Features of the
SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun
SAML Security Analysis Huang Zheng Xiong Jiaxi Ren Sijun outline The intorduction of SAML SAML use case The manner of SAML working Security risks on SAML Security policy on SAML Summary my course report
SAML 2.0 INT SSO Deployment Profile
1 2 3 4 5 6 SAML 2.0 INT 7 8 9 Version: 0.1 Date: 2011-12-2 10 Editor: TBD 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Contributors: The full list of contributors can be referenced here: URL Status: This
Oracle WebLogic Server
Oracle WebLogic Server Getting Started With WebLogic Web Services Using JAX-RPC 10g Release 3 (10.3) July 2008 Oracle WebLogic Server Getting Started With WebLogic Web Services Using JAX-RPC, 10g Release
OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services
www.oasis-open.org OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services Juan Carlos Cruellas UPC Spain Nick Pope Thales esecurity (Co-Chairs Chairs DSS Technical
David Pilling Director of Applications and Development
Service Oriented Architecture for Law Firms: SOA is inevitable, are you ready? David Pilling Director of Applications and Development "Things should be made as simple as possible, but no simpler. -- Albert
Web Services Technologies
Web Services Technologies XML and SOAP WSDL and UDDI Version 16 1 Web Services Technologies WSTech-2 A collection of XML technology standards that work together to provide Web Services capabilities We
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
AquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
