200 likes | 367 Views
Web Services. Brief Overview & Security Assertion Coordinator Pattern. by Mohammad Abushadi & Riaz Ahmed for Security Group CSE - FAU. Agenda. Overview W3C definition Standards used Tools Architecture Security Assertion Coordinator Pattern. Definition.
E N D
Web Services Brief Overview & Security Assertion Coordinator Pattern by Mohammad Abushadi & Riaz Ahmed for Security Group CSE - FAU
Agenda • Overview • W3C definition • Standards used • Tools • Architecture • Security Assertion Coordinator Pattern
Definition Software system identified by a URI(Uniform Resource Identifier) whose public interfaces and bindings are defined and described using XML. Its definition can be discovered by other software systems. These systems may then interact with the Web service in a manner prescribed by its definition, using XML based messages conveyed by Internet protocols. [W3C-1]
Example Orbitarium Web Service: This is a web service for retrieving the astronomical positions of the Sun, Moon, and planets of the Solar System at the current time, or at any past present or future date. The service is free for public. [Orbit-1] Note: The service is up and running and freely available for public.
Standards • UDDI:Universal Description, Discovery and Integration. Like yellow pages for Web Services. Service information. Can be public/global or private/local. [Uddi-1] • WSDL:Web Services Description Language. Is XML based. To hold information like the web service interfaces, access protocols and so. Similar to IDL. • SOAP:Simple Object Access Protocol. Is XML based. Uses http as mean of transfer, making it easy to work with firewalls since most firewalls allow http. • SAML:Security Assertion Markup Language. Uses assertions. Three type of assertion: authentication, attribute and authorization. Is used on top of SOAP.
Tools Two types: Microsoft or Java based. • MS .NET Studio • Sun One Studio • IBM WebSphere • BEA WebLogic • and many more…
Simple Architecture SOAP Message DB Service URI/URL Find Service WSDL
Role-based Security Assertion Coordinator Pattern(by: Dr. Ed Fernandez, Mohammad Abushadi, Riaz Ahmed) Intent: Seamless exchange of security data in distributed environment while maintaining role based access controls to resources in organizations.
Context: A distributed environment including heterogeneous systems and web services. Problem: • Current systems lack feasible solutions to the problem of providing precise access control to resources, often requiring custom-built approaches that may not be easy to upgrade or modify. • The growth of the number of networked business partners and their processes requires a means to exchange security information in a standardized format that is flexible to change at the same time. • Costs are involved in custom integration processes, where time becomes crucial in achieving a quicker time-to-market competitive advantage. Costs include developer cost and development time.
The security of the shared data becomes another concern. Consistency of data exchange has to be assured. • Interoperability of systems across various implementation platforms stands as a significant obstacle. • Adding a new layer of security verification policies often proves tedious and costly in the current systems.
Problem: • Distributed systems are in great need of integrating their inner processes that share commonly used data. Exchange of security related data in particular poses an important problem when the issues of interoperability is of concern. Organizations must be able to easily add new security layers across the distributed environment with little changes. • Distributed environments must not resort to expensive global custom code changes in order to reflect new changes in security policies or data structure. • Organizations in the distributed environment must have the ability to quickly achieve higher, more refined levels of security data control for better adherence to the continuously changing nature of organizational business rules. • Each online destination site often has its own custom-made authentication system.
Solution: Exchange security information using a standard. In particular, manage security data in the form of XML-based SAML assertions using the SOAP protocol over HTTP.
Consequences: • Benefits: • Centralized data exchange • Standardized approach • Role-based access • Extensibility • Liabilities: • Complex to implement • Computationally expensive
Variants: • Single Sign On • Back Office Transactions
Credits • [W3C-1] http://www.w3.org/TR/2003/WD-ws-gloss-20030514/ • [Orbit-1] http://www.orbitarium.com/ • [Uddi-1] http://www.uddi.org • [Prfct] http://www.perfectxml.com/articles/xml/interop.asp