180 likes | 216 Views
Windows Communication Foundation. Security. Security?. Why do we need security? When we do need security? Is there any case when we do not need security?. WCF security features. Source: http://sanjevsharma.blogspot.com/2011/10/basics-of-wcf-security-part-i.html. Security methods.
E N D
Windows Communication Foundation Security
Security? • Why do we need security? • When we do need security? • Is there any case when we do not need security?
WCF security features Source:http://sanjevsharma.blogspot.com/2011/10/basics-of-wcf-security-part-i.html
Security methods • Authentication • Transfer security • Authorization • Security auditing
WCF Authentication • No authentication • Windows authentication • Username & password • X509 Certificate • Custom mechanism • Issued token
No authentication Source: http://cs430.files.wordpress.com/2011/07/please-rob-me.png
Windows authentication • Use windows user credentials for authentication TransportClientCredentialType = Windows
Username & password • Username & password in SQL Database • Credentials managed by IIS
X509 Certificate Security relies on private and public keys provided by certificates. • Certificate Authority (CA) • Certificate signed by CA (for Server and Client)
Custom mechanism Can implement a custom authentication mechanism. i.e: • Custom Username and Password validator • Complex multi-certificate layered authentication
Issued Token • Token - Unique identificator for every user • It's easy to generate tokens. • Token is only for identification.
WCF Authorization • Credentials store • Callers => logical roles • Roles => operations • Callers => operations • Windows groups & accounts • ASP.NET Provider
WCF Transfer security • Transfer Security Modes • None transfer security mode • Transport security • Message security • Mixed transfer security • Both transfer security
Transport security Point-to-point Source: http://i.msdn.microsoft.com/dynimg/IC227287.png
Message security End-to-end Source: http://i.msdn.microsoft.com/dynimg/IC227288.png
Security auditing The security risks will always remain. • Use event logging • Authentication • Authorization ServiceSecurityAuditBehavior Source: http://www.the-it-department.co.uk/security-audit.html
Tänan kuulamast Küsimusi?