Web Services Security with SOAP Security Proxies



Similar documents
A Gateway to Web Services Security Securing SOAP with Proxies

Securing Web Services From Encryption to a Web Service Security Infrastructure

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Java Security Web Services Security (Overview) Lecture 9

An Oracle White Paper Dec Oracle Access Management Security Token Service

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

This Working Paper provides an introduction to the web services security standards.

<Insert Picture Here> Oracle Web Services Manager (WSM)

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008

Presented By: Muhammad Afzal 08May, 2009

XML Signatures in an Enterprise Service Bus Environment

Strategic Information Security. Attacking and Defending Web Services

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

NIST s Guide to Secure Web Services

Reducing SOA Identity Fatigue through Automated Identity Testing

WEB SERVICES SECURITY

A Signing Proxy for Web Services Security. Dr. Ingo Melzer RIC/ED

Securely Managing and Exposing Web Services & Applications

Digital Signature Web Service Interface

Creating a Strong Security Infrastructure for Exposing JBoss Services

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

Web Services. Web Service Security. Copyright 2010 Davide Cerri & Srdjan Komazec

Web Service Security Vulnerabilities and Threats in the Context of WS-Security

Network Security. Chapter 10. Application Layer Security: Web Services. Part I: Introduction to Web Services

An Open Policy Framework for Cross-vendor Integrated Governance

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

CA SOA Security Manager

Federated Identity Management Solutions

SCUR203 Why Do We Need Security Standards?

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

How To Protect A Web Application From Attack From A Trusted Environment

A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF

Agenda. How to configure

Introduction to SAML

Interoperable, Federated Identity Management Frameworks Across Enterprise Architectures. We can do this.

Service Virtualization: Managing Change in a Service-Oriented Architecture

Controlling Web Access with BMC Web Access Manager WHITE PAPER

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics

Implementation Guide SAP NetWeaver Identity Management Identity Provider

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

Apigee Gateway Specifications

1 What Are Web Services?

How to Implement Enterprise SAML SSO

The Role of Identity Enabled Web Services in Cloud Computing

OPENIAM ACCESS MANAGER. Web Access Management made Easy

CS 356 Lecture 28 Internet Authentication. Spring 2013

Achieving PCI Compliance Using F5 Products

SAML and OAUTH comparison

Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS)

Biometric Single Sign-on using SAML

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Enterprise Access Control Patterns For REST and Web APIs

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6

Security a Major Imperative for an Service-Oriented Architecture

AquaLogic Service Bus

Web Services Trust and XML Security Standards

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Authentication and Authorization Systems in Cloud Environments

Software Requirement Specification Web Services Security

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

1 What Are Web Services?

Using SAML for Single Sign-On in the SOA Software Platform

WebLogic Server 7.0 Single Sign-On: An Overview

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

Managing SOA Security and Operations with SecureSpan

OpenHRE Security Architecture. (DRAFT v0.5)

PHIN MS Detailed Security Design

T-Check in Technologies for Interoperability: Web Services and Security Single Sign-On

IONA Security Platform

White Paper Secure Reverse Proxy Server and Web Application Firewall

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun

Cisco AON Secure File Transfer Extension Module

Biometric Single Sign-on using SAML Architecture & Design Strategies

Identity Management im Liberty Alliance Project

must secure their online, automated business processes with partners

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

IBM. How can we support the requirement of creating dynamic, flexible and cost effective solution in the IAM area?

Extranet Access Management Web Access Control for New Business Services

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

OIO SAML Profile for Identity Tokens

Microsoft Dynamics CRM Server 2011 software requirements

Onegini Token server / Web API Platform

APIs The Next Hacker Target Or a Business and Security Opportunity?

Network Security Topologies. Chapter 11

Application of the PAPI authn and authz system to the TJ-II Remote Participation environment. Madrid, 21 March 2003

Federated Identity and Trust Management

Security in B2B. Sami Tähtinen FRENDS Technology, Inc. S Security of Communication Protocols January 28 th, 2003

Brainloop Cloud Security

Secure Semantic Web Service Using SAML

The increasing popularity of mobile devices is rapidly changing how and where we

Web Application Proxy

Data Security and Governance with Enterprise Enabler

Web Services Security Standards Forum. Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.

Secure Inside the Corporate Network: INDEX 1 INTRODUCTION 2. Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR DESKTOP ENCRYPTION 3

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Flexible Identity Federation

Transcription:

Web Services Security with Security Proxies Gerald Brose, PhD Technical Product Manager Xtradyne Technologies AG OMG Web Services Workshop USA 22 April 2003, Philadelphia

Web Services Security Risks! Exposure of critical resources is a risk! integration = new access paths and data flows! itself has no security mechanisms to mitigate risks! existing security technology does not apply well! HTTP is not filtered by standard firewalls! SSL does not provide end-to-end security /HTTP /HTTP Web Service Legacy App DB -2 -

Roadmap! Web Services Security! Threats, Security services, Challenges! Protocol layers! Web Services Security Standards! WS-Security! XML DSig, XML Encryption! SAML! Web Services Security Proxies! Functionality, Deployment Scenarios -3 -

Security Threats! Attacks on messages! read and record! espionage, privacy breaches! replay! sabotage, fraud! modify in transit! sabotage, fraud! redirect or drop! sabotage, fraud! Attacks on services! unauthorized access! read, write, use! espionage, sabotage, fraud, theft! denial of service -4 -

Security Services that help! Authentication! "where does this (part of a) message come from?"! Authorization (access control)! "may this message pass?"! Confidentiality! "who can read this (part of a) message?"! Integrity! "has this (part of a) message been tampered with?"! Audit! "what happened?"! Administration! "how do I manage this?"... but has none of this! -5 -

Web Services Security Challenges! Loose coupling! Web Services are message-based! transport security sessions don't fit! HTTP transport! messages pass firewalls uninspected! existing perimeter protections don't apply! Service composition! a single message can traverse many intermediaries! who do you trust with what?! Document-based workflows! different parts of a message! are processed by different processors! may need different acces modes for different parties -6 -

Security and Protocol Layers end-to-end WS-Security XML DSig XML Encryption... SAML X.509 Kerberos Sender HTTPS HTTPS Receiver point-to-point Intermediary point-to-point -7 -

WS-Security! OASIS-Standard! Working Draft since 11/2002! Message-level Security Model for! can embed a wide variety of existing technologies! end-to-end security with multiple trust domains! Extensible security message header <wsse:security>! for security information in and about messages! Security Token format! express claim(s) made by entities! text/binary, signed/unsigned, e.g. username or certificate! Integrity, Authentication, Confidentiality! processing rules for XML Digital Signature and XML Encryption! Common basis for future specifications! WS-Policy, WS-Trust, WS-Privacy,... -8 -

XML Digital Signature! W3C-Standard! "Recommendation" since 2/2002! XML-Syntax for digital signatures! not just for XML content!! enveloped, enveloping, detached Data Sig Sig Data Sig Data! Usage in WS-Security! detached! Integrity protection for individual parts of a message (header and body)! Authentication of security tokens! Binding security tokens to messages -9 -

General Form of a Digital Signature <Signature ID?> <SignedInfo> <CanonicalizationMethod/> <SignatureMethod/> (<Reference URI? > (<Transforms>)? <DigestMethod> <DigestValue> </Reference>)+ </SignedInfo> <SignatureValue> (<KeyInfo>)? (<Object ID?>)* </Signature> information about the signed object references the signed object the actual signature - 10 -

XML Encryption! W3C-Standard! "Recommendation" since 12/2002! XML syntax to represent encrypted data! not just encryption of XML content!! no new algorithms! Usage in WS-Security:! protect confidentiality of individual parts of a message! header (e.g., session keys)! body! attachments - 11 -

Security Assertion Markup Language (SAML)! OASIS-Standard (1.0, since 5/2002)! XML-based framework for the exchange of security information! assertions = statements by an issuer about a subject! authentication assertion - subject is authenticated! authorization decision assertion - subject is authorized! attribute assertion - subject has given attributes! SAML Protocol! between Policy Enforcement Points (PEP) and Policy Decision Points (PDP)! defines request and response messages! Usage of SAML assertions in WS-S! format for Security Tokens! Binding to WS-Security in progress ("SAML Token binding") - 12 -

Standards in Concert WS-S XML DSig SAML :Env :Header <wsse:security> Signature Assertion </wsse:security> <:Body wsu:id="x"> </:Body > - 13 -

How to deploy WS-Security?! Secure endpoints: AppServer + client software! Drawbacks! integration may involve modifying software! management of multiple hosts and pieces of software! possible vendor-dependencies! Secure gateways: Web Services Security Proxies! Advantages:! transparent integration into existing systems! separates application and security functionality! simpler, centralized administration! only the proxies need to be configured and managed! platform and vendor independency, interoperability! offloads processing (cryptography, etc.) - 14 -

Web Services Security Proxies! Transparent Proxy for Web Services! messages are sent to the proxy, inspected there, and forwarded! Application-level Gateway! security in the application layer! proxy understands /HTTP and WS-Security! content inspection! Deployed at both sender and receiver! outgoing messages are extended with WS-Security information! supports B2B through federated trust! - 15 -

Web Services Security Proxies (opt.) WS-Security (opt.) HTTP HTTP(S) HTTP... Trust Boundary WS-Security Proxy Intermediaries WS-Security Proxy Trust Boundary - 16 -

Security Services in the Proxy sender side! Authentication! Insertion of WS-S headers! Authorization (outgoing)! Integrity! Verification and Signing! Content Filtering! XML Schema checking! Confidentiality! Audit receiver side! Authentication (SAML or basic mechanism)! Authorization! Integrity! Verification and Signing! Content Filtering! XML Schema checking! Confidentiality! Audit WS-Security SAML - 17 -

Deployment Scenarios Intranet Web Services used internally for! cross department service use! application integration WS-Security Proxy! controls access to Web-Service resources from different departments! Secure inter-application communication Internet Deployment of new Web Services! Application services for broad range of users! UDDI registered services WS-Security Proxy! allows broad service access! provides authentication and authorization services Federated Extranet Web Services used to integrate applications and services with! trading partner! branch offices WS-Security Proxy! Federated Trust eliminates duplication of policy and user information - 18 -

Internet Scenario Original Message Protected/Verified Message Client application Enabling Platform Security Proxy WS-Security SAML WS-Security SAML Internet Web Service Legacy application DMZ - 19 -

Federated Extranet Scenario Original Message Protected Message Protected/Verified Message Client application Enabling Platform Security Proxy WS-Security SAML Security Proxy WS-Security SAML WS-Security SAML Internet Web Service Legacy application DMZ DMZ - 20 -

WS-Domain Boundary Controller Architecture of Xtradyne's WS-Security product (WS-DBC): WS-DBC Web Service IIOP/SSL Admin Console IIOP/SSL Policy Server (LDAP) Policy DB - 21 -

Summary! Web Services need! suitable message-based security models! standards for interoperability! Emerging security standards have strong industry support! consortiae, vendors, products! WS-Security Proxies as security solution! platform-neutral standards support! comprehensive security functionality for Web Services at the application layer! transparent integration without software modifications ( pluggable )! ideal support for B2B scenarios - 22 -