SlideShare una empresa de Scribd logo
1 de 170
Descargar para leer sin conexión
Securing Web Services
Solving the Web Services Security Problem with an XML Gateway

June 2010
About Us
IT Services - Jeremy Rosenberg / Steve Hillman
• Jeremy Rosenberg
Developer in IT services since 2004
Identity management strategy
Java Developer

About Us
IT Services - Jeremy Rosenberg / Steve Hillman
• Jeremy Rosenberg
Developer in IT services since 2004
Identity management strategy
Java Developer
• Steve Hillman
IT Architect
With IT Services since 1987
Unix infrastructure

About Us
IT Services - Jeremy Rosenberg / Steve Hillman
About SFU
IT Services - Jeremy Rosenberg / Steve Hillman
• Named after famous explorer

Simon Fraser
1776 -1862

About SFU
IT Services - Jeremy Rosenberg / Steve Hillman
• Named after famous explorer
• Opened on September 9, 1965

Simon Fraser
1776 -1862

About SFU
IT Services - Jeremy Rosenberg / Steve Hillman
• Named after famous explorer
• Opened on September 9, 1965
• One University - Three campuses
• Burnaby
• Surrey
• Vancouver

Simon Fraser
1776 -1862

About SFU
IT Services - Jeremy Rosenberg / Steve Hillman
• Named after famous explorer
• Opened on September 9, 1965
• One University - Three campuses
• Burnaby
• Surrey
• Vancouver
• 32,000 students
• 900 faculty
• 1600 staff
• 100,000 alumni
Simon Fraser
1776 -1862

About SFU
IT Services - Jeremy Rosenberg / Steve Hillman
About This Presentation
IT Services - Jeremy Rosenberg / Steve Hillman
• Definitions

About This Presentation
IT Services - Jeremy Rosenberg / Steve Hillman
• Definitions
• XML Security Challenges

About This Presentation
IT Services - Jeremy Rosenberg / Steve Hillman
• Definitions
• XML Security Challenges
• About the Layer 7 SecureSpan XML
Gateway

About This Presentation
IT Services - Jeremy Rosenberg / Steve Hillman
• Definitions
• XML Security Challenges
• About the Layer 7 SecureSpan XML
Gateway
• Why we chose SecureSpan

About This Presentation
IT Services - Jeremy Rosenberg / Steve Hillman
• Definitions
• XML Security Challenges
• About the Layer 7 SecureSpan XML
Gateway
• Why we chose SecureSpan
• A little about Public Keys

About This Presentation
IT Services - Jeremy Rosenberg / Steve Hillman
• Definitions
• XML Security Challenges
• About the Layer 7 SecureSpan XML
Gateway
• Why we chose SecureSpan
• A little about Public Keys
• Walkthroughs
• SOAP
• REST

About This Presentation
IT Services - Jeremy Rosenberg / Steve Hillman
• Definitions
• XML Security Challenges
• About the Layer 7 SecureSpan XML
Gateway
• Why we chose SecureSpan
• A little about Public Keys
• Walkthroughs
• SOAP
• REST
• Questions

About This Presentation
IT Services - Jeremy Rosenberg / Steve Hillman
•First, A Few
Definitions

Definitions
IT Services - Jeremy Rosenberg / Steve Hillman
Definitions
IT Services - Jeremy Rosenberg / Steve Hillman
Web Service:

Definitions
IT Services - Jeremy Rosenberg / Steve Hillman
Web Service:
• An API to a remote procedure

Definitions
IT Services - Jeremy Rosenberg / Steve Hillman
Web Service:
• An API to a remote procedure
• Typically accessed over HTTP

Definitions
IT Services - Jeremy Rosenberg / Steve Hillman
Web Service:
• An API to a remote procedure
• Typically accessed over HTTP
• Machine-to-machine communications

Definitions
IT Services - Jeremy Rosenberg / Steve Hillman
Web Service:
• An API to a remote procedure
• Typically accessed over HTTP
• Machine-to-machine communications
• Allows data source to be loosely coupled to
applications

Definitions
IT Services - Jeremy Rosenberg / Steve Hillman
Web Service:
• An API to a remote procedure
• Typically accessed over HTTP
• Machine-to-machine communications
• Allows data source to be loosely coupled to
applications
• Makes systems reusable

Definitions
IT Services - Jeremy Rosenberg / Steve Hillman
Web Service:
• An API to a remote procedure
• Typically accessed over HTTP
• Machine-to-machine communications
• Allows data source to be loosely coupled to
applications
• Makes systems reusable
• Very popular with Twitter, Facebook, Amazon, etc

Definitions
IT Services - Jeremy Rosenberg / Steve Hillman
Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
•SOAP:

Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
•SOAP:
• XML Message passing protocol

Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
•SOAP:
• XML Message passing protocol
• Numerous ‘WS-’ standards

Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
•SOAP:
• XML Message passing protocol
• Numerous ‘WS-’ standards
• Associated with “Big” Web Services
• Most vendor SOA solutions use
SOAP

Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
•REST:
• URL-addressable objects

Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
•REST:
• URL-addressable objects
• “http://maps.google.com/maps/api/geocode/xml?
address=Memorial+University,+NL,+CA”

Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
•REST:
• URL-addressable objects
• “http://maps.google.com/maps/api/geocode/xml?
address=Memorial+University,+NL,+CA”

• Accessed and manipulated with standard HTTP
GET/POST/PUT/DELETE

Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
•REST:
• URL-addressable objects
• “http://maps.google.com/maps/api/geocode/xml?
address=Memorial+University,+NL,+CA”

• Accessed and manipulated with standard HTTP
GET/POST/PUT/DELETE
• Lightweight client requirements

Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
•REST:
• URL-addressable objects
• “http://maps.google.com/maps/api/geocode/xml?
address=Memorial+University,+NL,+CA”

• Accessed and manipulated with standard HTTP
GET/POST/PUT/DELETE
• Lightweight client requirements
• Stateless (every request is self-contained)

Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
•REST:
• URL-addressable objects
• “http://maps.google.com/maps/api/geocode/xml?
address=Memorial+University,+NL,+CA”

• Accessed and manipulated with standard HTTP
GET/POST/PUT/DELETE
• Lightweight client requirements
• Stateless (every request is self-contained)
• WS- standards are less mature

Definitions - SOAP vs REST
IT Services - Jeremy Rosenberg / Steve Hillman
!

•Web Services Security Challenges

“Put out an A.P.B. on a donut, believed sprinkled.”

IT Services - Jeremy Rosenberg / Steve Hillman
Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
• Web Services can communicate over many transport protocols

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
• Web Services can communicate over many transport protocols
• Commonly accessed over web protocols like HTTP

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
• Web Services can communicate over many transport protocols
• Commonly accessed over web protocols like HTTP
• Easy for Web services to bypass traditional firewalls

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
• Web Services can communicate over many transport protocols
• Commonly accessed over web protocols like HTTP
• Easy for Web services to bypass traditional firewalls

XML

HTTP

XML

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•

XML-based messages can be deliberately
or inadvertently malformed

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•
•

XML-based messages can be deliberately
or inadvertently malformed
Causes parser or applications to break

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•
•
•

XML-based messages can be deliberately
or inadvertently malformed
Causes parser or applications to break
Creates new XML threats and
vulnerabilities. E.g:

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•
•
•

XML-based messages can be deliberately
or inadvertently malformed
Causes parser or applications to break
Creates new XML threats and
vulnerabilities. E.g:
• XML parameter tampering

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•
•
•

XML-based messages can be deliberately
or inadvertently malformed
Causes parser or applications to break
Creates new XML threats and
vulnerabilities. E.g:
• XML parameter tampering
• XDoS Attacks

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•
•
•

XML-based messages can be deliberately
or inadvertently malformed
Causes parser or applications to break
Creates new XML threats and
vulnerabilities. E.g:
• XML parameter tampering
• XDoS Attacks
• Message Replay

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•
•
•

XML-based messages can be deliberately
or inadvertently malformed
Causes parser or applications to break
Creates new XML threats and
vulnerabilities. E.g:
• XML parameter tampering
• XDoS Attacks
• Message Replay
• Oversized/overdeep XML nodes

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•
•
•

XML-based messages can be deliberately
or inadvertently malformed
Causes parser or applications to break
Creates new XML threats and
vulnerabilities. E.g:
• XML parameter tampering
• XDoS Attacks
• Message Replay
• Oversized/overdeep XML nodes
• Code injection

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•

Transactions are principally machine-to-machine

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•
•

Transactions are principally machine-to-machine
New thinking around machine-to-machine credentialing

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
•
•
•

Transactions are principally machine-to-machine
New thinking around machine-to-machine credentialing
Login pages won’t work

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
• Services and clients must agree on security parameters
• crypto preferences
• standards support

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
• Services and clients must agree on security parameters
• crypto preferences
• standards support
• Need for new kinds of policy coordination

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
• Services and clients must agree on security parameters
• crypto preferences
• standards support
• Need for new kinds of policy coordination
• Incompatibilities have unforeseen consequences

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
• Web services enable multi-hop composite applications

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
• Web services enable multi-hop composite applications
• Example: Student on boarding process

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
• Web services enable multi-hop composite applications
• Example: Student on boarding process
• Message level security and audit that can span multihop SOA transactions end-to-end

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
Web services expose business functionality through open
APIs, requiring new application-aware security measures.

Web Services Security Challenges
IT Services - Jeremy Rosenberg / Steve Hillman
SecureSpan XML Gateway
IT Services - Jeremy Rosenberg / Steve Hillman
•

Enter the XML Gateway

SecureSpan XML Gateway
IT Services - Jeremy Rosenberg / Steve Hillman
SecureSpan XML Gateway
IT Services - Jeremy Rosenberg / Steve Hillman
XML Gateway - What it does
IT Services - Jeremy Rosenberg / Steve Hillman
• Parses all Inbound and outbound XML messages

XML Gateway - What it does
IT Services - Jeremy Rosenberg / Steve Hillman
• Parses all Inbound and outbound XML messages
• Inspection and modification of XML messages

XML Gateway - What it does
IT Services - Jeremy Rosenberg / Steve Hillman
• Parses all Inbound and outbound XML messages
• Inspection and modification of XML messages
• Replace “Username” value in inbound XML message
with value extracted from client certificate
• Prevent spoofing

XML Gateway - What it does
IT Services - Jeremy Rosenberg / Steve Hillman
• Parses all Inbound and outbound XML messages
• Inspection and modification of XML messages
• Replace “Username” value in inbound XML message
with value extracted from client certificate
• Prevent spoofing
• Blank-out Student Number value in outbound XML
messages
• Prevent accidental leakage of confidential info

XML Gateway - What it does
IT Services - Jeremy Rosenberg / Steve Hillman
XML Gateway
IT Services - Jeremy Rosenberg / Steve Hillman
• Thwart attacks

XML Gateway
IT Services - Jeremy Rosenberg / Steve Hillman
• Thwart attacks
• Prevent malicious and inadvertent XML attacks

XML Gateway
IT Services - Jeremy Rosenberg / Steve Hillman
• Thwart attacks
• Prevent malicious and inadvertent XML attacks
• Prevent other not-so-obvious application-level
attacks - e.g. SQL injection.
• Are you sure every one of your developers
sanitizes their inputs?

XML Gateway
IT Services - Jeremy Rosenberg / Steve Hillman
Benefits
IT Services - Jeremy Rosenberg / Steve Hillman
• Single point-of-entry for Web Services means:

Benefits
IT Services - Jeremy Rosenberg / Steve Hillman
• Single point-of-entry for Web Services means:
• Do rate-control/throttling/queueing to enforce SLAs

Benefits
IT Services - Jeremy Rosenberg / Steve Hillman
• Single point-of-entry for Web Services means:
• Do rate-control/throttling/queueing to enforce SLAs
• Standardized logging of all access

Benefits
IT Services - Jeremy Rosenberg / Steve Hillman
• Single point-of-entry for Web Services means:
• Do rate-control/throttling/queueing to enforce SLAs
• Standardized logging of all access
• Auditing

Benefits
IT Services - Jeremy Rosenberg / Steve Hillman
• Single point-of-entry for Web Services means:
• Do rate-control/throttling/queueing to enforce SLAs
• Standardized logging of all access
• Auditing
• Centrally enforced policies

Benefits
IT Services - Jeremy Rosenberg / Steve Hillman
• Single point-of-entry for Web Services means:
• Do rate-control/throttling/queueing to enforce SLAs
• Standardized logging of all access
• Auditing
• Centrally enforced policies
• Reusable rich set of authentication mechanisms

Benefits
IT Services - Jeremy Rosenberg / Steve Hillman
• Single point-of-entry for Web Services means:
• Do rate-control/throttling/queueing to enforce SLAs
• Standardized logging of all access
• Auditing
• Centrally enforced policies
• Reusable rich set of authentication mechanisms
• Managed by the Infrastructure team on behalf of all
Web Services development groups

Benefits
IT Services - Jeremy Rosenberg / Steve Hillman
Why We Chose Layer7
IT Services - Jeremy Rosenberg / Steve Hillman
• Industry leader in this space

Why We Chose Layer7
IT Services - Jeremy Rosenberg / Steve Hillman
• Industry leader in this space
• Very responsive

Why We Chose Layer7
IT Services - Jeremy Rosenberg / Steve Hillman
• Industry leader in this space
• Very responsive
• Available as either hard or soft appliance

Why We Chose Layer7
IT Services - Jeremy Rosenberg / Steve Hillman
•
•
•
•

Industry leader in this space
Very responsive
Available as either hard or soft appliance
Extensible using Java. We have Java experts.

Why We Chose Layer7
IT Services - Jeremy Rosenberg / Steve Hillman
•
•
•
•
•

Industry leader in this space
Very responsive
Available as either hard or soft appliance
Extensible using Java. We have Java experts.
Supports every standard known to Man

Why We Chose Layer7
IT Services - Jeremy Rosenberg / Steve Hillman
Standards
IT Services - Jeremy Rosenberg / Steve Hillman
XML 1.0
SOAP 1.2
REST
AJAX
XPath 1.0
XSLT 1.0
WSDL 1.1
XML Schema
LDAP 3.0
SAML 1.1/2.0
PKCS #10
X.509 v3 Certificates
FIPS 140-2
Kerberos

W3C XML Signature 1.0
W3C XML Encryption 1.0
SSL/TLS 3.0/1.1
SNMP
SMTP
POP3
IMAP4
HTTP/HTTPS
JMS 1.0
MQ Series
Tibco EMS
FTP
WS-Security 1.1
WS-Trust 1.0

Standards
IT Services - Jeremy Rosenberg / Steve Hillman

WS-Federation
WS-Addressing
WSSecureConversation
WS-MetadataExchange
WS-Policy
WS-SecurityPolicy
WS-PolicyAttachment
WS-SecureExchange
WSIL
WS-I
WS-I BSP
UDDI 3.0
XACML 2.0
MTOM
The Gateway Changes Everything
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Cowboy Style
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Cowboy Style
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Cowboy Style
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Cowboy Style
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Cowboy Style
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Cowboy Style
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Cowboy Style
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Cowboy Style
IT Services - Jeremy Rosenberg / Steve Hillman
About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
Definitely Not a Public Key Infrastructure (DNPKI)

About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
Definitely Not a Public Key Infrastructure (DNPKI)
• Named out of frustration with the phrase:
• “Cool we have PKI now”

About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
Definitely Not a Public Key Infrastructure (DNPKI)
• Named out of frustration with the phrase:
• “Cool we have PKI now”
• Needed a way to manage X.509 certificates for:
• https client certificate authentication
• WS-Security Signature Authentication

About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
Definitely Not a Public Key Infrastructure (DNPKI)
• Named out of frustration with the phrase:
• “Cool we have PKI now”
• Needed a way to manage X.509 certificates for:
• https client certificate authentication
• WS-Security Signature Authentication
• Store and push RSA public keys into LDAP

About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
Definitely Not a Public Key Infrastructure (DNPKI)
• Named out of frustration with the phrase:
• “Cool we have PKI now”
• Needed a way to manage X.509 certificates for:
• https client certificate authentication
• WS-Security Signature Authentication
• Store and push RSA public keys into LDAP
• Ability to de-provision certificate access

About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
Definitely Not a Public Key Infrastructure (DNPKI)
• Named out of frustration with the phrase:
• “Cool we have PKI now”
• Needed a way to manage X.509 certificates for:
• https client certificate authentication
• WS-Security Signature Authentication
• Store and push RSA public keys into LDAP
• Ability to de-provision certificate access
• Leveraged existing IdM architecture

About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
About DNPKI
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
SOAP Security - Best Practices
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway SOAP Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway SOAP Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway SOAP Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway SOAP Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway SOAP Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway SOAP Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway SOAP Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
The Zimbra Conundrum
IT Services - Jeremy Rosenberg / Steve Hillman
The Zimbra Conundrum
IT Services - Jeremy Rosenberg / Steve Hillman
The Zimbra Conundrum
IT Services - Jeremy Rosenberg / Steve Hillman
.../courses?user=me

The Zimbra Conundrum
IT Services - Jeremy Rosenberg / Steve Hillman
.../courses?user=me

The Zimbra Conundrum
IT Services - Jeremy Rosenberg / Steve Hillman
.../courses?user=notme

The Zimbra Conundrum
IT Services - Jeremy Rosenberg / Steve Hillman
.../courses?user=notme

The Zimbra Conundrum
IT Services - Jeremy Rosenberg / Steve Hillman
REST Security that Never Rests
IT Services - Jeremy Rosenberg / Steve Hillman
REST Security that Never Rests
IT Services - Jeremy Rosenberg / Steve Hillman
REST Security that Never Rests
IT Services - Jeremy Rosenberg / Steve Hillman
REST Security that Never Rests
IT Services - Jeremy Rosenberg / Steve Hillman
REST Security that Never Rests
IT Services - Jeremy Rosenberg / Steve Hillman
REST Security that Never Rests
IT Services - Jeremy Rosenberg / Steve Hillman
REST Security that Never Rests
IT Services - Jeremy Rosenberg / Steve Hillman
REST Security that Never Rests
IT Services - Jeremy Rosenberg / Steve Hillman
REST Security that Never Rests
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway REST Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway REST Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway REST Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway REST Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway REST Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway REST Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Gateway REST Assertions
IT Services - Jeremy Rosenberg / Steve Hillman
Lessons Learned
IT Services - Jeremy Rosenberg / Steve Hillman
• Security is an enabler

Lessons Learned
IT Services - Jeremy Rosenberg / Steve Hillman
• Security is an enabler
• Stick to standards where possible

Lessons Learned
IT Services - Jeremy Rosenberg / Steve Hillman
• Security is an enabler
• Stick to standards where possible
• A good vendor is huge

Lessons Learned
IT Services - Jeremy Rosenberg / Steve Hillman
• Security is an enabler
• Stick to standards where possible
• A good vendor is huge
• Start small
• Control the service and consumer

Lessons Learned
IT Services - Jeremy Rosenberg / Steve Hillman
• Security is an enabler
• Stick to standards where possible
• A good vendor is huge
• Start small
• Control the service and consumer
• Security can be fun!

Lessons Learned
IT Services - Jeremy Rosenberg / Steve Hillman
Thank You
!
rosenberg@sfu.ca!
hillman@sfu.ca
!

THANK YOU
IT Services - Jeremy Rosenberg / Steve Hillman

Más contenido relacionado

Destacado

Lancaster bomber rf124_crash
Lancaster bomber rf124_crashLancaster bomber rf124_crash
Lancaster bomber rf124_crashJames Clarke
 
Hum2220 sp2016 syllabus
Hum2220 sp2016 syllabusHum2220 sp2016 syllabus
Hum2220 sp2016 syllabusProfWillAdams
 
Lengua anuncio
Lengua anuncioLengua anuncio
Lengua anunciofranky226
 
Arh2050 sp2016 proust questionnaire
Arh2050 sp2016 proust questionnaireArh2050 sp2016 proust questionnaire
Arh2050 sp2016 proust questionnaireProfWillAdams
 
2003 Spring Newsletter
2003 Spring Newsletter2003 Spring Newsletter
2003 Spring NewsletterDirect Relief
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!wmetcalf
 
Направи си сам суперкомпютър
Направи си сам суперкомпютърНаправи си сам суперкомпютър
Направи си сам суперкомпютърOpenFest team
 
Arh2050 art of the stone age
Arh2050 art of the stone ageArh2050 art of the stone age
Arh2050 art of the stone ageProfWillAdams
 
Eindejaarstips 2011
Eindejaarstips 2011Eindejaarstips 2011
Eindejaarstips 2011harrielamers
 
Hum2220 sm2015 proust questionnaire
Hum2220 sm2015 proust questionnaireHum2220 sm2015 proust questionnaire
Hum2220 sm2015 proust questionnaireProfWillAdams
 
Mobile User Experience: Auto Drive through Performance Metrics
Mobile User Experience:Auto Drive through Performance MetricsMobile User Experience:Auto Drive through Performance Metrics
Mobile User Experience: Auto Drive through Performance MetricsAndreas Grabner
 
Hum2310 sp2015 proust questionnaire
Hum2310 sp2015 proust questionnaireHum2310 sp2015 proust questionnaire
Hum2310 sp2015 proust questionnaireProfWillAdams
 
Hum2220 fa2015 proust questionnaire
Hum2220 fa2015 proust questionnaireHum2220 fa2015 proust questionnaire
Hum2220 fa2015 proust questionnaireProfWillAdams
 
Arh2050 sarcophagus lid homework
Arh2050 sarcophagus lid homeworkArh2050 sarcophagus lid homework
Arh2050 sarcophagus lid homeworkProfWillAdams
 

Destacado (18)

2008 annual report
2008 annual report2008 annual report
2008 annual report
 
Fall newsletter-2009
Fall newsletter-2009Fall newsletter-2009
Fall newsletter-2009
 
Lancaster bomber rf124_crash
Lancaster bomber rf124_crashLancaster bomber rf124_crash
Lancaster bomber rf124_crash
 
Hum2220 sp2016 syllabus
Hum2220 sp2016 syllabusHum2220 sp2016 syllabus
Hum2220 sp2016 syllabus
 
2007 annual report
2007 annual report2007 annual report
2007 annual report
 
Lengua anuncio
Lengua anuncioLengua anuncio
Lengua anuncio
 
Arh2050 sp2016 proust questionnaire
Arh2050 sp2016 proust questionnaireArh2050 sp2016 proust questionnaire
Arh2050 sp2016 proust questionnaire
 
2003 Spring Newsletter
2003 Spring Newsletter2003 Spring Newsletter
2003 Spring Newsletter
 
You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!You Give Us The Fire We'll Give'em Hell!
You Give Us The Fire We'll Give'em Hell!
 
Направи си сам суперкомпютър
Направи си сам суперкомпютърНаправи си сам суперкомпютър
Направи си сам суперкомпютър
 
Arh2050 art of the stone age
Arh2050 art of the stone ageArh2050 art of the stone age
Arh2050 art of the stone age
 
Eindejaarstips 2011
Eindejaarstips 2011Eindejaarstips 2011
Eindejaarstips 2011
 
Hum2220 sm2015 proust questionnaire
Hum2220 sm2015 proust questionnaireHum2220 sm2015 proust questionnaire
Hum2220 sm2015 proust questionnaire
 
Mobile User Experience: Auto Drive through Performance Metrics
Mobile User Experience:Auto Drive through Performance MetricsMobile User Experience:Auto Drive through Performance Metrics
Mobile User Experience: Auto Drive through Performance Metrics
 
Hum2310 sp2015 proust questionnaire
Hum2310 sp2015 proust questionnaireHum2310 sp2015 proust questionnaire
Hum2310 sp2015 proust questionnaire
 
Hum2220 fa2015 proust questionnaire
Hum2220 fa2015 proust questionnaireHum2220 fa2015 proust questionnaire
Hum2220 fa2015 proust questionnaire
 
Arh2050 sarcophagus lid homework
Arh2050 sarcophagus lid homeworkArh2050 sarcophagus lid homework
Arh2050 sarcophagus lid homework
 
2005 annual report
2005 annual report2005 annual report
2005 annual report
 

Más de Jeremy Rosenberg

Social Credential Use in CAS
Social Credential Use in CASSocial Credential Use in CAS
Social Credential Use in CASJeremy Rosenberg
 
SFU Identity Management Overview
SFU Identity Management OverviewSFU Identity Management Overview
SFU Identity Management OverviewJeremy Rosenberg
 
Update on Institutional Identity Management Priorities at SFU
Update on Institutional Identity Management Priorities at SFUUpdate on Institutional Identity Management Priorities at SFU
Update on Institutional Identity Management Priorities at SFUJeremy Rosenberg
 
Exploring Cloud Credentials for Institutional Use
Exploring Cloud Credentials for Institutional UseExploring Cloud Credentials for Institutional Use
Exploring Cloud Credentials for Institutional UseJeremy Rosenberg
 
OpenRegistry at Simon Fraser University
OpenRegistry at Simon Fraser UniversityOpenRegistry at Simon Fraser University
OpenRegistry at Simon Fraser UniversityJeremy Rosenberg
 
Campus Perspectives on OpenRegistry
Campus Perspectives on OpenRegistryCampus Perspectives on OpenRegistry
Campus Perspectives on OpenRegistryJeremy Rosenberg
 
Opening Up Academic Planning Information
Opening Up Academic Planning InformationOpening Up Academic Planning Information
Opening Up Academic Planning InformationJeremy Rosenberg
 

Más de Jeremy Rosenberg (9)

Social Credential Use in CAS
Social Credential Use in CASSocial Credential Use in CAS
Social Credential Use in CAS
 
SFU Identity Management Overview
SFU Identity Management OverviewSFU Identity Management Overview
SFU Identity Management Overview
 
Update on Institutional Identity Management Priorities at SFU
Update on Institutional Identity Management Priorities at SFUUpdate on Institutional Identity Management Priorities at SFU
Update on Institutional Identity Management Priorities at SFU
 
Exploring Cloud Credentials for Institutional Use
Exploring Cloud Credentials for Institutional UseExploring Cloud Credentials for Institutional Use
Exploring Cloud Credentials for Institutional Use
 
Websurvey
WebsurveyWebsurvey
Websurvey
 
DIY to CMS
DIY to CMSDIY to CMS
DIY to CMS
 
OpenRegistry at Simon Fraser University
OpenRegistry at Simon Fraser UniversityOpenRegistry at Simon Fraser University
OpenRegistry at Simon Fraser University
 
Campus Perspectives on OpenRegistry
Campus Perspectives on OpenRegistryCampus Perspectives on OpenRegistry
Campus Perspectives on OpenRegistry
 
Opening Up Academic Planning Information
Opening Up Academic Planning InformationOpening Up Academic Planning Information
Opening Up Academic Planning Information
 

Último

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Último (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Securing Web Services with CAS Proxy Tickets

  • 1. Securing Web Services Solving the Web Services Security Problem with an XML Gateway June 2010
  • 2. About Us IT Services - Jeremy Rosenberg / Steve Hillman
  • 3. • Jeremy Rosenberg Developer in IT services since 2004 Identity management strategy Java Developer About Us IT Services - Jeremy Rosenberg / Steve Hillman
  • 4. • Jeremy Rosenberg Developer in IT services since 2004 Identity management strategy Java Developer • Steve Hillman IT Architect With IT Services since 1987 Unix infrastructure About Us IT Services - Jeremy Rosenberg / Steve Hillman
  • 5. About SFU IT Services - Jeremy Rosenberg / Steve Hillman
  • 6. • Named after famous explorer Simon Fraser 1776 -1862 About SFU IT Services - Jeremy Rosenberg / Steve Hillman
  • 7. • Named after famous explorer • Opened on September 9, 1965 Simon Fraser 1776 -1862 About SFU IT Services - Jeremy Rosenberg / Steve Hillman
  • 8. • Named after famous explorer • Opened on September 9, 1965 • One University - Three campuses • Burnaby • Surrey • Vancouver Simon Fraser 1776 -1862 About SFU IT Services - Jeremy Rosenberg / Steve Hillman
  • 9. • Named after famous explorer • Opened on September 9, 1965 • One University - Three campuses • Burnaby • Surrey • Vancouver • 32,000 students • 900 faculty • 1600 staff • 100,000 alumni Simon Fraser 1776 -1862 About SFU IT Services - Jeremy Rosenberg / Steve Hillman
  • 10. About This Presentation IT Services - Jeremy Rosenberg / Steve Hillman
  • 11. • Definitions About This Presentation IT Services - Jeremy Rosenberg / Steve Hillman
  • 12. • Definitions • XML Security Challenges About This Presentation IT Services - Jeremy Rosenberg / Steve Hillman
  • 13. • Definitions • XML Security Challenges • About the Layer 7 SecureSpan XML Gateway About This Presentation IT Services - Jeremy Rosenberg / Steve Hillman
  • 14. • Definitions • XML Security Challenges • About the Layer 7 SecureSpan XML Gateway • Why we chose SecureSpan About This Presentation IT Services - Jeremy Rosenberg / Steve Hillman
  • 15. • Definitions • XML Security Challenges • About the Layer 7 SecureSpan XML Gateway • Why we chose SecureSpan • A little about Public Keys About This Presentation IT Services - Jeremy Rosenberg / Steve Hillman
  • 16. • Definitions • XML Security Challenges • About the Layer 7 SecureSpan XML Gateway • Why we chose SecureSpan • A little about Public Keys • Walkthroughs • SOAP • REST About This Presentation IT Services - Jeremy Rosenberg / Steve Hillman
  • 17. • Definitions • XML Security Challenges • About the Layer 7 SecureSpan XML Gateway • Why we chose SecureSpan • A little about Public Keys • Walkthroughs • SOAP • REST • Questions About This Presentation IT Services - Jeremy Rosenberg / Steve Hillman
  • 18. •First, A Few Definitions Definitions IT Services - Jeremy Rosenberg / Steve Hillman
  • 19. Definitions IT Services - Jeremy Rosenberg / Steve Hillman
  • 20. Web Service: Definitions IT Services - Jeremy Rosenberg / Steve Hillman
  • 21. Web Service: • An API to a remote procedure Definitions IT Services - Jeremy Rosenberg / Steve Hillman
  • 22. Web Service: • An API to a remote procedure • Typically accessed over HTTP Definitions IT Services - Jeremy Rosenberg / Steve Hillman
  • 23. Web Service: • An API to a remote procedure • Typically accessed over HTTP • Machine-to-machine communications Definitions IT Services - Jeremy Rosenberg / Steve Hillman
  • 24. Web Service: • An API to a remote procedure • Typically accessed over HTTP • Machine-to-machine communications • Allows data source to be loosely coupled to applications Definitions IT Services - Jeremy Rosenberg / Steve Hillman
  • 25. Web Service: • An API to a remote procedure • Typically accessed over HTTP • Machine-to-machine communications • Allows data source to be loosely coupled to applications • Makes systems reusable Definitions IT Services - Jeremy Rosenberg / Steve Hillman
  • 26. Web Service: • An API to a remote procedure • Typically accessed over HTTP • Machine-to-machine communications • Allows data source to be loosely coupled to applications • Makes systems reusable • Very popular with Twitter, Facebook, Amazon, etc Definitions IT Services - Jeremy Rosenberg / Steve Hillman
  • 27. Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 28. •SOAP: Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 29. •SOAP: • XML Message passing protocol Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 30. •SOAP: • XML Message passing protocol • Numerous ‘WS-’ standards Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 31. •SOAP: • XML Message passing protocol • Numerous ‘WS-’ standards • Associated with “Big” Web Services • Most vendor SOA solutions use SOAP Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 32. Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 33. •REST: • URL-addressable objects Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 34. •REST: • URL-addressable objects • “http://maps.google.com/maps/api/geocode/xml? address=Memorial+University,+NL,+CA” Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 35. •REST: • URL-addressable objects • “http://maps.google.com/maps/api/geocode/xml? address=Memorial+University,+NL,+CA” • Accessed and manipulated with standard HTTP GET/POST/PUT/DELETE Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 36. •REST: • URL-addressable objects • “http://maps.google.com/maps/api/geocode/xml? address=Memorial+University,+NL,+CA” • Accessed and manipulated with standard HTTP GET/POST/PUT/DELETE • Lightweight client requirements Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 37. •REST: • URL-addressable objects • “http://maps.google.com/maps/api/geocode/xml? address=Memorial+University,+NL,+CA” • Accessed and manipulated with standard HTTP GET/POST/PUT/DELETE • Lightweight client requirements • Stateless (every request is self-contained) Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 38. •REST: • URL-addressable objects • “http://maps.google.com/maps/api/geocode/xml? address=Memorial+University,+NL,+CA” • Accessed and manipulated with standard HTTP GET/POST/PUT/DELETE • Lightweight client requirements • Stateless (every request is self-contained) • WS- standards are less mature Definitions - SOAP vs REST IT Services - Jeremy Rosenberg / Steve Hillman
  • 39. ! •Web Services Security Challenges “Put out an A.P.B. on a donut, believed sprinkled.” IT Services - Jeremy Rosenberg / Steve Hillman
  • 40. Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 41. • Web Services can communicate over many transport protocols Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 42. • Web Services can communicate over many transport protocols • Commonly accessed over web protocols like HTTP Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 43. • Web Services can communicate over many transport protocols • Commonly accessed over web protocols like HTTP • Easy for Web services to bypass traditional firewalls Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 44. • Web Services can communicate over many transport protocols • Commonly accessed over web protocols like HTTP • Easy for Web services to bypass traditional firewalls XML HTTP XML Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 45. Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 46. • XML-based messages can be deliberately or inadvertently malformed Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 47. • • XML-based messages can be deliberately or inadvertently malformed Causes parser or applications to break Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 48. • • • XML-based messages can be deliberately or inadvertently malformed Causes parser or applications to break Creates new XML threats and vulnerabilities. E.g: Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 49. • • • XML-based messages can be deliberately or inadvertently malformed Causes parser or applications to break Creates new XML threats and vulnerabilities. E.g: • XML parameter tampering Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 50. • • • XML-based messages can be deliberately or inadvertently malformed Causes parser or applications to break Creates new XML threats and vulnerabilities. E.g: • XML parameter tampering • XDoS Attacks Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 51. • • • XML-based messages can be deliberately or inadvertently malformed Causes parser or applications to break Creates new XML threats and vulnerabilities. E.g: • XML parameter tampering • XDoS Attacks • Message Replay Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 52. • • • XML-based messages can be deliberately or inadvertently malformed Causes parser or applications to break Creates new XML threats and vulnerabilities. E.g: • XML parameter tampering • XDoS Attacks • Message Replay • Oversized/overdeep XML nodes Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 53. • • • XML-based messages can be deliberately or inadvertently malformed Causes parser or applications to break Creates new XML threats and vulnerabilities. E.g: • XML parameter tampering • XDoS Attacks • Message Replay • Oversized/overdeep XML nodes • Code injection Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 54. Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 55. • Transactions are principally machine-to-machine Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 56. • • Transactions are principally machine-to-machine New thinking around machine-to-machine credentialing Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 57. • • • Transactions are principally machine-to-machine New thinking around machine-to-machine credentialing Login pages won’t work Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 58. Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 59. • Services and clients must agree on security parameters • crypto preferences • standards support Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 60. • Services and clients must agree on security parameters • crypto preferences • standards support • Need for new kinds of policy coordination Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 61. • Services and clients must agree on security parameters • crypto preferences • standards support • Need for new kinds of policy coordination • Incompatibilities have unforeseen consequences Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 62. Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 63. • Web services enable multi-hop composite applications Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 64. • Web services enable multi-hop composite applications • Example: Student on boarding process Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 65. • Web services enable multi-hop composite applications • Example: Student on boarding process • Message level security and audit that can span multihop SOA transactions end-to-end Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 66. Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 67. Web services expose business functionality through open APIs, requiring new application-aware security measures. Web Services Security Challenges IT Services - Jeremy Rosenberg / Steve Hillman
  • 68. SecureSpan XML Gateway IT Services - Jeremy Rosenberg / Steve Hillman
  • 69. • Enter the XML Gateway SecureSpan XML Gateway IT Services - Jeremy Rosenberg / Steve Hillman
  • 70. SecureSpan XML Gateway IT Services - Jeremy Rosenberg / Steve Hillman
  • 71. XML Gateway - What it does IT Services - Jeremy Rosenberg / Steve Hillman
  • 72. • Parses all Inbound and outbound XML messages XML Gateway - What it does IT Services - Jeremy Rosenberg / Steve Hillman
  • 73. • Parses all Inbound and outbound XML messages • Inspection and modification of XML messages XML Gateway - What it does IT Services - Jeremy Rosenberg / Steve Hillman
  • 74. • Parses all Inbound and outbound XML messages • Inspection and modification of XML messages • Replace “Username” value in inbound XML message with value extracted from client certificate • Prevent spoofing XML Gateway - What it does IT Services - Jeremy Rosenberg / Steve Hillman
  • 75. • Parses all Inbound and outbound XML messages • Inspection and modification of XML messages • Replace “Username” value in inbound XML message with value extracted from client certificate • Prevent spoofing • Blank-out Student Number value in outbound XML messages • Prevent accidental leakage of confidential info XML Gateway - What it does IT Services - Jeremy Rosenberg / Steve Hillman
  • 76. XML Gateway IT Services - Jeremy Rosenberg / Steve Hillman
  • 77. • Thwart attacks XML Gateway IT Services - Jeremy Rosenberg / Steve Hillman
  • 78. • Thwart attacks • Prevent malicious and inadvertent XML attacks XML Gateway IT Services - Jeremy Rosenberg / Steve Hillman
  • 79. • Thwart attacks • Prevent malicious and inadvertent XML attacks • Prevent other not-so-obvious application-level attacks - e.g. SQL injection. • Are you sure every one of your developers sanitizes their inputs? XML Gateway IT Services - Jeremy Rosenberg / Steve Hillman
  • 80. Benefits IT Services - Jeremy Rosenberg / Steve Hillman
  • 81. • Single point-of-entry for Web Services means: Benefits IT Services - Jeremy Rosenberg / Steve Hillman
  • 82. • Single point-of-entry for Web Services means: • Do rate-control/throttling/queueing to enforce SLAs Benefits IT Services - Jeremy Rosenberg / Steve Hillman
  • 83. • Single point-of-entry for Web Services means: • Do rate-control/throttling/queueing to enforce SLAs • Standardized logging of all access Benefits IT Services - Jeremy Rosenberg / Steve Hillman
  • 84. • Single point-of-entry for Web Services means: • Do rate-control/throttling/queueing to enforce SLAs • Standardized logging of all access • Auditing Benefits IT Services - Jeremy Rosenberg / Steve Hillman
  • 85. • Single point-of-entry for Web Services means: • Do rate-control/throttling/queueing to enforce SLAs • Standardized logging of all access • Auditing • Centrally enforced policies Benefits IT Services - Jeremy Rosenberg / Steve Hillman
  • 86. • Single point-of-entry for Web Services means: • Do rate-control/throttling/queueing to enforce SLAs • Standardized logging of all access • Auditing • Centrally enforced policies • Reusable rich set of authentication mechanisms Benefits IT Services - Jeremy Rosenberg / Steve Hillman
  • 87. • Single point-of-entry for Web Services means: • Do rate-control/throttling/queueing to enforce SLAs • Standardized logging of all access • Auditing • Centrally enforced policies • Reusable rich set of authentication mechanisms • Managed by the Infrastructure team on behalf of all Web Services development groups Benefits IT Services - Jeremy Rosenberg / Steve Hillman
  • 88. Why We Chose Layer7 IT Services - Jeremy Rosenberg / Steve Hillman
  • 89. • Industry leader in this space Why We Chose Layer7 IT Services - Jeremy Rosenberg / Steve Hillman
  • 90. • Industry leader in this space • Very responsive Why We Chose Layer7 IT Services - Jeremy Rosenberg / Steve Hillman
  • 91. • Industry leader in this space • Very responsive • Available as either hard or soft appliance Why We Chose Layer7 IT Services - Jeremy Rosenberg / Steve Hillman
  • 92. • • • • Industry leader in this space Very responsive Available as either hard or soft appliance Extensible using Java. We have Java experts. Why We Chose Layer7 IT Services - Jeremy Rosenberg / Steve Hillman
  • 93. • • • • • Industry leader in this space Very responsive Available as either hard or soft appliance Extensible using Java. We have Java experts. Supports every standard known to Man Why We Chose Layer7 IT Services - Jeremy Rosenberg / Steve Hillman
  • 94. Standards IT Services - Jeremy Rosenberg / Steve Hillman
  • 95. XML 1.0 SOAP 1.2 REST AJAX XPath 1.0 XSLT 1.0 WSDL 1.1 XML Schema LDAP 3.0 SAML 1.1/2.0 PKCS #10 X.509 v3 Certificates FIPS 140-2 Kerberos W3C XML Signature 1.0 W3C XML Encryption 1.0 SSL/TLS 3.0/1.1 SNMP SMTP POP3 IMAP4 HTTP/HTTPS JMS 1.0 MQ Series Tibco EMS FTP WS-Security 1.1 WS-Trust 1.0 Standards IT Services - Jeremy Rosenberg / Steve Hillman WS-Federation WS-Addressing WSSecureConversation WS-MetadataExchange WS-Policy WS-SecurityPolicy WS-PolicyAttachment WS-SecureExchange WSIL WS-I WS-I BSP UDDI 3.0 XACML 2.0 MTOM
  • 96. The Gateway Changes Everything IT Services - Jeremy Rosenberg / Steve Hillman
  • 97. SOAP Security - Cowboy Style IT Services - Jeremy Rosenberg / Steve Hillman
  • 98. SOAP Security - Cowboy Style IT Services - Jeremy Rosenberg / Steve Hillman
  • 99. SOAP Security - Cowboy Style IT Services - Jeremy Rosenberg / Steve Hillman
  • 100. SOAP Security - Cowboy Style IT Services - Jeremy Rosenberg / Steve Hillman
  • 101. SOAP Security - Cowboy Style IT Services - Jeremy Rosenberg / Steve Hillman
  • 102. SOAP Security - Cowboy Style IT Services - Jeremy Rosenberg / Steve Hillman
  • 103. SOAP Security - Cowboy Style IT Services - Jeremy Rosenberg / Steve Hillman
  • 104. SOAP Security - Cowboy Style IT Services - Jeremy Rosenberg / Steve Hillman
  • 105. About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 106. Definitely Not a Public Key Infrastructure (DNPKI) About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 107. Definitely Not a Public Key Infrastructure (DNPKI) • Named out of frustration with the phrase: • “Cool we have PKI now” About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 108. Definitely Not a Public Key Infrastructure (DNPKI) • Named out of frustration with the phrase: • “Cool we have PKI now” • Needed a way to manage X.509 certificates for: • https client certificate authentication • WS-Security Signature Authentication About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 109. Definitely Not a Public Key Infrastructure (DNPKI) • Named out of frustration with the phrase: • “Cool we have PKI now” • Needed a way to manage X.509 certificates for: • https client certificate authentication • WS-Security Signature Authentication • Store and push RSA public keys into LDAP About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 110. Definitely Not a Public Key Infrastructure (DNPKI) • Named out of frustration with the phrase: • “Cool we have PKI now” • Needed a way to manage X.509 certificates for: • https client certificate authentication • WS-Security Signature Authentication • Store and push RSA public keys into LDAP • Ability to de-provision certificate access About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 111. Definitely Not a Public Key Infrastructure (DNPKI) • Named out of frustration with the phrase: • “Cool we have PKI now” • Needed a way to manage X.509 certificates for: • https client certificate authentication • WS-Security Signature Authentication • Store and push RSA public keys into LDAP • Ability to de-provision certificate access • Leveraged existing IdM architecture About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 112. About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 113. About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 114. About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 115. About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 116. About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 117. About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 118. About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 119. About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 120. About DNPKI IT Services - Jeremy Rosenberg / Steve Hillman
  • 121. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 122. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 123. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 124. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 125. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 126. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 127. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 128. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 129. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 130. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 131. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 132. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 133. SOAP Security - Best Practices IT Services - Jeremy Rosenberg / Steve Hillman
  • 134. Gateway SOAP Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 135. Gateway SOAP Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 136. Gateway SOAP Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 137. Gateway SOAP Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 138. Gateway SOAP Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 139. Gateway SOAP Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 140. Gateway SOAP Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 141. The Zimbra Conundrum IT Services - Jeremy Rosenberg / Steve Hillman
  • 142. The Zimbra Conundrum IT Services - Jeremy Rosenberg / Steve Hillman
  • 143. The Zimbra Conundrum IT Services - Jeremy Rosenberg / Steve Hillman
  • 144. .../courses?user=me The Zimbra Conundrum IT Services - Jeremy Rosenberg / Steve Hillman
  • 145. .../courses?user=me The Zimbra Conundrum IT Services - Jeremy Rosenberg / Steve Hillman
  • 146. .../courses?user=notme The Zimbra Conundrum IT Services - Jeremy Rosenberg / Steve Hillman
  • 147. .../courses?user=notme The Zimbra Conundrum IT Services - Jeremy Rosenberg / Steve Hillman
  • 148. REST Security that Never Rests IT Services - Jeremy Rosenberg / Steve Hillman
  • 149. REST Security that Never Rests IT Services - Jeremy Rosenberg / Steve Hillman
  • 150. REST Security that Never Rests IT Services - Jeremy Rosenberg / Steve Hillman
  • 151. REST Security that Never Rests IT Services - Jeremy Rosenberg / Steve Hillman
  • 152. REST Security that Never Rests IT Services - Jeremy Rosenberg / Steve Hillman
  • 153. REST Security that Never Rests IT Services - Jeremy Rosenberg / Steve Hillman
  • 154. REST Security that Never Rests IT Services - Jeremy Rosenberg / Steve Hillman
  • 155. REST Security that Never Rests IT Services - Jeremy Rosenberg / Steve Hillman
  • 156. REST Security that Never Rests IT Services - Jeremy Rosenberg / Steve Hillman
  • 157. Gateway REST Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 158. Gateway REST Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 159. Gateway REST Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 160. Gateway REST Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 161. Gateway REST Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 162. Gateway REST Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 163. Gateway REST Assertions IT Services - Jeremy Rosenberg / Steve Hillman
  • 164. Lessons Learned IT Services - Jeremy Rosenberg / Steve Hillman
  • 165. • Security is an enabler Lessons Learned IT Services - Jeremy Rosenberg / Steve Hillman
  • 166. • Security is an enabler • Stick to standards where possible Lessons Learned IT Services - Jeremy Rosenberg / Steve Hillman
  • 167. • Security is an enabler • Stick to standards where possible • A good vendor is huge Lessons Learned IT Services - Jeremy Rosenberg / Steve Hillman
  • 168. • Security is an enabler • Stick to standards where possible • A good vendor is huge • Start small • Control the service and consumer Lessons Learned IT Services - Jeremy Rosenberg / Steve Hillman
  • 169. • Security is an enabler • Stick to standards where possible • A good vendor is huge • Start small • Control the service and consumer • Security can be fun! Lessons Learned IT Services - Jeremy Rosenberg / Steve Hillman
  • 170. Thank You ! rosenberg@sfu.ca! hillman@sfu.ca ! THANK YOU IT Services - Jeremy Rosenberg / Steve Hillman