WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.

Slides:



Advertisements
Similar presentations
Web Services Security Requirements Stephen T. Whitlock Security Architect Boeing.
Advertisements

Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
SOAP.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
0 Web Service Security JongSu Bae. 1  Introduction 2. Web Service Security 3. Web Service Security Mechanism 4. Tool Support 5. Q&A  Contents.
Authentication & Kerberos
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Christopher Irish David Orr Sophya Kheim Adam Lange Daniel Palma
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
WS-Security TC Christopher Kaler Kelvin Lawrence.
6/3/2015topic1 Web Security Qiang Yang Simon Fraser University Thanks: Francis Lau (HKU)
Core Web Service Security Patterns
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Making VLAB Secure Javier I. Roman. What is VLAB?  An interdisciplinary consortium dedicated to the development and promotion of the theory of planetary.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
Securing Web Services Using Semantic Web Technologies Brian Shields PhD Candidate, Department of Information Technology, National University of Ireland,
Web services security I
Prashanth Kumar Muthoju
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
1 Web Services Security XML Encryption, XML Signature and WS-Security.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Web Service Standards, Security & Management Chris Peiris
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
WS-Security Protocol Ramkumar Chandrasekharan CS 265.
An XML based Security Assertion Markup Language
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Web Services. Abstract  Web Services is a technology applicable for computationally distributed problems, including access to large databases What other.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
WS-Trust “From each,according to his ability;to each, according to his need. “ Karl marx Ahmet Emre Naza Selçuk Durna
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Shibboleth: An Introduction
Dr. Rebhi S. Baraka Advanced Topics in Information Technology (SICT 4310) Department of Computer Science Faculty of Information Technology.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
 A Web service is a method of communication between two electronic devices over World Wide Web.
Forward: Preventing XML Signature Wrapping Attacks in Cloud Computing Prepared by: Abdulaziz AlShammari Professor Ramasamy Uthurusamy April10, 2014.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
WS-Security Additional Material. Security Element: enclosing information n UsernameToken block u Defines how username-and-password info is enclosed in.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Web Services Security INFOSYS 290, Section 3 Web Services: Concepts, Design and Implementation Adam Blum
Web Services Security Standards Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
August 3, 2004WSRP Technical Committee WSRP v2 leveraging WS-Security 1. Motivation 2. WS-Securtiy Roadmap and Status 3. WSRP Use Cases 4. Strawman/Issues.
11/9/2018 Web Services Security Maria Lizarraga CS691.
Tim Bornholtz Director of Technology Services
Presentation transcript:

WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser

Web Service Security: SOAP Message Security WS-Security History -Many standards to secure web services -Microsoft, IBM, and VeriSign submitted security specifications to the Organization for the Advancement of Structured Information Standards (OASIS). -WS-Security is the leading web services standards to support, integrate and unify multiple security models. -WS Security: HTTP Message Security & XML Message Security (SOAP)

WS-Security: HTTP Message Security Advantages Mature Supported by most servers and clients Understood Simpler than message level security Disadvantages Point to point only Granularity, cannot have different security for messages in and messages out Only applies to HTTP

WS-Security: XML Message Security Advantages Allows the message to be self-protecting Selective, portions of the message can be secured to different parties Flexible, different security policy can be applied to request and response transport independent Disadvantages Immature, standards and tools Complex, contains many other standards including XML Encryption, XML Signature, X.509 certificates and more

WS-Security: XML (SOAP) Message Security Message Security Model : security tokens that encapsulate the message with digital signatures to protect and validate SOAP messages passed from other parties Token References : provides information location where the receivers can retrieve the entity from Signatures : provides information for the receivers so that they can find out if the message has been changed by someone else during message passing and if the message is the one that the receivers want to get from Encryption&Decryption : keeps data in a special form during message passing in which data will not be altered by someone else Time-Stamp : provides information for the receivers to know when the message is generated and when it is expired

Message Security Model Contains a collection of objects with two kinds security token (unsigned and signed), such as name, userID, to protect the SOAP messages.

Message Security Model: Security Header Overview of Security Header encapsulate information about what kinds of receivers allowed to interpret the message -At sender side, if a message needs to be received by different kinds of receivers, it must have multiple headers, either actor or role, whose values must be different -At the receiver side, it must generate an error message if it can not understand or the security header, and must signal an error if can not process the content of the security tokens, also it may ignore the meaning of the message if it has own security policy.

Message Security Model: Security Token There are three types of security tokens: User Name Token, Binary Security Tokens and XML Tokens. User name token is implemented in this way (Figure 3),, which may or may not be included in security header.

Message Security Model: Security Token Binary Security Tokens needs a special encoding rule, and has two attributes: valueType indicating what token is in the message (X.509 certificates or Kerbero), EncodingType indicating how the token is implemented.

Message Security Model: Security Token XML tokens have two standards: Security Assertion Markup Language (SAML) and Extensible rights Markup Language (XrML)

Token References Specified when a message delivers a collections of entities, sometimes, the object is located in somewhere else that receiver needs to get, these object locations are contained by Four mechanisms : -Direct Reference using full URL -Key Identfiers using an unique ID (referenced token id) -key names using token name -Embedded Reference using embedded token

Token Reference Examples

XML Signature Why XML Signature? give the functionalities of data integrity, authentication in web service application. enhance traditional digital signature, because digital signature only works in a way of sign an entire document, which is time consuming if an user only needs part of information in a document. With this technology, we can use XML signature to sign more than one type of resource, such as JPEG image and an HTML page

XML Signature Example

Encryption and Decryption Why XML Encryption & Decryption? XML Digital Signature specs did not define any standard mechanism for encrypting XML entities. The need for XML-based encryption is very important to secure web services. Encrypting and Decrypting Parts of a Document: existing technologies can encrypt a whole XML document. Performance: less time consuming process. Multiple encryption & decryption: the ability to apply multiple encryption treatments to different parts of the same document. Persistent Storage: important information can be left encrypted even in the databases.

XML Encryption & Decryption Example Before Encryption After Encryption under

Security Time Stamp Why need Security Time Stamp? Prevent relay attack -For example, an attacker resends the message to a targeted person for messing up its account information, with time stamp added, the targeted person can identify if the message has been received by checking the time stamp if its created time is the same as previous one. Example

Evaluation of Web Service Security: Solve Many Problems: replay attack message delayed XML document encrypted or decrypted using encrypting, decrypting and signing part of message content message verification

Conclusion: Current Technology and future :  involves too much computational operations of cryptography and memory demanding XML DOM processing -the signature processing: important to develop a new algorithm to reduce the processing time. -replay attack situation: important to develop a better approach to prevent that than using time stamp approach. be possible to be used in mobile networks -messages passed across mobile phones are more efficient and secured -less time to process XML message

Thank You!