wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Basic Security For SOAP Services

profile
Fatma Shaikh
Sep 20, 2022
0 Likes
0 Discussions
170 Reads

 BASIC SECURITY FOR SOAP SERVICES.

Simple Object Access Protocol (SOAP) is a network protocol for exchanging structured data between nodes. It uses XML format to transfer messages. It works on top of application layer protocols like HTML and SMTP for notations and transmission. SOAP allows processes to communicate throughout platforms, languages and operating systems, since protocols like HTTP are already installed on all platforms.

 

  • SOAP-Based Web Services.

SOAP is an API messaging protocol, and SOAP security is the strategy that prevents unauthorized access to SOAP messages and user information.    Web Standards Security (WS Security) is the main aspect of ensuring SOAP security.

SOAP was originally developed as a web service protocol, with an HTTP transport binding. At the same time, the designers of the protocol made sure that the SOAP specification was not dependent on any features of the underlying transport. As a result, SOAP can be used over a large number of transport protocols today, thus providing a consistent way of creating services over a number of different platforms. Such platforms include SMTP, FTP, and message queuing protocols. This flexibility does not come for free, though, since many transport semantics (such as session security, routing, acknowledgments, etc.) that are provided by the underlying transport protocols need to be replicated within the SOAP stack. This can lead to significant performance issues and replication of functionality at different layers.

 

  • WS-Security Overview.

SOAP is a messaging protocol, meaning that SOAP security is primarily concerned with preventing unauthorized access to these messages and to users’ information. The main thing used to accomplish this is WS (Web Standards) Security. 

WS Security is a set of principles that regulate the confidentiality and authentication procedures for SOAP messaging. WS Security-compliant measures include passengers, digital signatures and XML (Extensible Markup Language) encryption, among other things. XML encryption causes the data to be unreadable to unauthorized users. 

 

  • Protocol Design.

 

  • Usage of WS-Security.

 

WS-Security is only of limited use: it describes how security elements such as tokens and signatures can be incorporated into a SOAP message. It also provides limited instructions on how to protect portions of the message using these security elements.

 

  • Authentication With WS-Security.

 

A common use of WS-Security is for authentication of the incoming request. In order to process (an update to an account using a SOAP request), the bank service will need to verify the identity of the invoker (authentication) so that it can apply its authorization policies.

 

  • Attaching Policies to Web Services.

 

Authentication of a single request is achieved by providing the token within the security header. Since there are countless ways of doing this, the service needs to communicate to the client the type of acceptable tokens, acceptable configurations of these tokens, and how to protect them.

  • Example for a Web Service Definition Language for WS-Security.

An example given below shows a client talking to both a database and a web server at a time. In such cases, not all information can pass through the https protocol. This is where SOAP comes in action to overcome such obstacles by having the WS Security specification in place.

 


Comments ()


Sign in

Read Next

How can denial-of-service(Dos) attacks be prevented?

Blog banner

File system

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Os(Computer security threats)

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

How return on investment is defined in IT services

Blog banner

File management -disha parekh

Blog banner

Smitten Kitchen Keepers

Blog banner

Business Intelligence v/s Big Data

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Deadlock

Blog banner

I/O Management and Disk Scheduling

Blog banner

OS Evolution Achievements

Blog banner

Deadlock in Operating systems

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

IT security management

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Yoga in INDIA and ABROAD

Blog banner

File management

Blog banner

Self defence

Blog banner

Types of Big Data

Blog banner

The Evolution of Operating Systems

Blog banner

Memory Management in Operating System

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

MY FIRST BLOG?

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

virtual memory

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Network Forensics

Blog banner

Latest Email Marketing Techniques

Blog banner

File Systems in OS.

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Memory Management

Blog banner

Privacy LAWs in IT

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Disk Scheduling

Blog banner