The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile



Similar documents
This project was supported by Grant No DB-BX-K105 awarded by the Bureau of Justice, Office of Justice Programs in collaboration with the U.S.

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

NIST s Guide to Secure Web Services

WEB SERVICES SECURITY

Run-time Service Oriented Architecture (SOA) V 0.1

AS4: Web Services for B2B. GS1 etg White Paper. Issue 1, Approved, July AS4: Web Services for B2B GS1 etg White Paper

An Oracle White Paper November Oracle Primavera P6 EPPM Integrations with Web Services and Events

This Working Paper provides an introduction to the web services security standards.

Java Security Web Services Security (Overview) Lecture 9

Prescription Monitoring Program Information Exchange Service. Execution Context Version 1.0

GFIPM & NIEF Single Sign-on Supporting all Levels of Government

Introduction to Service Oriented Architectures (SOA)

Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS)

Lecture Notes course Software Development of Web Services

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

SOA GOVERNANCE MODEL

"Understanding Devices Profile for Web Services, Web Services Discovery, and SOAPover-UDP"

Introduction to UDDI: Important Features and Functional Concepts

Software Requirement Specification Web Services Security

Szolgáltatásorientált rendszerintegráció. WS-* standards

Digital Signature Web Service Interface

Web Services Distributed Management: Management of Web Services (WSDM-MOWS) 1.1

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

A standards-based approach to application integration

Service-Oriented Architectures

02267: Software Development of Web Services

Presentation / Interface 1.3

XML Signatures in an Enterprise Service Bus Environment

Service-Oriented Architecture

Structured Data Capture (SDC) Trial Implementation

Bindings for the Service Provisioning Markup Language (SPML) Version 1.0

OIO SAML Profile for Identity Tokens

[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol

Business Process Execution Language for Web Services

Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1

Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006

White Paper. Web Services External (WS-X) An AS4 Implementation at Cisco

Web Services Trust and XML Security Standards

Developing Java Web Services

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008

SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0

igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6

ITS. Java WebService. ITS Data-Solutions Pvt Ltd BENEFITS OF ATTENDANCE:

Model User Guide for Implementing Online Insurance Verification

Quality Model for Web Services

SOA Blueprints Concepts

SOAP and WSDL. At the heart of Web services today are SOAP and WSDL, so it s important that. Part II

e-filing Secure Web Service User Manual

Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Increasing IT flexibility with IBM WebSphere ESB software.

e-gov Architecture Service Interface Guidelines

JVA-561. Developing SOAP Web Services in Java

Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

[MS-BDSRR]: Business Document Scanning: Scan Repository Capabilities and Status Retrieval Protocol

Web Services Development for IBM WebSphere Application Server V7.0. Version: Demo. Page <<1/10>>

Structured Data Capture (SDC) Draft for Public Comment

3GPP TS V8.1.0 ( )

Business Rule Standards -- Interoperability and Portability

Securing Web Services With SAML

Java Web Services Training

A Noval Approach for S/MIME

Web Services Implementation: The Beta Phase of EPA Network Nodes

Authentication and Authorization Systems in Cloud Environments

Web Services Manageability Concepts (WS-Manageability)

Securing Web Services with WS-Security

Secure Document Circulation Using Web Services Technologies

Message Containers and API Framework

MedBiquitous Web Services Design Guidelines

Service Virtualization: Managing Change in a Service-Oriented Architecture

CICS Identity and Security

AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010

XIII. Service Oriented Computing. Laurea Triennale in Informatica Corso di Ingegneria del Software I A.A. 2006/2007 Andrea Polini

AquaLogic Service Bus

17 March 2013 NIEM Web Services API Version 1.0 URI:

SAML Federated Identity at OASIS

Oracle SOA Reference Architecture

Network Security. Chapter 10. Application Layer Security: Web Services. Part I: Introduction to Web Services

Business Object Document (BOD) Message Architecture for OAGIS Release 9.+

Easy CramBible Lab DEMO ONLY VERSION Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

Contents at a Glance. 1 Introduction Basic Principles of IT Security Authentication and Authorization in

Transcription:

The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile V 1.1 by The Global Infrastructure/Standards Working Group August 1, 2007

Table of Contents Acknowledgements... 1 1. Introduction and Purpose... 2 1.1. Profile Selection Guidance... 2 1.2. Usage... 3 1.3. Namespace References... 3 2. Conformance Requirements... 3 2.1. Conformance Targets... 4 2.2. General Conformance Requirements (Normative)... 5 2.3. Implementation Notes and Implications (Non-Normative)... 5 3. Service Interaction Requirements... 6 3.1. Service Consumer Authentication... 6 3.1.1. Statement of Requirement From JRA... 6 3.1.2. Conformance Targets (Normative)... 6 3.1.3. Implementation Notes and Implications (Non-Normative)... 6 3.2. Service Consumer Authorization... 6 3.2.1. Statement of Requirement From JRA... 6 3.2.2. Conformance Targets (Normative)... 7 3.2.3. Implementation Notes and Implications (Non-Normative)... 7 3.3. Identity and Attribute Assertion Transmission... 7 3.3.1. Statement of Requirement From JRA... 7 3.3.2. Conformance Targets (Normative)... 7 3.3.3. Implementation Notes and Implications (Non-Normative)... 8 3.4. Service Authentication... 8 3.4.1. Statement of Requirement From JRA... 8 3.4.2. Conformance Targets (Normative)... 8 3.4.3. Implementation Notes and Implications (Non-Normative)... 8 3.5. Message Non-Repudiation... 9 3.5.1. Statement of Requirement From JRA... 9 3.5.2. Conformance Targets (Normative)... 9 3.5.3. Implementation Notes and Implications (Non-Normative)... 9 3.6. Message Integrity... 9 3.6.1. Statement of Requirement From JRA... 9 3.6.2. Conformance Targets (Normative)... 9 3.6.3. Implementation Notes and Implications (Non-Normative)... 10

3.7. Message Confidentiality... 10 3.7.1. Statement of Requirement From JRA... 10 3.7.2. Conformance Targets (Normative)... 10 3.7.3. Implementation Notes and Implications (Non-Normative)... 10 3.8. Message Addressing... 10 3.8.1. Statement of Requirement From JRA... 10 3.8.2. Conformance Targets (Normative)... 11 3.8.3. Implementation Notes and Implications (Non-Normative)... 11 3.9. Reliability... 11 3.9.1. Statement of Requirement From JRA... 11 3.9.2. Conformance Targets (Normative)... 12 3.9.3. Implementation Notes and Implications (Non-Normative)... 12 3.10. Transaction Support... 12 3.10.1. Statement of Requirement From JRA... 12 3.10.2. Conformance Targets (Normative)... 12 3.10.3. Implementation Notes and Implications (Non-Normative)... 13 3.11. Service Metadata Availability... 13 3.11.1. Statement of Requirement From JRA... 13 3.11.2. Conformance Targets (Normative)... 13 3.11.3. Implementation Notes and Implications (Non-Normative)... 13 3.12. Interface Description Requirements... 13 3.12.1. Statement of Requirement From JRA... 13 3.12.2. Conformance Targets (Normative)... 13 3.12.3. Implementation Notes and Implications (Non-Normative)... 14 4. Message Exchange Patterns... 15 4.1. Fire-and-Forget Pattern... 15 4.2. Request-Response Pattern... 15 4.3. Publish-Subscribe Pattern... 15 5. Message Definition Mechanisms... 17 6. Glossary... 18 7. References... 20 8. Document History... 24 Appendix A: Documenter Team... 25

Acknowledgements The Global Justice Reference Architecture (JRA) was developed through a collaborative effort of the U.S. Department of Justice s (DOJ) Global Justice Information Sharing Initiative (Global). Global aids its member organizations and the people they serve through a series of important initiatives. These include the facilitation of Global working groups. The Global Infrastructure/Standards Working Group (GISWG) is one of four Global working groups covering critical topics such as intelligence, privacy, security, and standards. The GISWG is under the direction of Tom Clarke, Ph.D., National Center for State Courts. The GISWG consists of three committees, including Management and Policy, Service Interaction, and Services Committees. Although this document is the product of Global and its GISWG membership, it was primarily adapted from the technical reference architecture developed by the state of Washington, and sincere appreciation is expressed to Mr. Scott Came, state of Washington and SEARCH, The National Consortium for Justice Information and Statistics, for his guidance and leadership. In addition, parts of the architecture were derived from the Organization for the Advancement of Structured Information Standards (OASIS) Reference Model for Service-Oriented Architecture (SOA-RM) 1.0. Other major contributors deserving of recognition include the OASIS Court Filing Technical Committee, OASIS SOA Reference Model Technical Committee, Messaging Focus Group, and GISWG Service Interaction Committee. Mr. Jim Cabral IJIS Institute, Chair, Global Security Working Group Mr. Scott Came SEARCH, The National Consortium for Justice Information and Statistics; GISWG Service Interaction Committee Dr. Tom Clarke National Center for State Courts; Chair, GISWG Mr. Kael Goodman IJIS Institute; Chair, GISWG Service Interaction Committee Mr. Zemin Luo IJIS Institute, GISWG Service Interaction Committee Mr. Tom Merkle National Institute of Justice, GISWG Service Interaction Committee Mr. John Ruegg Los Angeles County Information Systems Advisory Body, GISWG Service Interaction Committee For more information about the Global efforts, including the Global Justice Reference Architecture initiative and corresponding deliverables, please refer to the Global Web site, http://it.ojp.gov/globaljra, for official announcements. Page 1 of 25

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 1. Introduction and Purpose The purpose of this document is to establish a WEB SERVICES SERVICE INTERACTION PROFILE (WS SIP) based on the Web services (WS) family of technology standards. A SERVICE INTERACTION PROFILE (SIP) is a concept identified in the Global Justice Reference Architecture ([JRA]). This concept defines an approach to meeting the basic requirements necessary for interaction between SERVICE CONSUMERS and SERVICES. The approach utilizes a cohesive or natural grouping of technologies, standards, or techniques in meeting those basic interaction requirements. A profile establishes a basis for interoperability between service consumer systems and services that agree to utilize that profile for interaction. A service interaction profile guides the definition of SERVICE INTERFACES. In an SOA environment, every service interface shared between two or more information systems should conform to exactly one service interaction profile. Service consumers that interact with an interface should likewise conform to that interface s profile. The Web Services Service Interaction Profile (WS SIP) discussed in this document is based on the Web services family of technology standards, defined as follows: The Web Services Interoperability (WS-I) Organization Basic Profile ([WS-I BP]), Version 1.1, and all standards that it references (dated April 10, 2006). The WS-I Attachments Profile ([WS-I AP]), Version 1.0, and all standards that it references. The WS-I Basic Security Profile ([WS-I BSP]) current Working Group Draft, Version 1.0 (dated March 30, 2007), and all Token Profiles and related standards adopted by reference. Other standards explicitly identified in this document developed by the World Wide Web Consortium (W3C) or the Organization for the Advancement of Structured Information Standards (OASIS). If no standard is available from WS-I, W3C, or OASIS to meet an identified requirement, then specifications developed by and issued under the copyright of a group of two or more companies will be referenced. 1.1. Profile Selection Guidance The following table provides guidance on the selection of service interaction profiles (SIP). Words or phrases formatted in this STYLE are defined in the Glossary. Abbreviations formatted in this [style] represent citations defined in the References section below. Page 2 of 25

Select this Profile Web Services SIP ebxml SIP If your technology stack for information sharing includes: SOAP, WS-I, WS-* ebxml technologies ([ebxml]) 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 1.2. Usage This document is intended to serve as a guideline for exchanging information among consumer systems and provider systems by satisfying the service interaction requirements identified in the JRA Specification document 1 ([JRA]) on pages 35 and 36. This profile does not guide interaction between humans and services, even though such interaction is within the scope of the OASIS Reference Model for Service-Oriented Architecture (SOA-RM), Version 1.0. However, in demonstrating satisfaction of the Identity and Attribute Assertion Transmission service interaction requirement, this profile defines how a consumer system should send identity and other information about a human to a service. This document may serve as a reference or starting point for implementers to use in defining their own Web Services Service Interaction Profile (WS SIP). However, to remain valid and consistent with the JRA, an implementer may only further specify or constrain this profile and may not introduce techniques or mechanisms that conflict with this profile s guidance. This document assumes that the reader is familiar with the JRA Specification and that the reader interprets this document as a service interaction profile defined in the context of that architecture. 1.3. Namespace References This document associates the following namespace abbreviations and namespace identifiers: xsd: http://www.w3.org/2001/xmlschema wsdl: http://schemas.xmlsoap.org/wsdl/ 2. Conformance Requirements This section describes what it means to conform to this service interaction profile. 1 Global Justice Reference Architecture Specification, Working Draft, Version 1.4, http://it.ojp.gov/globaljra. Page 3 of 25

60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 2.1. Conformance Targets A conformance target is any element or aspect of an information sharing architecture whose implementation or behavior is constrained by this service interaction profile. This profile places such constraints on concepts in order to ensure interoperable implementations of those concepts. This profile identifies the following conformance targets, which are concepts from the [JRA]: SERVICE INTERFACE SERVICE CONSUMER MESSAGE That is, this service interaction profile only addresses, specifies, or constrains these three conformance targets. Other elements of an information sharing architecture are not addressed, specified, or constrained by this profile. To conform to this service interaction profile, an approach to integrating two or more information systems must: Identify and implement all of the conformance targets listed above in a way consistent with their definitions in the [JRA]. Meet all the requirements for each of the targets established in this service interaction profile. Conformance to this service interaction profile does not require a service interface to enforce every service interaction requirement identified in the JRA. If an interface enforces a particular service interaction requirement, conformance to this profile requires that it do so as directed by the guidance specified here. 83 Page 4 of 25

84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 2.2. General Conformance Requirements (Normative) A service interface conforms to this service interaction profile if: The interface s description meets all requirements of the DESCRIPTION conformance target in [WS-I BP]. The interface meets all requirements of the INSTANCE and RECEIVER conformance targets in [WS-I BP]. A service consumer conforms to this service interaction profile if: The consumer meets all requirements of the CONSUMER and SENDER conformance targets in [WS-I BP]. A MESSAGE conforms to this service interaction profile if: The message meets all requirements of the MESSAGE and ENVELOPE conformance targets in [WS-I BP]. The message conforms to the National Information Exchange Model ([NIEM]), Version 1.0; Global Justice XML Data Model ([GJXDM]), Version 3.0.3; or other published standard DOMAIN VOCABULARIES in which the semantics of the service s information model match components in those vocabularies. 2.3. Implementation Notes and Implications (Non-Normative) Global intends to monitor progress on the World Wide Web Consortium (W3C) Message Transmission Optimization Mechanism ([MTOM]) and XML-Binary Optimized Packaging ([XOP]) standards, as well as emerging WS-I Basic Profile versions that reference these standards, to assess these standards appropriateness for inclusion in this Web Services Service Interaction Profile. Implementers should be aware that not all product and infrastructure vendors are supporting WS-I Attachments Profile, due to its reliance on the Multipurpose Internet Mail Extensions (MIME) standard for encoding attachments. 110 Page 5 of 25

111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 3. Service Interaction Requirements Conformance to this Web Services Service Interaction Profile requires that if an approach to integrating two systems has any of the following requirements, each such requirement be implemented as indicated in each section below. 3.1. Service Consumer Authentication 3.1.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how information is provided with messages transmitted from service consumer to service to verify the identity of the consumer. 3.1.2. Conformance Targets (Normative) Conformance with this service interaction profile requires that message(s) sent to the service interface by a service consumer must assert the consumer s identity by including a security token that conforms to [WS-I BSP]. If the chosen security token relies on a digital signature, then conformance with this service interaction profile requires that the EXECUTION CONTEXT supporting the service interaction include appropriate public key infrastructure (PKI). 3.1.3. Implementation Notes and Implications (Non-Normative) This service interaction profile assumes that implementers will utilize features of their data networks (including but not limited to HTTPS, firewalls, and virtual private networks [VPNs]) to satisfy consumer authentication requirements. Conformance to the guidance above is necessary only when network features are inadequate to authenticate the consumer (for instance, when the message must transit an intermediary service or when persistent message-level authentication is required by the service). 3.2. Service Consumer Authorization 3.2.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how information is provided with messages transmitted from service consumer to service to document or assert the consumer s authorization to perform certain actions on and/or access certain information via the service. Page 6 of 25

141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 3.2.2. Conformance Targets (Normative) Conformance with this service interaction profile requires that message(s) sent to the service interface by a service consumer must assert the consumer s authorization to perform the requested action by including a security assertion containing an attribute statement, such that the assertion and attribute statement conform to the Security Assertion Markup Language ([SAML]), Version 2.0, specification set. 3.2.3. Implementation Notes and Implications (Non-Normative) Implementers are encouraged to monitor the development of the Global Federated Identity and Privilege Management ([GFIPM]) metadata initiative and reflect the guidance of that initiative and its message definitions. Future versions of this service interaction profile may require conformance with GFIPM metadata structures and encoding, once they have been finalized and endorsed by the appropriate Global committees and working groups. Additionally, future conformance with this service interaction profile may require that the execution context supporting the service interaction include a valid GFIPM identity provider that shall have generated the SAML assertion. Global will continue to monitor the SAML standard to assess the appropriateness of SAML updates for inclusion in this Web Services Service Interaction Profile. The current GFIPM metadata and SAML encoding specifications referenced are an early version and will undergo substantive changes. Specifically, the current GFIPM specification will be reconciled with NIEM 2.0 and incorporate feedback resulting from the ongoing GFIPM pilot project. 3.3. Identity and Attribute Assertion Transmission 3.3.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how information is provided with messages transmitted from service consumer to service to assert the validity of information about a human or machine, including its identity. 3.3.2. Conformance Targets (Normative) Conformance with this Web Services Service Interaction Profile requires that message(s) sent to the service interface by a service consumer must assert the consumer s authorization to perform the requested action by including an assertion containing an attribute statement, such that the assertion and attribute statement conform to the Security Assertion Markup Language ([SAML]), Version 2.0. Page 7 of 25

174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 3.3.3. Implementation Notes and Implications (Non-Normative) Implementers are encouraged to monitor the development of the Global Federated Identity and Privilege Management ([GFIPM]) metadata initiative and reflect the guidance of that initiative and its message definitions. Future versions of this service interaction profile may require conformance with GFIPM metadata structures and encoding, once they have been finalized and endorsed by the appropriate Global committees and working groups. Additionally, future conformance with this service interaction profile may require that the execution context supporting the service interaction include a valid GFIPM identity provider that shall have generated the SAML assertion. The current GFIPM metadata and SAML encoding specifications referenced are an early version and will undergo substantive changes. Specifically, the current GFIPM specification will be reconciled with NIEM 2.0 and incorporate feedback resulting from the ongoing GFIPM initiative. 3.4. Service Authentication 3.4.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how a service provides information to a consumer that demonstrates the service s identity to the consumer s satisfaction. 3.4.2. Conformance Targets (Normative) Conformance with this service interaction profile requires that message(s) sent to the service interface by a SERVICE PROVIDER must assert the provider s identity by including a security token that conforms to [WS-I BSP]. If the chosen security token relies on a digital signature, then conformance with this service interaction profile requires that the execution context supporting the service interaction include appropriate public key infrastructure (PKI). 3.4.3. Implementation Notes and Implications (Non-Normative) This service interaction profile assumes that implementers will utilize features of their data networks (including but not limited to HTTPS, firewalls, and virtual private networks [VPNs]) to satisfy consumer authentication requirements. Conformance to the guidance above is necessary only when network features are inadequate to authenticate the provider (for instance, when the message must transit an intermediary service or when persistent message-level authentication is required by the service). Page 8 of 25

208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 3.5. Message Non-Repudiation 3.5.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how information is provided in a message to allow the recipient to prove that a particular authorized sender in fact sent the message. 3.5.2. Conformance Targets (Normative) Conformance with this Web Services Service Interaction Profile requires that the sender of the message must: Include a creation timestamp in the manner prescribed in Section 10, Security Timestamps, of [WS-Security]. Create a digital signature of the creation timestamp and the part of the message requiring non-repudiation (which may be the entire message). This signature must conform to the requirements of [WS-I BSP] Section 8, XML- Signature. Conformance with this service interaction profile requires that the execution context supporting the service interaction include appropriate PKI. 3.5.3. Implementation Notes and Implications (Non-Normative) By itself, this method does not provide for absolute non-repudiation. The business parties (e.g., agencies) involved in the service interaction should supplement the technical approach with a written agreement that establishes whether and under what circumstances they permit repudiation. Note that [WS-Security] provides an example of this technical approach in Section 11, Extend Example. 3.6. Message Integrity 3.6.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how information is provided in a message to allow the recipient to verify that the message has not changed since it left control of the sender. 3.6.2. Conformance Targets (Normative) Conformance with this Web Services Service Interaction Profile requires that the sender of the message must sign all or part of a message using [XML Signature]. The message must meet all requirements of [WS-I BSP] Section 8, XML- Signature. Page 9 of 25

241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 Conformance with this service interaction profile requires that the execution context supporting the service interaction include appropriate PKI. 3.6.3. Implementation Notes and Implications (Non-Normative) This Web Services Service Interaction Profile assumes that implementers will utilize features of their data networks (including but not limited to HTTPS, firewalls, and virtual private networks) to satisfy integrity requirements. Conformance to the guidance above is necessary only when network features are inadequate to provide integrity (for instance, when the message must transit an intermediary service or when persistent message-level integrity is required by the service). 3.7. Message Confidentiality 3.7.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how information is provided in a message to protect anyone except an authorized recipient from reading the message or parts of the message. 3.7.2. Conformance Targets (Normative) Conformance with this Web Services Service Interaction Profile requires that the sender of the message must encrypt all or part of a message using [XML Encryption] as further specified and constrained in [WS-I BSP]. The encryption must result from application of an encryption algorithm approved by [FIPS 140-2]. Confidential elements or sections of a message must meet the requirements associated with ENCRYPTED_DATA in [WS-I BSP] Section 9, XML Encryption. Conformance with this service interaction profile requires that the execution context supporting the service interaction include appropriate PKI. 3.7.3. Implementation Notes and Implications (Non-Normative) None. 3.8. Message Addressing 3.8.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how information is provided in a message to indicate: Where a message originated. The ultimate destination of the message beyond physical endpoint. Page 10 of 25

272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 A specific recipient to whom the message should be delivered (this includes sophisticated metadata designed specifically to support routing). A specific address or entity to which reply messages (if any) should be sent. 3.8.2. Conformance Targets (Normative) Conformance with this Web Services Service Interaction Profile requires that every message must conform to the WS-Addressing 1.0 Core ([WS-Addressing Core]) and SOAP Binding ([WS-Addressing SOAP Binding]) specifications, as described in Section 8 of [WS-Addressing SOAP Binding]. Conformance of messages with the WS-Addressing 1.0 WSDL Binding ([WS-Addressing WSDL Binding]) is recommended but not required. If the addressing requirements of a specific interaction are satisfied by the components within the XML namespace defined by the OASIS Emergency Management Technical Committee and whose identifier is urn:oasis:names:tc:emergency:edxl:de:1.0 (or later version), then conformance with this service interaction profile requires that: 1. The message include a SOAP header that conforms to [WS-Addressing Core] and identifies, with an endpoint reference, the logical or physical address of an intermediary service responsible for implementing the addressing requirements; and 2. The endpoint reference include, as a reference property, an XML structure conformant to and valid against the components in the namespace whose identifier is urn:oasis:names:tc:emergency:edxl:de:1.0. In this section, the terms endpoint reference and reference property are to be interpreted as they are defined in [WS-Addressing Core]. 3.8.3. Implementation Notes and Implications (Non-Normative) Note that the EDXL Distribution Element is included in the current production release of NIEM, Version 1.0, as an external standard. 3.9. Reliability 3.9.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how information is provided with messages to permit message senders to receive notification of the success or failure of message transmissions and to permit messages sent with specific sequence-related rules either to arrive as intended or fail as a group. Page 11 of 25

305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 3.9.2. Conformance Targets (Normative) Conformance with this Web Services Service Interaction Profile requires that message(s) must contain SOAP headers that conform to the requirements of the OASIS WS-ReliableMessaging standard ([WS-RM]). Conformance with this service interaction profile requires that the execution context supporting the interaction include components that implement the RM-Source and RM-Destination components defined in the [WS-RM] standard. 3.9.3. Implementation Notes and Implications (Non-Normative) Global will continue monitoring the emerging WS-I Reliable Secure Profile ([WS-I RSP]) as to appropriateness for inclusion in this Web Services Service Interaction Profile. 3.10. Transaction Support 3.10.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how information is provided with messages to permit a sequence of messages to be treated as an atomic transaction by the recipient. 3.10.2. Conformance Targets (Normative) Conformance with this Web Services Service Interaction Profile requires that the following must be true of the consumers, services, and messages involved in the interaction: The consumers and services must meet the behavioral requirements of applications and participants as defined in [WS-Coordination], [WS- Atomic Transaction], and [WS-Business Activity], as appropriate per nature of the transaction requirements. Messages must include the appropriate Coordination Context SOAP header to identify the transactional activity, as defined in [WS-Coordination] and as further specified in [WS-Atomic Transaction] to support synchronous short duration transactions or [WS-Business Activity] to support asynchronous long-running transactions, as appropriate per nature of the transaction requirements. The description of the service interface for each service involved in the interaction must conform to the policy assertion requirements identified in Section 5 of [WS- Atomic Transaction] and Section 4 of [WS-Business Activity], as appropriate per nature of the transaction requirements. Page 12 of 25

339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 Conformance with this service interaction profile requires that the execution context supporting the interaction include components that implement the Activation and Registration services defined in [WS-Coordination]. 3.10.3. Implementation Notes and Implications (Non-Normative) None. 3.11. Service Metadata Availability 3.11.1. Statement of Requirement From JRA The JRA requires that each service interaction profile define how the service captures and makes available (via query) metadata about the service. Metadata is information that describes or categorizes the service and often assists consumers in interacting with the service in some way. 3.11.2. Conformance Targets (Normative) Conformance to this Web Services Service Interaction Profile requires that service interfaces responding to requests for metadata about the interface and underlying service must respond to a service consumer s Get Metadata Request message or Get Request message with a Get Metadata Response message or Get Response message, respectively, where these messages conform to the requirements of the WS-Metadata Exchange specification ([WS-Metadata Exchange]). 3.11.3. Implementation Notes and Implications (Non-Normative) None. 3.12. Interface Description Requirements 3.12.1. Statement of Requirement From JRA This section demonstrates how this profile meets the Service Interaction Requirements identified in the [JRA]. 3.12.2. Conformance Targets (Normative) Section 2.2 above indicates that a service interface conforms to this service interaction profile if its description meets all requirements of the description conformance target in [WS-I BP]. [WS-I BP] requires an interface s description to consist of a Web Services Description Language (WSDL) document that conforms to [WSDL 1.1]. The WSDL document must include the following child elements of the wsdl:definitions element: Page 13 of 25

371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 At least one wsdl:message element for each message involved in the interaction with the service. Within the wsdl:porttype and wsdl:binding elements, a wsdl:operation element corresponding to each action in the service s behavior model (as defined in the [JRA]). The WSDL document should define types only through importing namespaces defined in external XML Schema. Specifically: The WSDL document s wsdl:types element should contain only a single child xsd:schema element. The single xsd:schema element should contain only xsd:import elements, each importing a namespace defined in an external schema. Each xsd:import element should contain exactly two attributes, namespace and schemalocation, the value of which are non-null and non-empty. 3.12.3. Implementation Notes and Implications (Non-Normative) These guidelines regarding definition of types outside a WSDL document are intended to improve reusability of message definitions across service interaction profiles and to separate the concerns of interface definition from message definition. Note that many of the standards referenced by this profile require use of particular SOAP headers. The WSDL document that describes a service interface must describe these headers in conformance with the guidance of these standards. 391 Page 14 of 25

392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 4. Message Exchange Patterns 4.1. Fire-and-Forget Pattern This section discusses how the message exchange patterns (MEP) identified in the [JRA] are supported by this profile. The fire-and-forget message exchange pattern corresponds to a one-way operation as defined in [WSDL 1.1]. This service interaction profile supports this pattern by requiring that service consumers and service interfaces conform to [WS-I BP]. In particular, Section 4.7.9, One-Way Operations, of [WS-I BP] requires that a service interface respond to a one-way operation by returning an HTTP response with an empty entity-body. Many composite asynchronous message exchange patterns can be derived from this primitive pattern. 4.2. Request-Response Pattern The request-response message exchange pattern corresponds to a request-response operation as defined in [WSDL 1.1]. This service interaction profile supports this pattern by requiring that service consumers and service interfaces conform to [WS-I BP]. This MEP is synchronous and can be combined with fire-and-forget MEPs to form more sophisticated composite MEPs. An asynchronous request-response pattern is supported through a composite MEP. It is implemented using two one-way fire-and-forget MEPs. 4.3. Publish-Subscribe Pattern The publish-subscribe message exchange pattern is an asynchronous MEP. Normally, the publisher and the subscriber are decoupled by an intermediary. The publish-subscribe MEP could be constructed as a composite MEP by using primitive MEPs as defined in this document: 1. A subscriber sends a subscription message to the intermediary using the fireand-forget primitive MEP. 2. A publisher sends an event message to the intermediary using the fire-andforget primitive MEP. 3. There are two ways to deliver the event to the subscriber: a. The intermediary sends the event notification to the subscriber using the fire-and-forget primitive MEP, or b. The subscriber pulls event notification messages periodically from the intermediary using the request-response primitive MEP. Page 15 of 25

426 427 428 429 The publish-subscribe MEP is increasingly being used in a Web services context. An emerging family of standards, [WS-Notification], defines a standard-based Web services approach to notification using a publish-subscribe message exchange pattern. 430 Page 16 of 25

431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 5. Message Definition Mechanisms This section demonstrates how this profile supports the MESSAGE DEFINITION MECHANISMS identified in the [JRA]. This service interaction profile requires that each message consist of one, but not both, of the following: A single SOAP message (defined as the message conformance target in [WS-I BP]) that meets all requirements of this profile. A SOAP message package (as defined in SOAP messages with attachments [SwA] and as constrained by [WS-I AP] and [WSS SwA]). Note that [WS-I BP] and [WS-I AP] require that the single SOAP message (in the first case above) or the root part of the SOAP message package (in the second case) be well-formed XML. This XML must be valid against an XML Schema (as defined in [XML Schema]) that defines the message structure. The names of all elements in this XML Schema must conform to the guidelines documented in Service Description Guidelines ([SDG]). 446 Page 17 of 25

447 448 449 450 451 452 453 454 455 456 457 458 459 460 6. Glossary DOMAIN VOCABULARIES Includes canonical data models, data dictionaries, and markup languages that standardize the meaning and structure of information for a domain. Domain vocabularies can improve the interoperability between consumer and provider systems by providing a neutral, common basis for structuring and assigning semantic meaning to information exchanged as part of service interaction. Domain vocabularies can usually be extended to address information needs specific to the service interaction or to the business partners integrating their systems. 461 462 463 464 EXECUTION CONTEXT The set of technical and business elements that form a path between those with needs and those with capabilities and that permit service providers and consumers to interact. 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 MESSAGE The entire package of information sent between service consumer and service (or vice versa), including any logical partitioning of the message into segments or sections. MESSAGE DEFINITION MECHANISM Establishes a standard way of defining the structure and contents of a message; for example, GJXDM- or NIEM-conformant schema sets. Note that since a message includes the concept of an attachment, the message definition mechanism must identify how different sections of a message (for example, the main section and any attachment sections) are separated and identified and how attachment sections are structured and formatted. 480 481 482 483 484 SERVICE The means by which the needs of a consumer are brought together with the capabilities of a provider. A service is the way in which one partner gains access to a capability offered by another partner. Page 18 of 25

485 486 487 SERVICE CONSUMER An entity that seeks to satisfy a particular need through the use capabilities offered by means of a service. 488 489 490 491 492 493 SERVICE INTERACTION PROFILE A family of standards or other technologies or techniques that together demonstrate implementation or satisfaction of all the requirements of interaction with a service. See Service Interaction Profile section of [JRA] for details. 494 495 496 497 498 499 500 501 502 503 504 505 SERVICE INTERFACE SERVICE PROVIDER The means by which the underlying capabilities of a service are accessed. A service interface is the means for interacting with a service. It includes the specific protocols, commands, and information exchange by which actions are initiated on the service. A service interface is what a system designer or implementer (programmer) uses to design or build executable software that interacts with the service. An entity (person or organization) that offers the use of capabilities by means of a service. 506 Page 19 of 25

507 508 509 510 511 512 513 514 515 7. References These references use the following acronyms to represent standards organizations. FIPS: Federal Information Processing Standards IETF: Internet Engineering Task Force NIST: National Institute of Standards and Technology OASIS: Organization for the Advancement of Structured Information Standards W3C: World Wide Web Consortium WS-I: Web Services Interoperability Organization 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 ebxml FIPS 140-2 GFIPM GJXDM JRA MTOM ebxml Technical Committee FAQs (note: for overview of ebxml technologies), http://www.oasis-open.org/committees/download. php/21792/ebxmlbp-v2.0.4-faq-os-en.htm NIST May 2001, Security Requirements for Cryptographic Modules, http://csrc.nist.gov/publications/fips/ Global Security Working Group (GSWG) Global Federated Identity and Privilege Management (GFIPM) Metadata Package, Version 0.3, Working Draft, September 23, 2006, http://it.ojp.gov/gfipm Global Justice XML Data Model, http://it.ojp.gov/jxdm/ Global Infrastructure/Standards Working Group (GISWG) Justice Reference Architecture (JRA) Specification, Working Draft, Version 1.4, February 14, 2007, http://it.ojp.gov/globaljra SOAP Message Transmission Optimization Mechanism (MTOM), W3C Recommendation, January 25, 2005, http://www.w3.org/tr/2005/rec-soap12-mtom- 20050125/ Page 20 of 25

540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 NIEM SAML SDG SwA WS Notification WS-Addressing Core National Information Exchange Model, http://www.niem.gov/library.php OASIS Security Assertion Markup Language, Version 2.0 specification set, March 15, 2005, http://www.oasis-open.org/committees/tc_home. php?wg_abbrev=security#samlv2.0 GISWG JRA Service Description Guidelines, http://it.ojp.gov/globaljra W3C SOAP Messages With Attachments, W3C Note, November 12, 2000, http://www.w3.org/tr/soap-attachments OASIS Web Services Notification, http://www.oasis-open.org/committees/tc_home. php?wg_abbrev=wsn W3C Web Services Addressing 1.0 Core, W3C Recommendation, May 9, 2006, http://www.w3.org/tr/2006/rec-ws-addr-core- 20060509/ 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 WS-Addressing SOAP Binding W3C Web Services Addressing 1.0 SOAP Binding, W3C Recommendation, May 9, 2006, http://www.w3.org/tr/2006/rec-ws-addr-soap- 20060509/ WS-Addressing WSDL Binding W3C Web Services Addressing 1.0 WSDL Binding, W3C Candidate Recommendation, May 29, 2006, http://www.w3.org/tr/2006/crws-addr-wsdl-20060529/ WS-Atomic Transaction OASIS Web Services Atomic Transaction 1.1, Committee Draft, March 15, 2006, http://docs.oasis-open.org/ws-tx/wstx-wsat-1.1- spec-cd-01.pdf WS-Business Activity OASIS Web Services Business Activity 1.1, Committee Draft, March 15, 2006, http://docs.oasis-open.org/ws-tx/wstx-wsba-1.1- spec-cd-01.pdf 574 Page 21 of 25

575 576 577 578 WS-Coordination OASIS Web Services Coordination 1.1, Committee Draft, March 15, 2006, http://docs.oasis-open.org/ws-tx/wstx-wscoor-1.1- spec-cd-01.pdf 579 580 581 582 583 584 WSDL 1.1 WS-I AP W3C Web Services Description Language, Version 1.1, W3C Note, March 15, 2001, http://www.w3.org/tr/wsdl WS-I Attachments Profile, Version 1.0, Second Edition, April 20, 2006, http://www.wsi.org/profiles/attachmentsprofile-1.0.html 585 586 WS-I BP WS-I Basic Profile, Version 1.1, April 10, 2006, http://www.ws-i.org/profiles/basicprofile-1.1.html 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 WS-I BSP WS-I RSP WS-Metadata Exchange WS-RM WSS SwA WS-I Basic Security Profile, Working Group Draft, March 30, 2007, http://www.wsi.org/profiles/basicsecurityprofile-1.0.html WS-I Reliable Secure Profile Usage Scenarios Document, Working Group Draft, Version 1.0, November 6, 2006, http://www.wsi.org/profiles/rsp-scenarios-1.0.pdf Industry vendor group specification Web Services Metadata Exchange, September 2004, http://specs.xmlsoap.org/ws/2004/09/mex/ws- MetadataExchange OASIS Web Services Reliable Messaging, Committee Draft, March 14, 2006, http://docs.oasis-open.org/wsrx/wsrm/200602/wsrm-1.1-spec-cd-03.pdf OASIS WS-Security SOAP Messages With Attachments Profile 1.1, February 1, 2006, http://www.oasis-open.org/ committees/download.php/16672/wss-v1.1-specos-swaprofile.pdf 607 Page 22 of 25

608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 WS-Security XML Encryption XML Schema XML Signature XOP OASIS Web Services Security: SOAP Message Security 1.1 (WS-Security 2004), OASIS Standard, February 1, 2006, http://www.oasisopen.org/committees/download.php/16790/wssv1.1-spec-os-soapmessagesecurity.pdf W3C XML Encryption Syntax and Processing, W3C Recommendation, December 10, 2002, http://www.w3.org/tr/xmlenc-core/ W3C XML Schema, W3C Recommendation, August 12, 2004, http://www.w3. org/xml/schema W3C XML-Signature Syntax and Processing, W3C Recommendation, February 12, 2002, http://www.w3.org/tr/xmldsig-core/ W3C XML-Binary Optimized Packaging, W3C Recommendation, January 25, 2005, http://www.w3.org/tr/xop10/ 627 Page 23 of 25

628 8. Document History Date Version Editor Change August 4, 2006 0.5 Scott Came The initial document is based on the Web Services Service Interaction Profile (WS SIP) from the state of Washington August 25, 2006 0.6 Zemin Luo Updated based on GISWG Service Interaction Committee (SIC) team discussion February 14, 2007 0.9 Scott Came Revision February 22, 2007 0.9.3 Service Interaction Committee Review & revise March 6, 2007 0.9.3 Security Working Group Review & revise March 16, 2007 1.0 Candidate Monique LaBare SIC Final review March 23, 2007 1.0 Candidate Monique La Bare Formatting, Glossary, References, send to Scott Came for SWG edits. August 1, 2007 1.0 Monique La Bare Reference to WS-I BP, Version 1.1, and other minor edits based on SIC discussion. August 31, 2007 1.1 Monique La Bare Final format 629 630 Page 24 of 25

631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 Appendix A: Documenter Team This document was developed by the U.S. Department of Justice s Global Justice Information Sharing Initiative (Global) Infrastructure/Standards Working Group (GISWG) Service Interaction Committee. The following individuals were members of the Development Team for this document and participated in review of this document. Mr. Jim Cabral, IJIS Institute Mr. Scott Came, SEARCH, The National Consortium for Justice Information and Statistics Mr. Scott Fairholm, National Center for State Courts Mr. Kael Goodman, IJIS Institute, Service Interaction Committee Chair Mr. Alan Harbitter, IJIS Institute Mr. Zemin Luo, IJIS Institute Mr. Tom Merkle, National Institute of Justice Mr. John Ruegg, Los Angeles County Information Systems Advisory Body 646 Page 25 of 25