SlideShare une entreprise Scribd logo
1  sur  20
Konzepte einer Sicherheitsarchitektur für eine SOA am Beispiel der eFA SOA Security - So What? BITKOM Workshop SOA&Security, Franfurt/Main 2008-03-12
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Setting the Scene The IT-Security Issue Before SOA ,[object Object],Application Application client ,[object Object],[object Object],[object Object],[object Object],Authorization ,[object Object],Authentication ,[object Object],Identifiers, credentials ,[object Object]
Setting the Scene How Does SOA Change the Picture? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Architectural Recipe  Externalize Security as a Cross-Cutting Concern Service Consumer IDs/creds  and PoP Ids, creds Authz Authn Consumer Service Naïve approach:  DIY ,[object Object],[object Object],[object Object],Ids, creds Authz Authn … … IDs/creds  and PoP Service Consumer Ids, creds Authz Authn Consumer Service Ids, creds Authz Authn … … IDs/creds  and PoP IDs/creds  and PoP Service Consumer Ids, creds Authz Authn Consumer Service Ids, creds Authz Authn … … Advanced approach:  re-use Authz Ids, creds Authn Service Consumer Service Consumer IDs/creds  and PoP
Architectural Recipe  Decouple Authorization from Initial Authentication  Service Authz subsystem Consumes Service Authn subject: id=John Doe cakePref=Streusel authnMethod=SSL Authz subsystem Initial authn endpoint Initial authn protocol: Cert=MI… PoP=SSLSign(SrvNonce) Consumes Authn subject: Produces id=John Doe cakePref=Streusel authnMethod=SSL Traditional approach:  piggybacked ,[object Object],[object Object],[object Object],User account: id=John Doe altSubjectId=MI… cakePref=Streusel … Initial authn endpoint Initial authn protocol User account: id=John Doe altSubjectId=MI… cakePref=Streusel … Initial authn endpoint Initial authn protocol: Cert=MI… PoP=SSLSign(SrvNonce) Produces User account: id=John Doe altSubjectId=MI… cakePref=Streusel … Federated approach:  split work Federated authn protocol: Assertion=<id=John Doe, prefCake=Streusel>  PoP=WSSESign(SrvNonce) Fed. authn endpoint Produces prefCake::= cakePref Attr mapping:
Solution Blueprint  Authentication Subsystem - What to Consider? Service Consumer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Claimant Verifier Issuer IDs/creds  and PoP
Solution Blueprint  Authentication Subsystem - How to Employ? ,[object Object],[object Object],[object Object],[object Object],Claimant Verifier Service Consumer Issuer Authz ,[object Object],[object Object],[object Object],SAML service SAML  assertion  and PoP SAML  assertion  Verifier X.509  certificate  and PoP X.509 service Issuer Verifier ID-card  and PoP X.509 certificate
Solution Blueprint  Authorization Subsystem - What to Consider? Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PEP PDP PMA Authz decision request Authz decision response Authz policy PEP Service PDP Authz decision (piggybacked with request) PMA Authz policy Authorization decision push: Authorization decision pull: PEP Service PDP PMA Authz decision request Authz decision response Authz policy (piggybacked with request) Authorization policy push: ,[object Object],[object Object],[object Object],[object Object]
Solution Blueprint  Authorization Subsystem – Which Expressiveness? HTTP header SOAP header SOAP body WS application WS-stack e.g. JAX-WS RI/ WSIT HTTP stack e.g. Tomcat servlet container ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Solution Blueprint  Authorization Subsystem - How to Employ? HTTP header SOAP header SOAP body WS application WS-stack e.g. JAX-WS RI/ WSIT HTTP-stack e.g. Tomcat servlet container PEP ,[object Object],[object Object],[object Object],[object Object],[object Object],PEP ,[object Object],[object Object],[object Object],[object Object],[object Object],PEP ,[object Object],[object Object],[object Object],[object Object]
WS-Stack Integration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spotting eFA on the Radar-Screen eFA IdentityProvider STS: WS-Trust STS with specific WSDL and SAML assertion profile eFA ECRAdmissionTokenService: eFA-specific business logic  eFA ECRAccessTokenService: nucleus for an authorization policy push support in WS environments eFA &quot;PEPs&quot;: somewhat eFA-specific since they need to understand eFA application service primitives (to some degree) and the eFA SAML assertion vocabulary  Potential of re-use Distinguishes between: - Health pro-determined operations: eFA IdentityProvider STS - Health pro and patient-determined operations: eFA ECRAdmissionTokenService  - Health pro, patient and ECR-determined operations: eFA ECRAccessTokenService Note: handling of multiple SAML assertions (in one ECR/MDO request context) is an implication of this separation  Separation of functional concerns eFA IdentityProvider STS: encapsulates the processing of X.509 certificates and access to persisted user data eFA ECRAdmissionTokenService: encapsulates the pseudonymization of a patient and health professional context eFA ECRAccessTokenService: encapsulates the look-up of authorization policies Work split between architectural artifacts Relies on SAML, SOAP Message Security, WS-SecurityPolicy, WS-Trust, XACML Does not yet use WSFED Adaptation to technology innovation Relies on an n-ary authentication architecture where: - eFA application services: consume SAML assertions plus PoP - eFA security services: issue SAML assertions and consume X.509 certificates plus PoP - Ext. security services: issue X.509 certificates and consume whatever is appropriate given their CPS Note that this simplifies things somewhat as eFA security is based on multiple SAML assertions (cf. below) and adds authentication architecture artifacts issuing SAML assertions while consuming (other) SAML assertions plus PoP Authentication architecture Relies on a DAC authorization model addressing patient consent (my body->my data->my control) Modeled according authorization policy push PEPs may reside in WS-stacks or the service applications (e.g. through AOP) Requires a fine-grained SOAP request parsing to lookup identifiers and match them Authorization architecture Allows to isolate endpoints for verifying initial authentication based on X.509 certificates Requires application services to &quot;only&quot; process SAML assertions issued by eFA Decoupling authorization from initial authentication Separates medical application architecture from security architecture Externalizing security as a cross-cutting concern eFA specification  Aspect
About the Siemens Realization for eFA Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Abbreviations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Author ,[object Object]
Backup
WS-Stack Integration J2SE  Subject  (supplying authn subject information from the stack). JAX-WS  SOAPMessageContext  properties (by agreement between SOAP handler and WS application) .NET  IPrincipal  (supplying authn subject information from the stack) .NET  Context  properties (by agreement between SOAP handler and WS application) J2SE  Principal ,  X509Certificate  and OpenSAML  SAMLAssertion  (supplying authn subject information from the stack). Axis2  MessageContext  properties (by agreement between SOAP handler and WS application) Propagating authenticated identity (WS stack->service, custom SOAP  handler->service)   Via SOAP handler-chain plugin Via WCF interceptor Via SOAP handler-chain plugin User account / attr mapping integration   Verification of WSSE-supported credentials; callback-based means to match against reference information (e.g. passwords) Verification of WSSE-supported credentials; custom validators allow to match against reference information (e.g. passwords) Verification of WSSE-supported credentials; callback-based means to match against reference information (e.g. passwords) Verifier   Processing of WSSE-supported credentials; callback-based means to lookup credentials (e.g. from keystores) Processing of WSSE-supported credentials; callback-based means to lookup credentials (e.g. from keystores) Processing of WSSE-supported credentials; callback-based means to lookup credentials (e.g. from keystores) Claimant   External, has base class for a WS-Trust STS External External, has base class for a WS-Trust STS Issuer         Authentication Not constrained Not constrained resp. native constraints (claim-centric) Not constrained Model   External External, has native PMA (can be interfaced via  IAuthorizationPolicy ) External PMA   External External, has native PDP ( ServiceAuthorizationManager ) and supports extensions of it External PDP   As SOAP handler-chain plugin (implementing interface JAX-WS  SOAPHandler ) As WCF interceptor (implementing interface  IDispatchMessageInspector ); also has native PEP As SOAP handler-chain plugin (extending Axis2 class  AbstractHandler ) PEP         Authorization Sun JAX-WS RI/WSIT Microsoft WCF Apache Axis2 Aspects
Technology Innovation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Representing authn users Protecting messages Negotiating security Acquiring sec. tokens Federated  authn (WS) Authz base  technology

Contenu connexe

Tendances

Federated Identity Architectures Integrating With The Cloud
Federated Identity Architectures   Integrating With The CloudFederated Identity Architectures   Integrating With The Cloud
Federated Identity Architectures Integrating With The Cloud
rsnarayanan
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing on
guest648519
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Kenneth Peeples
 

Tendances (18)

Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
 
Quantum Architecture Overview
Quantum Architecture OverviewQuantum Architecture Overview
Quantum Architecture Overview
 
Cloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperCloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & Gatekeeper
 
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning AttacksAlgorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
 
Federated Identity Architectures Integrating With The Cloud
Federated Identity Architectures   Integrating With The CloudFederated Identity Architectures   Integrating With The Cloud
Federated Identity Architectures Integrating With The Cloud
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on system
 
The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)The Three Musketeers (Authentication, Authorization, Accounting)
The Three Musketeers (Authentication, Authorization, Accounting)
 
AAA Protocol
AAA ProtocolAAA Protocol
AAA Protocol
 
Implementing Cisco AAA
Implementing Cisco AAAImplementing Cisco AAA
Implementing Cisco AAA
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing on
 
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
 
CISSPills #1.02
CISSPills #1.02CISSPills #1.02
CISSPills #1.02
 
Understanding Security for Oracle WebLogic Server
Understanding Security for Oracle WebLogic ServerUnderstanding Security for Oracle WebLogic Server
Understanding Security for Oracle WebLogic Server
 
CIS 2012 - Going Mobile with PingFederate and OAuth 2
CIS 2012 - Going Mobile with PingFederate and OAuth 2CIS 2012 - Going Mobile with PingFederate and OAuth 2
CIS 2012 - Going Mobile with PingFederate and OAuth 2
 
The Client is not always right! How to secure OAuth authentication from your...
The Client is not always right!  How to secure OAuth authentication from your...The Client is not always right!  How to secure OAuth authentication from your...
The Client is not always right! How to secure OAuth authentication from your...
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
 
Single Sign On 101
Single Sign On 101Single Sign On 101
Single Sign On 101
 

En vedette (8)

Oops design pattern_amitgupta
Oops design pattern_amitguptaOops design pattern_amitgupta
Oops design pattern_amitgupta
 
Design Pattern Automation
Design Pattern AutomationDesign Pattern Automation
Design Pattern Automation
 
OIM Connector for Webservices
OIM Connector for WebservicesOIM Connector for Webservices
OIM Connector for Webservices
 
Design Pattern lecture 2
Design Pattern lecture 2Design Pattern lecture 2
Design Pattern lecture 2
 
Design Pattern From Java To Ruby
Design Pattern From Java To RubyDesign Pattern From Java To Ruby
Design Pattern From Java To Ruby
 
Design pattern
Design patternDesign pattern
Design pattern
 
Design Pattern
Design PatternDesign Pattern
Design Pattern
 
Interoperable Web Services with JAX-WS
Interoperable Web Services with JAX-WSInteroperable Web Services with JAX-WS
Interoperable Web Services with JAX-WS
 

Similaire à SOA Security - So What?

Claims Based Identity In Share Point 2010
Claims  Based  Identity In  Share Point 2010Claims  Based  Identity In  Share Point 2010
Claims Based Identity In Share Point 2010
Steve Sofian
 
Early Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceEarly Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpace
Oliver Pfaff
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
Spiffy
 

Similaire à SOA Security - So What? (20)

Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares
 
Claims Based Identity In Share Point 2010
Claims  Based  Identity In  Share Point 2010Claims  Based  Identity In  Share Point 2010
Claims Based Identity In Share Point 2010
 
DIWD Concordia
DIWD ConcordiaDIWD Concordia
DIWD Concordia
 
UserCentric Identity based Service Invocation
UserCentric Identity based Service InvocationUserCentric Identity based Service Invocation
UserCentric Identity based Service Invocation
 
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
 
Extend Your Use of JIRA by Solving Your Unique Concerns: An Exposé of the New...
Extend Your Use of JIRA by Solving Your Unique Concerns: An Exposé of the New...Extend Your Use of JIRA by Solving Your Unique Concerns: An Exposé of the New...
Extend Your Use of JIRA by Solving Your Unique Concerns: An Exposé of the New...
 
Extend Your Use of JIRA by Solving Your Unique Concerns: An Exposé of the New...
Extend Your Use of JIRA by Solving Your Unique Concerns: An Exposé of the New...Extend Your Use of JIRA by Solving Your Unique Concerns: An Exposé of the New...
Extend Your Use of JIRA by Solving Your Unique Concerns: An Exposé of the New...
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
 
Distributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdfDistributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdf
 
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
 
Harbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 Wrap
 
Understanding Claim based Authentication
Understanding Claim based AuthenticationUnderstanding Claim based Authentication
Understanding Claim based Authentication
 
Early Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceEarly Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpace
 
AWS IoT - Best of re:Invent Tel Aviv
AWS IoT - Best of re:Invent Tel AvivAWS IoT - Best of re:Invent Tel Aviv
AWS IoT - Best of re:Invent Tel Aviv
 
e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)
 
.NET Core, ASP.NET Core Course, Session 19
 .NET Core, ASP.NET Core Course, Session 19 .NET Core, ASP.NET Core Course, Session 19
.NET Core, ASP.NET Core Course, Session 19
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
 
Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010Claims-Based Identity in SharePoint 2010
Claims-Based Identity in SharePoint 2010
 
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
 

Plus de Oliver Pfaff

Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
Oliver Pfaff
 

Plus de Oliver Pfaff (17)

Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT Security
 
Web-of-Things and Services Security
Web-of-Things and Services SecurityWeb-of-Things and Services Security
Web-of-Things and Services Security
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
 
IT-Security@Contemporary Life
IT-Security@Contemporary LifeIT-Security@Contemporary Life
IT-Security@Contemporary Life
 
OAuth Base Camp
OAuth Base CampOAuth Base Camp
OAuth Base Camp
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web Security
 
OpenID Connect - An Emperor or Just New Cloths?
OpenID Connect - An Emperor or Just New Cloths?OpenID Connect - An Emperor or Just New Cloths?
OpenID Connect - An Emperor or Just New Cloths?
 
Does REST Change the Game for IAM?
Does REST Change the Game for IAM?Does REST Change the Game for IAM?
Does REST Change the Game for IAM?
 
Analyzing OAuth
Analyzing OAuthAnalyzing OAuth
Analyzing OAuth
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusiness
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
 
State-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationState-of-the-Art in Web Services Federation
State-of-the-Art in Web Services Federation
 
Unified Security Architectures for Web and WAP
Unified Security Architectures for Web and WAPUnified Security Architectures for Web and WAP
Unified Security Architectures for Web and WAP
 
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
Real-Time-Communications Security-How to Deploy Presence and Instant Messagin...
 
Identity 2.0, Web services and SOA in Health Care
Identity 2.0, Web services and SOA in Health CareIdentity 2.0, Web services and SOA in Health Care
Identity 2.0, Web services and SOA in Health Care
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

SOA Security - So What?

  • 1. Konzepte einer Sicherheitsarchitektur für eine SOA am Beispiel der eFA SOA Security - So What? BITKOM Workshop SOA&Security, Franfurt/Main 2008-03-12
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Spotting eFA on the Radar-Screen eFA IdentityProvider STS: WS-Trust STS with specific WSDL and SAML assertion profile eFA ECRAdmissionTokenService: eFA-specific business logic eFA ECRAccessTokenService: nucleus for an authorization policy push support in WS environments eFA &quot;PEPs&quot;: somewhat eFA-specific since they need to understand eFA application service primitives (to some degree) and the eFA SAML assertion vocabulary Potential of re-use Distinguishes between: - Health pro-determined operations: eFA IdentityProvider STS - Health pro and patient-determined operations: eFA ECRAdmissionTokenService - Health pro, patient and ECR-determined operations: eFA ECRAccessTokenService Note: handling of multiple SAML assertions (in one ECR/MDO request context) is an implication of this separation Separation of functional concerns eFA IdentityProvider STS: encapsulates the processing of X.509 certificates and access to persisted user data eFA ECRAdmissionTokenService: encapsulates the pseudonymization of a patient and health professional context eFA ECRAccessTokenService: encapsulates the look-up of authorization policies Work split between architectural artifacts Relies on SAML, SOAP Message Security, WS-SecurityPolicy, WS-Trust, XACML Does not yet use WSFED Adaptation to technology innovation Relies on an n-ary authentication architecture where: - eFA application services: consume SAML assertions plus PoP - eFA security services: issue SAML assertions and consume X.509 certificates plus PoP - Ext. security services: issue X.509 certificates and consume whatever is appropriate given their CPS Note that this simplifies things somewhat as eFA security is based on multiple SAML assertions (cf. below) and adds authentication architecture artifacts issuing SAML assertions while consuming (other) SAML assertions plus PoP Authentication architecture Relies on a DAC authorization model addressing patient consent (my body->my data->my control) Modeled according authorization policy push PEPs may reside in WS-stacks or the service applications (e.g. through AOP) Requires a fine-grained SOAP request parsing to lookup identifiers and match them Authorization architecture Allows to isolate endpoints for verifying initial authentication based on X.509 certificates Requires application services to &quot;only&quot; process SAML assertions issued by eFA Decoupling authorization from initial authentication Separates medical application architecture from security architecture Externalizing security as a cross-cutting concern eFA specification Aspect
  • 14.
  • 15.
  • 16.
  • 17.
  • 19. WS-Stack Integration J2SE Subject (supplying authn subject information from the stack). JAX-WS SOAPMessageContext properties (by agreement between SOAP handler and WS application) .NET IPrincipal (supplying authn subject information from the stack) .NET Context properties (by agreement between SOAP handler and WS application) J2SE Principal , X509Certificate and OpenSAML SAMLAssertion (supplying authn subject information from the stack). Axis2 MessageContext properties (by agreement between SOAP handler and WS application) Propagating authenticated identity (WS stack->service, custom SOAP handler->service)   Via SOAP handler-chain plugin Via WCF interceptor Via SOAP handler-chain plugin User account / attr mapping integration   Verification of WSSE-supported credentials; callback-based means to match against reference information (e.g. passwords) Verification of WSSE-supported credentials; custom validators allow to match against reference information (e.g. passwords) Verification of WSSE-supported credentials; callback-based means to match against reference information (e.g. passwords) Verifier   Processing of WSSE-supported credentials; callback-based means to lookup credentials (e.g. from keystores) Processing of WSSE-supported credentials; callback-based means to lookup credentials (e.g. from keystores) Processing of WSSE-supported credentials; callback-based means to lookup credentials (e.g. from keystores) Claimant   External, has base class for a WS-Trust STS External External, has base class for a WS-Trust STS Issuer         Authentication Not constrained Not constrained resp. native constraints (claim-centric) Not constrained Model   External External, has native PMA (can be interfaced via IAuthorizationPolicy ) External PMA   External External, has native PDP ( ServiceAuthorizationManager ) and supports extensions of it External PDP   As SOAP handler-chain plugin (implementing interface JAX-WS SOAPHandler ) As WCF interceptor (implementing interface IDispatchMessageInspector ); also has native PEP As SOAP handler-chain plugin (extending Axis2 class AbstractHandler ) PEP         Authorization Sun JAX-WS RI/WSIT Microsoft WCF Apache Axis2 Aspects
  • 20.