Securing Web Services From Encryption to a Web Service Security Infrastructure



Similar documents
<Insert Picture Here> Oracle Web Services Manager (WSM)

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

An Oracle White Paper Dec Oracle Access Management Security Token Service

CISCO ACE XML GATEWAY TO FORUM SENTRY MIGRATION GUIDE

Software Requirement Specification Web Services Security

Java Security Web Services Security (Overview) Lecture 9

AquaLogic Service Bus

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Apigee Gateway Specifications

ADFS Integration Guidelines

Chapter 1: Web Services Testing and soapui

Agenda. How to configure

Oracle Service Bus. Situation. Oracle Service Bus Primer. Product History and Evolution. Positioning. Usage Scenario

CA SOA Security Manager

This Working Paper provides an introduction to the web services security standards.

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Securely Managing and Exposing Web Services & Applications

Flexible Identity Federation

NIST s Guide to Secure Web Services

vcloud Director User's Guide

Oracle SOA Suite Then and Now:

CS 356 Lecture 28 Internet Authentication. Spring 2013

1 What Are Web Services?

IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>

1 What Are Web Services?

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

REST and SOAP Services with Apache CXF

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

WEB SERVICES SECURITY

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008

Exam Name: IBM WebSphere Process Server V6.2,

Architectural Overview

Szolgáltatásorientált rendszerintegráció. WS-* standards

Server based signature service. Overview

Creating a Secure Web Service In Informatica Data Services

ReadyNAS Remote White Paper. NETGEAR May 2010

IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>

The Role of Identity Enabled Web Services in Cloud Computing

Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Creating a Strong Security Infrastructure for Exposing JBoss Services

Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006

Easy CramBible Lab DEMO ONLY VERSION Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

Get Success in Passing Your Certification Exam at first attempt!

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, Integration Guide IBM

Oracle Service Bus: - When to use, where to use and when not to use

Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration

Monitoring HP OO 10. Overview. Available Tools. HP OO Community Guides

Virtual Data Centre. User Guide

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

TIBCO ActiveMatrix BPM Single Sign-On

A Client Story: PCI Compliance with WebSphere MQ Advanced Message Security

Hybrid for SharePoint Server Search Reference Architecture

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Fusion Middleware Identity Management 11gR1

Basic & Advanced Administration for Citrix NetScaler 9.2

VMware Identity Manager Integration with Active Directory Federation Services 2.0

SSL CONFIGURATION GUIDE

SAML-Based SSO Solution

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

Single Sign-on (SSO) technologies for the Domino Web Server

CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS

SAML-Based SSO Solution

Forward proxy server vs reverse proxy server

CA Performance Center

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2

Sentinet for BizTalk Server SENTINET

Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite

WebSphere Business Monitor V7.0: Clustering Single cluster deployment environment pattern

How to Make the Client IP Address Available to the Back-end Server

Federated Identity Management Solutions

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008

Web Service Security Vulnerabilities and Threats in the Context of WS-Security

Novell Access Manager SSL Virtual Private Network

Cleaning Encrypted Traffic

Application. 1.1 About This Tutorial Tutorial Requirements Provided Files

Implementation Guide SAP NetWeaver Identity Management Identity Provider

TIBCO Spotfire Platform IT Brief

PHINMS Alarms. Version: Prepared by: U.S. Department of Health & Human Services

ITG Software Engineering

Using EMC Documentum with Adobe LiveCycle ES

An Oracle White Paper October Frequently Asked Questions for Oracle Forms 11g

Microsoft Dynamics CRM Server 2011 software requirements

HP Software-as-a-Service

Methods and tools for data and software integration Enterprise Service Bus

Policy Guide Access Manager 3.1 SP5 January 2013

Single Sign-On Implementation Guide

How to Make Your Oracle APEX Application Secure

Transcription:

Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager WM-data Denmark a LogicaCMG Company XML Signature wsmadmin XML Encryption peloz@wmdata.com LogicaCMG 2007. All rights reserved 1

Presentation Describe 3 ways to secure Web Services without programming Security measures Transport Layer Security (TLS/SSL/VPN) Message Level Security (WS-Security) Oracle Web Service Manager (OWSM) Discus when to use which Focus on OWSM 2

Agenda Intro Transport Layer Security Message Level Security When to use which? Web Service Security Standards Oracle Web Service Manager OWSM SOA and Identity Management OWSM Control OWSM Gateways OWSM Agents OWSM Policy Manager OWSM Monitoring Conclusion on OWSM Conclusion 3

Intro In the past security has often been coded directly into the Web Services No standards Difficult to maintain, administer and monitor I have focused on 3 methods that requires no programming Transport security e.g. TLS/SSL/VPN (The most widely used) WS-Security (Open Standard) OWSM (Build on WS-Security and related standards) 4

Security are Many Things Authentication: Who are you? Authorization: OK we know you, what are you allowed to do? Integrity: Has anybody tampered with my message? Confidentiality: How to keep the message secret? Non-Repudiation: I know you received the message and I can prove it! All are important 5

Simple Use Case Web Service consumer Internet Message Web Service provider 6

Message = SOAP Envelope Request Response <env:envelope> <env:header> </env:header> <env:body> <ns0:getsalaryelement> <ns0:pempid>100</ns0:pempid> </ns0:getsalaryelement> </env:body> </env:envelope> <env:envelope> <env:header> </env:header> <env:body> <ns0:getsalaryresponseelement> <ns0:result>24000</ns0:result> </ns0:getsalaryresponseelement> </env:body> </env:envelope> 7

Transport Layer Security (TLS/SSL/VPN) Web Service consumer Internet Web Service Provider 2 Message SSL Web Service provider + - Known Mature Simple Cheap Point-to-point Last mile security Encryption overhead Secure logging Authentication Basic auth. in HTTP header Two-way SSL 8

Message Level Security (WS-Security) SOAP based Security Build on existing standards Directly supported in JDeveloper and Oracle Application Server Encrypt the message or part of it Sign the message or part of it Pass security tokens, signatures and trust assertions in the message All the security setup information goes in the SOAP header + - End-to-end Secure logging Flexible Standard based Complex New but maturing Message overhead X.509 Certificates XML Encryption SAML XML Signature Kerberos WS-Security a.k.a. XML-Dsig, XML-Sig 9

WS-Security SOAP Envelope Example Request and Response using encryption and signing (3DES, Sha1WithRSA) Key size 128 bytes request-x509.xml response-x509.xml No Security WS- Security Request 754 bytes 8074 bytes Response 770 bytes 6605 bytes 10

When to use which? TLS/SSL/VPN Point-to-point Few Service Providers Limited knowledge about identity management and encryption No SOA strategy No demand for Secure Logging WS-Security SOA strategy Flows/Orchestrations Context-based Routing LDAP integration Need for Authorization Integrity (after transport) Secure logging Non-repudiation Higher level of security such as biometrics etc. 11

Web Service Security Standards WS- Federation WS- Authorization WS- Secure- Conversation WS- Policy Attachment OWSM 10g Support OWSM 11g Support WS-Policy WS- Reliability WS- Addressing WS-Trust WS-Security SOAP 12

Oracle Web Service Manager (OWSM) Standalone platform for securing and managing access to Web Services Used by a developer, deployer or security administrator Declarative: Does not require modification of existing applications Policies updated in real time Monitors access-control events Defines and monitors against SLAs Leverages existing identity and access management standards and architecture Oracle acquired Oblix in 2005 Original Oblix COREsv 13

OWSM SOA and Identity Management 14

Simple Use Cases Client OWSM OAS Gateway Web Service Client Agent + Web Service Policy Manager and Monitor DB 15

OWSM Component Overview OWSM Control Enterprise Manager Policy Manager (Rules for PEPs) Monitor Policy Enforcement Point (PEP) Gateways (Proxy in the OAS) Agents (Client or Server side) Database Policies, SLA Monitor data Users and roles Miscellaneous Java KeyStore, Oracle Wallet LDAP, OID Oracle Identity Manager 16

OWSM Security Principles Policy Manager Monitor Gateway Agents 17

OWSM Control (Console) Enterprise Manager plug-in Used for Configuring Gateways and some Agents Monitoring Gateways and some Agents Defining Alerts and SLA thresholds Defining Custom Reports/Views 18

OWSM Gateways Proxy that runs in the OAS Accepts or rejects incoming requests like a firewall Transport protocol translation Incoming: HTTP(S), JMS, MQ Outgoing: HTTP(S), JMS, MQ, or a custom protocol Supports both SOAP and standard XML messages Content Routing Logging point No end-point security See Oracle Web Services Manager Extensibility Guide A client must use a different URL to access a Gateway than the one for the Web Service 19

OWSM Agents Deployed with the Web Service or Client (Consumer) Accepts or rejects incoming requests like a firewall Can enrich the message with security Logging point End-point security On-line or off-line with OWSM Policy Manager Use cases Missing support for security protocols Last mile security Java Container support: OC4J, AXIS, WEBLOGIC, WEBSPHERE, TIBCO-BW An OWSM must be installed on the machine where you are installing the client agent 20

Installing Agents Agents are installed via the WSMadmin command line tool Situated in ORACLE_HOME\owsm\bin Example wsmadmin installagent The agent.properties file contains the setup information 21

Some Uses Cases Client OWSM OAS Web Service Client Gateway Agent + Web Service Client + Agent Policy Manager and Monitor DB Web Service Client + Agent Agent + Web Service 22

OWSM Policy Manager Policy - Set of operational tasks that are performed at a PEP Policy Step One operational task. Ex. Decrypt A Policy is separated into Request Pipeline A set of policy steps that are executed during the processing of a Web Service request Response Pipeline A set of policy steps that are executed during the processing of a response to a Web service request Pipeline Template Reusable Policy Pipeline Policies are versioned The most current version is the policy that is enforced You can revert to old versions Remember to purge obsolete policies once in a while 23

OWSM Policy Manager Build-in Policy Steps examples Active Directory Authenticate Active Directory Authorize Decrypt and Verify Signature LDAP Authenticate LDAP Authorize Log SAML - Verify WSS 1.0 Token Sign Message Sign Message and Encrypt Verify Certificate Verify Signature XML Decrypt XML Encrypt XML Transform 24

Policy Example 25

OWSM Monitor Collects metrics from Gateways and Agents Views/Reports Snapshot for a component and service SLA compliance report Execution Details view Message Logs Flows: Grouping of invocations within some context Security Statistics (Access control) Service Statistics (Latency Variance and Traffic Analysis) My Views: Custom views Alarms: Create rules for e-mail alerts By default, the monitor data is only persisted for the last 100 minutes. Max. is 60 days. 26

Monitoring Examples Snapshot 27

Monitoring Examples SLA Compliance 28

Flows Flow Collection of Web service, grouped together within some context Ex. services required to fulfill a client request in processing an order. Unique flow id inserted into the SOA header by the Web Service consumer Tags defined by WS-Addressing OWMS extracts and stores flow IDs to correlate the messages containing the same IDs <soap:header> <wsa:relatesto RelationshipType="cswm:ParentContext"> uuid:8eb9-c6a3-75aa-7eba </wsa:relatesto> <soap:header> 29

What You Get From OWSM Security that is based on Open Standards Declarative security that makes it easy to make changes to your security settings Single point for monitoring Web Service security Lots of ways to report the system status Mail alerts if there are problems SLA documentation 30

What You Don t Get From OWSM Help with key and certificate management Not possible to use a public key included in a request to encrypt the response You can not backup policies or export/import them Unified Enterprise Manager interface 31

Conclusion on OWSM? Easy to use Use it for SOA strategy Flows/Orchestrations Identity Management integration Higher level of security I think Gateways are more useful than Agents No installation is required An Agent requires its own OWSM installation 32

Conclusion Transport layer security (TLS/SSL/VPN), WS-Security and OWSM are all viable tools for securing Web Services in an Oracle environment Choose the right tool from your situation Knowledge Point-to-point or end-to-end Number of service providers SOA strategy Flows/Orchestrations Identity Management integration The future Belongs to the WS-* standards If you have external partners you might be forced to use WS-Security etc. 33

Securing Web Services From Encryption to a Web Service Security Infrastructure Questions? Contact Information Peter Lorenzen peloz@wmdata.com For More Information http://www.wiki.oracle.com/page/web+service+manager Securing Web Services with WS-Security by Jothy Rosenberg & David Remy LogicaCMG 2007. All rights reserved 34