Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture. An Oracle White Paper Updated October 2008
|
|
|
- Roger York
- 10 years ago
- Views:
Transcription
1 Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture An Oracle White Paper Updated October 2008
2 Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Introduction... 3 Context and Background... 4 Defining Terms... 4 Oracle WebLogic Server Support for One-Way and Two-Way SSL... 5 Problem Definition... 8 Deployment Architecture, Setup, and Configuration... 8 Inbound and Outbound Two-Way SSL Authentication Configuration Testing Business Service Proxy Service Client Conclusion Appendix: References and Related Documents Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 2
3 Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture This white paper discusses the security setup and configuration for clients, Oracle Service Bus (version 2.0 or later) proxy services, and business services. The setup assumes that a client Web application sends a HyperText Transfer Protocol request message from outside a company s firewall to the Oracle Service Bus server located behind its firewall (the inbound request). INTRODUCTION As organizations move to service-oriented architecture (SOA), security becomes one of the key concerns impacting deployment. A company s sensitive information is accessed by services deployed on the distributed components in a SOA. Therefore, security concerns have become part of the enterprise decision-making process related to the adoption of an SOA. Typically, a company sends request messages from Oracle Service Bus (formerly BEA AquaLogic Service Bus) behind its internal firewall to business services hosted outside its firewall. In such a scenario, Oracle Service Bus acts as a forward proxy. The company receives response messages from business services through a demilitarized zone into Oracle Service Bus; in this case, Oracle Service Bus acts as a reverse proxy. This white paper discusses the security setup and configuration for clients, Oracle Service Bus (version 2.0 or later) proxy services, and business services. The setup assumes that a client Web application sends a HyperText Transfer Protocol (HTTPS) request message from outside a company s firewall to the Oracle Service Bus server located behind its firewall (the inbound request). Oracle Service Bus then routes the HTTPS request message to a business service hosted outside its firewall (the outbound request). The business service sends the response message through Oracle Service Bus to the client. This setup involves an inbound one- or two-way Secure Sockets Layer (SSL) authentication and an outbound one- or twoway SSL authentication. It capitalizes on Oracle WebLogic Server and Oracle Service Bus security. Included in this white paper is an example of how to configure the inbound twoway and outbound two-way SSL authentication from the command line, the Oracle WebLogic Server administration console, and the Oracle Service Bus console. The example includes a description of the deployment architecture and how to test the system with request and response messaging. Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 3
4 CONTEXT AND BACKGROUND Defining Terms Firewall A firewall limits traffic between two networks. Firewalls can be a combination of software and hardware, including routers and dedicated gateway machines. They employ filters that allow or disallow traffic to pass based on the transport protocol, service requested, routing information, and origin and destination hosts or networks. They might also allow access for authenticated users. Figure 1: A typical setup for an organization with a firewall that filters the traffic destined for an Oracle WebLogic Server cluster. A DMZ is an example of defense in depth: multiple layers of security provide a better shield than a simple firewall. If attackers penetrate the first firewall, they gain access to the DMZ, but not necessarily to the internal network. Demilitarized Zone A demilitarized zone (DMZ) is a network area that sits between an organization s internal network and an external network, usually the internet. The typical approach is to create a DMZ between two firewalls. The network DMZ must be monitored carefully, because sensitive objects are exposed to higher risk than services behind the firewall. It is important to carefully control administrative access to services on the DMZ. Most likely, access should be allowed only from the internal network and preferably over a cryptographically protected connection such as Secure Shell. A DMZ is an example of defense in depth: multiple layers of security provide a better shield than a simple firewall. If attackers penetrate the first firewall, they gain access to the DMZ, but not necessarily to the internal network. 1 1 For a full description of DMZs, refer to Firewalls and Internet Security: Repelling the Wily Hacker (Addison-Wesley Professional, 2003). Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 4
5 The Secure Sockets Layer enables secure communication between applications connected through the Web. An SSL connection begins with a handshake during which the applications exchange digital certificates, agree on the encryption algorithms to be used, and generate the encryption keys to be used for the remainder of the session. Secure Sockets Layer The Secure Sockets Layer (SSL) enables secure communication between applications connected through the Web. 2 Oracle WebLogic Server uses the Certicom SSL Plus Java version 4.0 SSL implementation. The RSA BSAFE Cert-J and Crypto-J have been upgraded to Cert-J version and Crypto-J version 3.5. Network Interface Card A network interface card (also called a network adapter or network card) is a piece of computer hardware designed to enable computers to communicate over a computer network. Oracle WebLogic Server Support for One-Way and Two-Way SSL Oracle WebLogic Server provides a pure-java implementation of SSL. Generally, SSL provides A mechanism that the communicating applications can use to authenticate each other s identity Encryption of the data exchanged by the applications When SSL is used, the target (the server) always authenticates itself to the initiator (the client). Optionally, if the target requests it, the initiator can authenticate itself to the target. Encryption makes data transmitted over the network intelligible only to the intended recipient. An SSL connection begins with a handshake, in which the applications exchange digital certificates, agree on the encryption algorithms to be used, and generate the encryption keys to be used for the remainder of the session. SSL Security Features SSL provides the following security features: Server authentication. Oracle WebLogic Server uses its digital certificate, issued by a trusted certificate authority (CA), to authenticate to clients. SSL minimally requires the server to authenticate to the client using its digital certificate. If the client is not required to present a digital certificate, the connection type is called one-way SSL authentication. Client identity verification. Optionally, clients can be required to present their digital certificates to Oracle WebLogic Server, which then verifies that the digital certificate was issued by a trusted CA and establishes the SSL connection. An SSL connection is not established if the digital certificate is not presented and verified. This type of connection is called two-way SSL authentication, a form of mutual authentication. 2 For a discussion of the components of SSL communication and why each component is necessary, refer to OpenSSL Documents at and SSL and TLS: Designing and Building Secure Systems (Addison-Wesley, 2001). Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 5
6 Confidentiality. All client requests and server responses are encrypted to maintain the confidentiality of data exchanged over the network. Data integrity. Each SSL message contains a message digest computed from the original data. On the receiving end, a new digest is computed from the decrypted data, and then compared with the digest that came with the message. If the data has been altered, the digests do not match and tampering is detected. Protection. Data that flows between a client and Oracle WebLogic Server is protected from tampering by a third-party validation of user identities. Web format. If you are using a Web browser to communicate with Oracle WebLogic Server, you can use HTTP over SSL (HTTPS) to secure network communications. SSL Tunneling Oracle WebLogic Server supports tunneling with HTTP, T3, and Internet Inter- Orb Protocol (IIOP) over SSL. SSL can be used by Web browsers and Java clients as follows: A Web browser makes an SSL connection to a server over HTTPS. The browser then sends HTTP requests and receives HTTP responses over this SSL connection, for example, Oracle WebLogic Server supports SSL versioning. This means it can communicate with any client, including Web browsers that use SSL v2, SSL v3, and Transport Layer Security v1. Java clients using HTTP and T3 protocols can tunnel over SSL, for example, t3s://myserver.com:7002/mypage.html. Java clients running on Oracle WebLogic Server can establish either T3 connections to other instances of Oracle WebLogic Server or HTTPS connections to other servers that support SSL, such as Web servers or secure proxy servers. Oracle WebLogic Server supports both one-way and two-way SSL authentication. One-Way and Two-Way SSL Authentication Oracle WebLogic Server supports both one-way and two-way SSL authentication. With one-way SSL authentication, the target (the server) is required to present a digital certificate to the initiator (the client) to prove its identity. The client performs two checks to validate the digital certificate. The client verifies that the certificate is trusted (it was issued by the client s trusted CA), is valid (not expired), and satisfies other certificate constraints. The client checks that the certificate subject s common name field value matches the host name of the server to which the client is trying to connect. This is called host name verification. Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 6
7 Advanced options include inbound and outbound certificate lookup and validation (CLV). This feature provides additional protection by validating the certificate against the list of CAs compiled by the server administrator. The Oracle WebLogic Server security service provides the CLV API that finds and validates X.509 certificate chains. A CertPath is a Java Development Kit (JDK) class that stores a certificate chain in memory. The term CertPath is also used to refer to the JDK architecture and framework that is used to locate and validate certificate chains. The CLV framework extends and completes the JDK CertPath functionality. CertPath providers rely on a tightly coupled integration of Oracle WebLogic Server and JDK interfaces. Your application code can use the default CertPath providers furnished by Oracle WebLogic Server to build and validate certificate chains, or it can use any custom CertPath provider. If all the above checks return true, the SSL connection is established. With two-way SSL authentication, both the client and the server must present digital certificates before the SSL connection is enabled between the two. With two-way SSL authentication, both the client and the server must present digital certificates before the SSL connection is enabled between the two. Thus, in this case, Oracle WebLogic Server not only authenticates itself to the client (which is the minimum requirement for certificate authentication), but it also requires authentication from the requesting client. Two-way SSL authentication is useful when you must restrict access to trusted clients only. Oracle WebLogic Server SSL connections support one-way SSL, twoway SSL, or both. The Web browser client, Web server, fat client, Web services client, and SSL server connections can be configured for either one-way or two-way SSL. Oracle WebLogic Server determines whether an SSL connection is configured for one-way or two-way authentication, and SSL is configured using the Oracle WebLogic Server administration console. Host Name Verification Host name verification is the process of verifying that the name of the host to which an SSL connection is made is the intended or authorized party. Host name verification prevents man-in-the-middle attacks, in which a client requests an SSL connection to a remote application server. By default, the SSL client, as a function of the SSL handshake, compares the common name in the SubjectDN of the SSL server s digital certificate with the host name of the SSL server to which it is trying to connect. If these names do not match, the SSL connection is dropped. Trust Manager The trust manager provides a way to override the default SSL trust validation rules. It allows the server to decide whether it trusts the client that is contacting it. Using a trust manager, you can perform custom checks before continuing an SSL connection. For example, you can use the trust manager to specify that only users Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 7
8 from specific localities (such as towns, states, and countries) or users with other special attributes can gain access via the SSL connection. Oracle WebLogic Server provides the weblogic.security.ssl.trustmanager interface. This interface enables custom trust manager implementations to be called during the SSL handshake. The custom implementation can override the handshake error detected by the SSL implementation validation check or indicate an error based on its own certification rules. Oracle WebLogic Server also provides the weblogic.security.ssl.certpath.trustmanager interface, 3 which applications and custom code can use to control outbound SSL certificate lookup and validation. Asymmetric key (also referred to as public key) algorithms are implemented through a pair of different but mathematically related keys: a public key and a private key. Asymmetric Key Algorithm Asymmetric key (also referred to as public key) algorithms are implemented through a pair of different but mathematically related keys: a public key and a private key. The public key (which is widely distributed) is used for verifying a digital signature or transforming data into a seemingly unintelligible form. The private key (which is always kept secret) is used for creating a digital signature or returning the data to its original form. The public key infrastructure (PKI) in Oracle WebLogic Server also supports digital signature algorithms. Digital signature algorithms are simply public key algorithms used to generate digital signatures. Oracle WebLogic Server supports the Rivest, Shamir, and Adelman (RSA) algorithm. PROBLEM DEFINITION The focus of the rest of this white paper is on outlining how to establish two-way inbound and two-way outbound SSL authentication among a client, Oracle Service Bus, and business services separated by firewalls. The goal is to establish inbound two-way and outbound two-way SSL authentication for a scenario in which A client sends an HTTPS request to an Oracle Service Bus proxy service An Oracle Service Bus proxy service routes the request to an Oracle WebLogic Server hosted business service over HTTPS A business service receives a request and sends an HTTPS response to the client via the Oracle Service Bus proxy service DEPLOYMENT ARCHITECTURE, SETUP, AND CONFIGURATION In general, the details of the installation and configuration depend on the operating system, the number of machines, and the desired cluster sizes of Oracle WebLogic 3 The weblogic.security.ssl.certpath.trustmanager interface replaces the weblogic.security.ssl.trustmanagerjsse interface, which is superseded in Oracle WebLogic Server 9.1. Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 8
9 Server domains. Typically in a production environment, the client, the Oracle Service Bus proxy service, and the business service are hosted on separate machines. In addition, each Oracle WebLogic Server cluster node is hosted on a separate hardware system. The following section describes a simplified example of how to set up and configure request and response messaging among a client, an Oracle Service Bus proxy service, and a business service for testing. The following section describes a simplified example of how to set up and configure request and response messaging among a client, an Oracle Service Bus proxy service, and a business service for testing. The example uses minimum hardware consisting of two systems, each running a Microsoft Windows operating system. The first machine hosts the client and business service. The second machine hosts the Oracle Service Bus proxy service. The first and second machines are separated by two firewalls, with a lab network between firewalls. The lab network simulates a public network, like the internet. This is a simplification of a typical setup in which each company hosting the client, the Oracle Service Bus proxy service, or the business service has two firewalls with a DMZ in between. The example outlines common configuration steps, which can be extrapolated to suit production requirements. Figure 2 is an example of a deployment architecture, which provides context for the ensuing conversation. Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 9
10 Figure 2: A sample deployment configuration for a client with an Oracle Service Bus proxy service and a business service; DMZ not shown. Although Figure 2 does not show the DMZ, Figure 3 shows the network setup for a firewall/dmz Oracle Service Bus test. The following characteristics describe the setup: The firewall between FW-B and WLI Lab Network is a hardware firewall Cisco PIX 506. Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 10
11 The firewall between FW-E and WLI Lab Network is a software firewall Checkpoint Firewall/1. Solid lines represent the paths followed by the messages that are sent from FW-B. Dotted lines represent the paths followed by the messages sent from FW-E. Ports 7001 and 7002 are opened on the external IPs for the internal boxes. The client and Oracle WebLogic Server business service domain are hosted on FW-B. The Oracle Service Bus domain is hosted on FW-B. Figure 3: An Oracle Service Bus DMZ/firewall test hardware network setup A typical setup includes two firewalls (Figure 4): one in front of the public servers and one between the public servers and the internal LAN. This setup is typically referred to as the DMZ, because the zone between the two firewalls is not trusted and is heavily restricted. Additionally, you can set up application proxies (such as WWW and File Transfer Protocol proxies), and then block outbound access from the internal LAN on the exterior firewall and force all clients to go through your application proxies (which can have antivirus capabilities, for example). The DMZ should be a quiet zone; that is, any hostile packets trying to enter it (from the Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 11
12 internet or the internal LAN) should be blocked at either firewall, increasing the effectiveness of any intrusion-detection systems. (This results in fewer false positives.) Figure 4: A LAN setup Oracle WebLogic Server accepts only digital certificates that have root certificates from the specified trusted CAs. Inbound and Outbound Two-Way SSL Authentication Configuration In this scenario, two-way SSL certificate authentication is used among the client, the proxy service, and the business service. Each of them can be deployed on their own Oracle WebLogic Server. If this is the case, each Oracle WebLogic Server sends a digital certificate to the requesting client. The client examines the digital certificate to ensure that it is authentic, has not expired, and matches the Oracle WebLogic Server instance that presented it. The requesting client also presents a digital certificate to Oracle WebLogic Server. Requesting clients must present digital certificates from a specified set of CAs. Oracle WebLogic Server accepts only digital certificates that have root certificates from the specified trusted CAs. Oracle WebLogic Server Configuration of One-Way and Two-Way SSL By default, Oracle WebLogic Server is configured for one-way SSL authentication; however, the SSL port is disabled. You can enable an SSL port using the Oracle WebLogic Server administration console. To use two-way SSL between a client and a server: Enable the SSL port on the server. Configure identity for the server and trust for the client. Enable two-way SSL on the server. Configure trust for the server and identity for the server. The peer certificate chain needs to contain a certificate from the CA that issued the peer s identity certificate. This CA certificate does not need to be the root CA certificate. To acquire a digital certificate for your server, first generate a public key, a private key, and a certificate signature request (CSR) that contains your public key. You Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 12
13 then send the CSR to a CA and follow the CA s procedures for obtaining a signed digital certificate. When you have your private keys, digital certificates, and the additional trusted CA certificates that you need, you must store them so that Oracle WebLogic Server can use them to verify identity. 4 Store private keys and certificates in keystores. (For purposes of backward compatibility, you can also store your private keys and certificates in files.) To use SSL when connecting to an Oracle WebLogic Server application with your browser, you simply specify HTTPS and the secure port in the URL. For example: where <hostname> is the name of the system hosting the Web application. The Oracle WebLogic Server PKICredentialMapper stores the key alias and key password (for key pairs) in the embedded Lightweight Directory Access Protocol. PKI Credential Mapper A PKI credential mapper maps key pairs (a public key and a private key) to an alias. The Oracle WebLogic Server PKICredentialMapper stores the key alias and key password (for key pairs) in the embedded Lightweight Directory Access Protocol (LDAP). Key passwords are encrypted before they are stored on LDAP. The PKICredentialMapper does not store the keys; they are stored in a keystore. The PKICredentialMapper is configured with the location of the keystore and the keystore password. The target Oracle WebLogic Server not only requires a trusted and valid certificate, but it allows the SSL connection only if it can authenticate a user ID stored somewhere in the X.500 distinguished name in the client certificate. Configuration Steps Complete the following steps to configure your system: 1. Install Oracle WebLogic Server on each of the participating machines. Optionally, configure server domains in production mode connected to an Oracle database. 2. Configure keystores for all participating domains using the Oracle WebLogic Server administration console. 3. Populate the keystores with server keys and certificates using command line tools. 4. Import each server s certificate as a trusted certificate into the other server s keystore using command line tools. 4 For more information on private key, public key, and certificate requirements and procedures, refer to Security for Oracle WebLogic Server at Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 13
14 5. Configure the Oracle WebLogic Server that hosts the Oracle Service Bus proxy service to support two-way SSL using the Oracle WebLogic Server administration console. 6. Configure the Oracle WebLogic Server that hosts business services to support two-way SSL using the Oracle WebLogic Server administration console. 7. Add the user ID from the Oracle Service Bus server certificate to the business service server LDAP for business service using the Oracle WebLogic Server administration console. 8. Add the user ID from the client (or client and server) certificate to the Oracle Service Bus server LDAP system for Oracle Service Bus using the Oracle WebLogic Server administration console. 9. Configure a PKI credential mapper for Oracle Service Bus using the Oracle WebLogic Server administration console. 10. Configure a proxy service provider using the Oracle Service Bus console. 11. Associate PKI credentials (SSL client key pair) with the proxy service provider using the credentials section of the security configuration module using the Oracle Service Bus console. 12. Register a business service definition, which uses the HTTPS transport protocol with client certificate authentication in Oracle Service Bus using the Oracle Service Bus console. 13. Configure a proxy service to route a message to the business service using the Oracle Service Bus console. TESTING Business Service A business service can be implemented as a servlet like EchoServlet.java shown in the following listing. To compile the code, weblogic.jar and xbean.jar files from the server library must be on your classpath. EchoServlet.java Source Code import com.bea.xbean.common.ioutil; import javax.servlet.http.httpservletrequest; import javax.servlet.http.httpservlet; import javax.servlet.http.httpservletresponse; import javax.servlet.servletexception; import javax.servlet.servletoutputstream; import javax.servlet.servletinputstream; import java.io.ioexception; import java.io.bytearrayoutputstream; Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 14
15 import java.util.enumeration; public class EchoServlet extends HttpServlet { public static final long serialversionuid = 1L; public void service(httpservletrequest httpservletrequest, httpservletresponse httpservletresponse) throws IOException, ServletException { System.out.println( Entered the echo servlet ); System.out.println( EchoServlet: Content-Type = + httpservletrequest.getcontenttype()); /** optionally wait for the specified time interval */ String waittime = httpservletrequest.getparameter( wait ); if (waittime!= null && waittime.length() > 0) { try { Thread.sleep(Integer.parseInt(waitTime) * 1000); } catch (Exception e) { e.printstacktrace(); } } String tothrow = httpservletrequest.getparameter( throw ); if (tothrow!= null && tothrow.length() > 0) { throw new ServletException( Throwing exception for testing purposes ); } // Copy all request headers to response (although some may not be relevant!) Enumeration headers = httpservletrequest.getheadernames(); while (headers.hasmoreelements()) { String o = (String) headers.nextelement(); httpservletresponse.addheader(o,httpservletreq uest.getheader(o)); } ServletInputStream inputstream = httpservletrequest.getinputstream(); ServletOutputStream outputstream = httpservletresponse.getoutputstream(); boolean usestreaming = true; if (usestreaming) { System.out.print( EchoServlet: message = ); byte[] buf = new byte[1024]; int totalcount = 0; while (true) { Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 15
16 } } int bytecount = inputstream.read(buf, 0, buf.length); if (bytecount == -1) break; System.out.print(new String(buf, 0, bytecount)); outputstream.write(buf, 0, bytecount); totalcount += bytecount; } httpservletresponse.setcontentlength (totalcount); System.out.println(); } else { // Read entire InputStream into byte array ByteArrayOutputStream out = new ByteArrayOutputStream(1024); IOUtil.copyCompletely(inputStream, out); // Dump message to be echoed to console System.out.println( EchoServlet: message = + out); // Set content-length and dump response httpservletresponse.setcontentlength(out.size( )); out.writeto(outputstream); } String tothrow2 = httpservletrequest.getparameter( throw2 ); if (tothrow2!= null && tothrow2.length() > 0) { throw new ServletException( Throwing exception for testing purposes ); } httpservletresponse.setstatus(httpservletresponse. SC_OK); To deploy EchoServlet, you must have a Web deployment descriptor web.xml and an Oracle WebLogic Server deployment descriptor weblogic.xml. Web.xml Source Code <?xml version= 1.0?> <!DOCTYPE web-app PUBLIC -//Sun Microsystems, Inc.//DTD Web Application 2.3//EN > <web-app> <servlet> <servlet-name> EchoServlet </servlet-name> <display-name> EchoServlet </display-name> <servlet-class> EchoServlet </servlet-class> </servlet> <servlet-mapping> <servlet-name>echoservlet</servlet-name> <url-pattern>/echo</url-pattern> </servlet-mapping> <security-constraint> Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 16
17 <web-resource-collection> <web-resource-name>allendpoints</web resource-name> <url-pattern>/*</url-pattern> </web-resource-collection> <auth-constraint> <description> These are the roles who have access to inbound HTTPs endpoints </description> <role-name> Admin </role-name> </auth-constraint> <user-data-constraint> <description>ssl required</description> <transport guarantee>confidential</transport-guarantee> </user-data-constraint> </security-constraint> <login-config> <auth-method>client-cert</auth-method> </login-config> <security-role> <description> An administrator </description> <role-name> Admin </role-name> </security-role> </web-app> Weblogic.xml Source Code <?xml version= 1.0 encoding= UTF-8?> <!DOCTYPE weblogic-web-app PUBLIC -//BEA Systems, Inc.//DTD Web Application 8.1//EN > <weblogic-web-app> <security-role-assignment> <role-name>admin</role-name> <externally-defined/> </security-role-assignment> </weblogic-web-app> Create a WAR file ExternalServiceClientCert.war using the JAR tool, with the following command: jar c[v0m]f jarfile [-C dir] inputfiles [-Joption] For example: <your directory>jar cvf ExternalServiceClientCert.war * Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 17
18 After starting Oracle WebLogic Server, choose the Deployments option from the main menu and deploy ExternalServiceClientCert.war. After you have registered a business service definition, which uses the HTTPS transport protocol with client certificate authentication, configure a proxy service to route a message to the business service. Proxy Service Configure the proxy and business services using the Oracle Service Bus console. The proxy service definition relies on the configuration of a proxy service provider. You must associate PKI credentials (SSL client key pair) with the proxy service provider using the credentials section of the security configuration module. After you have registered a business service definition, which uses the HTTPS transport protocol with client certificate authentication, configure a proxy service to route a message to the business service. Client For testing this scenario, the Grinder open source development test framework is used. It is available for download at the following URL: 1. Download the grinder-3.0-beta27.zip or later release. 2. To run the Grinder client you need three files: grinder.properties, https- ClientCert.py, and an input XML file. Example File 1: grinder.properties # Example grinder.properties # grinder.jvm.arguments=-dpython.home=d:/jython/jython- 2.1 grinder.processes=1 grinder.threads=1 grinder.runs=1 grinder.useconsole=false grinder.logdirectory=log grinder.numberofoldlogs=1 #grinder.initialsleeptime=500 #grinder.sleeptimefactor=0.01 #grinder.sleeptimevariation=0.005 grinder.script=https-clientcert.py Example File 2: ClientCert.py # A simple example using the HTTP plug-in that shows # the retrieval of a single page via HTTP. The # resulting page is written to a file. More complex # HTTP scripts are best created with the TCPProxy. from net.grinder.script.grinder import grinder from net.grinder.script import Test from net.grinder.plugin.http import HTTPRequest from HTTPClient import HTTPResponse from HTTPClient import HTTPConnection from HTTPClient import NVPair from net.grinder.plugin.http import HTTPPluginControl import jarray Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 18
19 test1 = Test(1, Request resource ) request1 = test1.wrap(httprequest()) class TestRunner: def call (self): #Set the client cert to be send grinder.sslcontrol.setkeystorefile( TestClien tkeystore.jks, password ) file = open(./inputs/sslinputstring.xml, r ) contents = file.read() print request print contents print file.close() request1.addheader( Content type, text/xml ) result = request1.post( ientcertps,contents) print response print result.gettext() print Example File 3: An Input XML File <?xml version= 1.0 encoding= utf-8?> <soap:envelopexmlns:soap= oap.org/soap/envelope/ xmlns:xsi= > <soap:body> <Result xmlns= urn:acme-org:results > <Job> <contacts> <contact>j Doe</contact> <contact>j Q Public</contact> </contacts> </Job> </Result> </soap:body> </soap:envelope> Set up the classpath in a process environment by executing a script like setenvbea.cmd in the cmd shell. off set BEA_HOME=D:\wlw\src_15004jr\bea set DOMAIN_HOME=D:\wlw\src_15004jr\domains\alsb_client_domain set WEBLOGIC_HOME=%BEA_HOME%\weblogic90 set BEA_JDK=D:\wlw\dev\src\build\jrockit-jdk1.5.0_04 Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 19
20 set OLDPATH=%PATH% set PATH=%WEBLOGIC_HOME%\server\bin set PATH=%PATH%;%BEA_JDK%\bin set PATH=%PATH%;%OLDPATH% set CLASSPATH=.;%WEBLOGIC_HOME%\server\lib\weblogic.jar set WL_HOME= set ANT_HOME= set JAVA_HOME= set ANT_ARGS= 1. Start the Grinder client from the directory hosting your scripts. C:\bea\user_projects\domains\alsb_services_domain\ClientCert>java net.grinder.grinder The output is displayed in the shell window. It is similar to the following listing: 12/16/05 2:51:22 PM (agent): The Grinder 3.0-beta27 12/16/05 2:51:22 PM (agent): Worker process command line: java classpath E:\Grinder3\grinder-3.0-beta27\lib\grinder.jar;.;E:\Grinder3\grinder-3.0 beta27\lib\jython.jar;c:\bea\jrockit90_150_04\lib\tools.jar;c:\bea\jrockit90_150_ 4\jre\lib\rt.jar; net.grinder.engine.process.grinderprocess 12/16/05 2:51:23 PM (agent): process fw-b-0 started 12/16/05 2:51:26 PM (process fw-b-0): starting threads request <?xml version= 1.0 encoding= utf-8?> <soap:envelope xmlns:soap= xmlns:xsi= > <soap:body> <Result xmlns= urn:acme-org:results > <Job> <contacts> <contact>j Doe</contact> <contact>j Q Public</contact> </contacts> </Job> </Result> </soap:body> </soap:envelope> response <?xml version= 1.0 encoding= utf-8?> <soapenv:envelope xmlns:soapenv= > Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 20
21 <soapenv:header/> <soap:body xmlns:xsi= xmlns:soap= > <Result xmlns= urn:acme-org:results > <Job> <contacts> <contact>j Doe</contact> <contact>j Q Public</contact> </contacts> </Job> </Result> </soap:body> </soapenv:envelope> /16/05 2:51:27 PM (process fw-b-0): finished 12/16/05 2:51:28 PM (agent): finished 2. Include the following setting in the setdomainenv.cmd or setdomainenv.sh file to receive the full SSL debug stack: set EXTRA_JAVA_PROPERTIES=%EXTRA_JAVA_PROPERTIES% -Dssl.debug=true -Dweblogic.StdoutDebugEnabled=true -Dweblogic.security.SSL.verbose=true The Oracle Service Bus proxy service routes the request to the business service located outside the firewall. The inbound request is sent through the firewall using the reverse proxy service from the DMZ to the LAN/WAN behind the firewall. Specifically, the Grinder HTTPS client sends the request from outside the firewall to the Oracle Service Bus proxy service behind the firewall. The Oracle Service Bus proxy service routes the request to the business service located outside the firewall. The conversation between Oracle Service Bus and a server hosting the business services should complete successfully. Recall that we use inbound and outbound two-way SSL transport security. To validate the SSL handshake, examine the console windows of both the Oracle Service Bus server and the Oracle WebLogic Server that hosts the business services. Look for <HANDSHAKEMESSAGE: > entries to see how the SSL handshake was executed. (The Oracle Service Bus server console window shows the business services server certificate when it is received, and the business services console shows the client s certificate.) In both console windows you will see alerts and exceptions that indicate the SSL connection was closed. These can be ignored if they are of Type: 0. The certificate record in the business services console log is similar to the following listing: Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 21
22 <Dec 16, :49:29 PM PST> <Debug> <SecuritySSL> <000000> < received HANDSHAKE> <Dec 16, :49:29 PM PST> <Debug> <SecuritySSL> <000000> <HANDSHAKEMESSAGE:Certificate> <Dec 16, :49:29 PM PST> <Debug> <SecuritySSL> <000000> <validationcallback: validateerr = 0> <Dec 16, :49:29 PM PST> <Debug> <SecuritySSL> <000000> < cert[0] = Serial number: Issuer:C=US, L=San Jose, O=BEA Systems, Inc., OU=DEV, CN=QuickSilver-TEST-CA Subject:C=US, L=San Jose, O=BEA Systems, Inc., OU=DEV, CN=QS- SERVER-TEST Not Valid Before:Sun Jul 18 00:00:00 PDT 2004 Not Valid After:Thu Oct 18 00:00:00 PDT 2007 Signature Algorithm:SHA1withRSA> <Dec 16, :49:29 PM PST> <Debug> <SecuritySSL> <000000> < cert[1] = Serial number: 0 Issuer:C=US, L=San Jose, O=BEA Systems, Inc., OU=DEV, CN=QuickSilver-TEST-CA Subject:C=US, L=San Jose, O=BEA Systems, Inc., OU=DEV, CN=QuickSilver-TEST-CA Not Valid Before:Sat Jul 17 00:00:00 PDT 2004 Not Valid After:Tue Oct 17 00:00:00 PDT 2006 Signature Algorithm:SHA1withRSA> <Dec 16, :49:29 PM PST> <Debug> <SecuritySSL> <000000> <weblogic user specified trustmanager validation status 0> The certificate record in the Oracle Service Bus console log looks similar to this: <Dec 16, :44:11 PM PST> <Debug> <SecuritySSL> <000000> < received HANDSHAKE> <Dec 16, :44:11 PM PST> <Debug> <SecuritySSL> <000000> <HANDSHAKEMESSAGE:Certificate> <Dec 16, :44:11 PM PST> <Debug> <SecuritySSL> <000000> <validationcallback: validateerr = 0> <Dec 16, :44:11 PM PST> <Debug> <SecuritySSL> <000000> < cert[0] = Serial number: Issuer:C=US, L=San Jose, O=BEA Systems, Inc., OU=DEV, CN=QuickSilver-TEST-CA Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 22
23 Subject:C=US, L=San Jose, O=BEA Systems, Inc., OU=DEV, CN=QS-SERVER-TEST Not Valid Before:Sun Jul 18 00:00:00 PDT 2004 Not Valid After:Thu Oct 18 00:00:00 PDT 2007 Signature Algorithm:SHA1withRSA> <Dec 16, :44:11 PM PST> <Debug> <SecuritySSL> <000000> < cert[1] = Serial number: 0 Issuer:C=US, L=San Jose, O=BEA Systems, Inc., OU=DEV, CN=QuickSilver-TEST-CA Subject:C=US, L=San Jose, O=BEA Systems, Inc., OU=DEV, CN=QuickSilver-TEST-CA Not Valid Before:Sat Jul 17 00:00:00 PDT 2004 Not Valid After:Tue Oct 17 00:00:00 PDT 2006 Signature Algorithm:SHA1withRSA> <Dec 16, :44:11 PM PST> <Debug> <SecuritySSL> <000000> <weblogic user specified trustmanager validation status 0> CONCLUSION This white paper described an example of the configuration of a client, a proxy service, and a business service communicating over firewalls and a DMZ, using inbound and outbound two-way SSL authentication. Specifically, a client generates inbound traffic to a Oracle Service Bus proxy service over a secure transport-level connection using two-way SSL. The Oracle Service Bus proxy service generates outbound traffic to business services over a secure transport-level connection using two-way SSL. Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 23
24 APPENDIX: REFERENCES AND RELATED DOCUMENTS Security for Oracle WebLogic Server Understanding Oracle WebLogic Security: Security Fundamentals Oracle Service Bus Documentation: Security Configuration Oracle Service Bus Security Guide Securing Oracle WebLogic Server by Configuring SSL Administration Console Online Help: Configure Two-Way SSL ConfigureTwowaySSL.html ConfigureTwowaySSL.html ConfigureTwowaySSL.html ConfigureTwowaySSL.html Configure Keystores ConfigureKeystoresAndSSL.html Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 24
25 ConfigureKeystoresAndSSL.html ConfigureKeystoresAndSSL.html ConfigureKeystoresAndSSL.html Configuring Identity and Trust Programming Oracle WebLogic Security: Using SSL Authentication in Java Clients Grinder Framework Firewall Overview Setting Up a Test Network Oracle Dev2Dev Code-Sample ID S183: Outbound Transport Security Sample true/template/viewissue.vm/id/s183/nbrresults/184 Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Page 25
26 Oracle Service Bus Behind the Firewall in a Service-Oriented Architecture Updated October 2008 Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA U.S.A. Worldwide Inquiries: Phone: Fax: oracle.com Copyright 2008, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. 0408
BEA AquaLogic Service Bus behind the Firewall in Service-Oriented Architecture
BEA White Paper BEA AquaLogic Service Bus behind the Firewall in Service-Oriented Architecture Using BEA AquaLogic Service Bus in Service-Oriented Architecture with Firewalls, Demilitarized Zone, and Two-Way
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
CHAPTER 7 SSL CONFIGURATION AND TESTING
CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive
Securing a Web Service
1 Securing a Web Service HTTP Basic Authentication and HTTPS/SSL Authentication and Encryption - Read Chaper 32 of the J2EE Tutorial - protected session, described later in this chapter, which ensur content
IIS Reverse Proxy Implementation
IIS Reverse Proxy Implementation for OXI/OEDS Servers V E R S I O N : 1. 1 M A Y 2 9, 2 0 1 5 Table of Contents Intended Audience 3 About this Document 3 Advisories and Known Issues 3 Additional Considerations
An Oracle White Paper September 2013. Oracle WebLogic Server 12c on Microsoft Windows Azure
An Oracle White Paper September 2013 Oracle WebLogic Server 12c on Microsoft Windows Azure Table of Contents Introduction... 1 Getting Started: Creating a Single Virtual Machine... 2 Before You Begin...
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014]
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
An Oracle White Paper January 2013. Integrating Oracle Application Express with Oracle Access Manager. Revision 1
An Oracle White Paper January 2013 Integrating Oracle Application Express with Oracle Access Manager Revision 1 Disclaimer The following is intended to outline our general product direction. It is intended
Configuring IBM WebSphere Application Server 7 for Secure Sockets Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Web
Configuring IBM WebSphere Application Server 7 for Secure Sockets Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Web Applications Configuring IBM WebSphere 7 for SSL and Client-Certificate
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Configuring BEA WebLogic Server for Web Authentication with SAS 9.2 Web Applications
Configuration Guide Configuring BEA WebLogic Server for Web Authentication with SAS 9.2 Web Applications This document describes how to configure Web authentication with BEA WebLogic for the SAS Web applications.
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Oracle Net Services for Oracle10g. An Oracle White Paper May 2005
Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
How To Configure An Orgaa Cloud Control On A Bigip (Cloud Control) On An Orga Cloud Control (Oms) On A Microsoft Cloud Control 2.5 (Cloud) On Microsoft Powerbook (Cloudcontrol) On The
An Oracle White Paper March, 2012 Enterprise Manager 12c Cloud Control: Configuring OMS High Availability with F5 BIG- IP Local Traffic Manager Executive Overview... 2 About F5 BIG-IP and Oracle Enterprise
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
An Oracle White Paper October 2009. Frequently Asked Questions for Oracle Forms 11g
An Oracle White Paper October 2009 Frequently Asked Questions for Oracle Forms 11g Disclaimer The following is intended to outline our general product direction. It is intended for information purposes
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Load Balancing Oracle Web Applications. An Oracle White Paper November 2004
Load Balancing Oracle Web Applications An Oracle White Paper November 2004 Load Balancing Oracle Web Applications Introduction... 3 Load Balancing Implementation... 3 Architecture Overview... 3 Architecture
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.
Configuring Secure Socket Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Systems That Use Oracle WebLogic 10.3 Table of Contents Overview... 1 Configuring One-Way Secure Socket
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
An Oracle White Paper July 2013. Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows
An Oracle White Paper July 2013 Introducing the Oracle Home User Introduction Starting with Oracle Database 12c Release 1 (12.1), Oracle Database on Microsoft Windows supports the use of an Oracle Home
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Implementing a Custom Search Interface with SES - a case study with search.oracle.com. An Oracle White Paper June 2006
Implementing a Custom Search Interface with SES - a case study with search.oracle.com An Oracle White Paper June 2006 Implementing a Custom Search Interface with SES - a case study with search.oracle.com
An Oracle White Paper March 2009. Integrating Microsoft SharePoint Server With Oracle Virtual Directory
An Oracle White Paper March 2009 Integrating Microsoft SharePoint Server With Oracle Virtual Directory Oracle White Paper Integrating Microsoft SharePoint Server With Oracle Virtual Directory Disclaimer
Oracle BI Publisher Enterprise Cluster Deployment. An Oracle White Paper August 2007
Oracle BI Publisher Enterprise Cluster Deployment An Oracle White Paper August 2007 Oracle BI Publisher Enterprise INTRODUCTION This paper covers Oracle BI Publisher cluster and high availability deployment.
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
WebSphere MQ Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 WebSphere MQ Oracle Enterprise Gateway Integration Guide 1 / 30 Disclaimer The following is intended to outline our general product direction. It is intended for information
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
Configuring Microsoft Active Directory for Oracle Net Naming. An Oracle White Paper April 2014
Configuring Microsoft Active Directory for Oracle Net Naming An Oracle White Paper April 2014 Configuring Microsoft Active Directory for Oracle Net Naming Introduction... 3 Steps to Configure Active Directory...
Security Guide Release 7.3
[1]Oracle Communications ASAP Security Guide Release 7.3 E61084-01 July 2015 Oracle Communications ASAP Security Guide, Release 7.3 E61084-01 Copyright 2012, 2015, Oracle and/or its affiliates. All rights
Flexible Routing and Load Control on Back-End Servers. Controlling the Request Load and Quality of Service
ORACLE TRAFFIC DIRECTOR KEY FEATURES AND BENEFITS KEY FEATURES AND BENEFITS FAST, RELIABLE, EASY-TO-USE, SECURE, AND SCALABLE LOAD BALANCER [O.SIDEBAR HEAD] KEY FEATURES Easy to install, configure, and
Oracle Web Service Manager 11g Field level Encryption (in SOA, WLS) March, 2012
Oracle Web Service Manager 11g Field level Encryption (in SOA, WLS) March, 2012 Step-by-Step Instruction Guide Author: Prakash Yamuna Senior Development Manager Oracle Corporation Table of Contents Use
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
The HTTP Plug-in. Table of contents
Table of contents 1 What's it for?... 2 2 Controlling the HTTPPlugin... 2 2.1 Levels of Control... 2 2.2 Importing the HTTPPluginControl...3 2.3 Setting HTTPClient Authorization Module... 3 2.4 Setting
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Oracle Identity Analytics Architecture. An Oracle White Paper July 2010
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview
An Oracle White Paper February 2014 Oracle Data Integrator 12c Introduction Oracle Data Integrator (ODI) 12c is built on several components all working together around a centralized metadata repository.
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...
How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance
An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance Table of Contents Introduction...3 Active Directory LDAP Services...4
SSL CONFIGURATION GUIDE
HYPERION RELEASE 9.3.1 SSL CONFIGURATION GUIDE CONTENTS IN BRIEF About This Document... 2 Assumptions... 2 Information Sources... 2 Identifying SSL Points for Hyperion Products... 4 Common Activities...
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Disclaimer The following is intended to outline our general product
Enterprise Deployment of the EMC Documentum WDK Application
A Detailed Review Abstract The objective of this white paper is to present a typical enterprise deployment of the EMC Documentum 6 Web Development Kit (WDK) application. The focus will be on the WDK level,
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
An Oracle White Paper October 2011. BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider
An Oracle White Paper October 2011 BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider Disclaimer The following is intended to outline our general product direction. It is intended for information
SOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Configuring Integrated Windows Authentication for Oracle WebLogic with SAS 9.2 Web Applications
Configuring Integrated Windows Authentication for Oracle WebLogic with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
PowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite Abstract This white paper outlines the deployment and configuration of a Single Sign-On solution for EMC Documentum
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Goals... 3 High- Level Steps... 4 Basic FTP to File with Compression... 4 Steps in Detail... 4 MFT Console: Login and
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
IONA Security Platform
IONA Security Platform February 22, 2002 Igor Balabine, PhD IONA Security Architect Copyright IONA Technologies 2001 End 2 Anywhere Agenda IONA Security Platform (isp) architecture Integrating with Enterprise
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
Universal Content Management Version 10gR3. Security Providers Component Administration Guide
Universal Content Management Version 10gR3 Security Providers Component Administration Guide Copyright 2008 Oracle. All rights reserved. The Programs (which include both the software and documentation)
Oracle Communications WebRTC Session Controller: Basic Admin. Student Guide
Oracle Communications WebRTC Session Controller: Basic Admin Student Guide Edition 1.0 April 2015 Copyright 2015, Oracle and/or its affiliates. All rights reserved. Disclaimer This document contains proprietary
M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
s@lm@n Oracle Exam 1z0-102 Oracle Weblogic Server 11g: System Administration I Version: 9.0 [ Total Questions: 111 ]
s@lm@n Oracle Exam 1z0-102 Oracle Weblogic Server 11g: System Administration I Version: 9.0 [ Total Questions: 111 ] Oracle 1z0-102 : Practice Test Question No : 1 Which two statements are true about java
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
Configuring Microsoft Active Directory 2003 for Net Naming. An Oracle White Paper September 2008
Configuring Microsoft Active Directory 2003 for Net Naming An Oracle White Paper September 2008 NOTE: The following is intended to outline our general product direction. It is intended for information
C O N F I G U R I N G O P E N L D A P F O R S S L / T L S C O M M U N I C A T I O N
H Y P E R I O N S H A R E D S E R V I C E S R E L E A S E 9. 3. 1. 1 C O N F I G U R I N G O P E N L D A P F O R S S L / T L S C O M M U N I C A T I O N CONTENTS IN BRIEF About this Document... 2 About
An Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security
An Oracle White Paper September 2013 Directory Services Integration with Database Enterprise User Security Disclaimer The following is intended to outline our general product direction. It is intended
SolarWinds Technical Reference
SolarWinds Technical Reference Using SSL Certificates in Web Help Desk Introduction... 1 How WHD Uses SSL... 1 Setting WHD to use HTTPS... 1 Enabling HTTPS and Initializing the Java Keystore... 1 Keys
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Release Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
BEA AquaLogic Service Bus and WebSphere MQ in Service-Oriented Architectures
BEA White Paper BEA AquaLogic Service Bus and WebSphere MQ in Service-Oriented Architectures Integrating a Clustered BEA AquaLogic Service Bus Domain with a Clustered IBM WebSphere MQ Copyright Copyright
Oracle Enterprise Manager
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 12.1.0.1.0 E28548-04 February 2014 Microsoft Active Directory, which is included with Microsoft
Angel Dichev RIG, SAP Labs
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine SSL
Maximum Availability Architecture. Oracle Best Practices For High Availability. Backup and Recovery Scenarios for Oracle WebLogic Server: 10.
Backup and Recovery Scenarios for Oracle WebLogic Server: 10.3 An Oracle White Paper January, 2009 Maximum Availability Architecture Oracle Best Practices For High Availability Backup and Recovery Scenarios
An Oracle White Paper November 2010. Oracle Business Intelligence Standard Edition One 11g
An Oracle White Paper November 2010 Oracle Business Intelligence Standard Edition One 11g Introduction Oracle Business Intelligence Standard Edition One is a complete, integrated BI system designed for
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
ISA Server Plugins Setup Guide
ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,
An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Configuring the JBoss Application Server for Secure Sockets Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Web
Configuring the JBoss Application Server for Secure Sockets Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Web Applications Configuring SSL and Client-Certificate Authentication
Lotus Sametime. FIPS Support for IBM Lotus Sametime 8.0. Version 8.0 SC23-8760-00
Lotus Sametime Version 8.0 FIPS Support for IBM Lotus Sametime 8.0 SC23-8760-00 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS WERE
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING a Class IIIc SSL Certificate using BEA Weblogic V ERSION 1.0 Page 1 of 8 Procedure for
Junio 2015. SSL WebLogic Oracle. Guía de Instalación. Junio, 2015. SSL WebLogic Oracle Guía de Instalación CONFIDENCIAL Página 1 de 19
SSL WebLogic Oracle Guía de Instalación Junio, 2015 Página 1 de 19 Setting Up SSL on Oracle WebLogic Server This section describes how to configure SSL on Oracle WebLogic Server for PeopleTools 8.50. 1.
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Secure Gateway for Windows Administrator s Guide. Secure Gateway 3.1 for Windows
Secure Gateway for Windows Administrator s Guide Secure Gateway 3.1 for Windows Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance of the End
