top of page

Security and SOA

  • Writer: Mark Skilton
    Mark Skilton
  • Nov 8, 2005
  • 3 min read

Security and SOA

INTRODUCTION

Security in orgnisations

Security is defined within and outside the organisation.

Outside the organisation

<>••••••• /

Security Technology

Specifically the technology you need to look at that I have used or put into proposals

In the past are:

- Oblix suite from Oracle - in particular the Oracle COREid solution supports:

Federated IDs using Liberty SAML 1.0 og 1.1

Delegated adminstration rights

Resource based URL and methd used control

Password controls

SSO possible via NetLogin (Active directory and LDAP)

Supports X.509 certificates

Supports delegation of access rights

Support Sarbanes Oxley Act 404

Supports external access directories RADIUS and LDAP + additional authentication plugins needed

- The BEA Aqualogic Security product is not available in Europe but the BEA Security framework is and supports:

Weblogic server supports SAML

Uses BEA Aqualogic data Services (ALDSP) for data level security

Uses SPNEGO for SSO

Supports X.509

Weblogic security is built ontop of standard JAAS architecture with auth checks for all J2EE and WS components

Used Weblogic Portal built in LDAP

Weblogic Security infra contains auditing and only input to SOX 404.

- SunOne LDAP

- DataPower - they have recently been taken over by IBM but see their XS40 XML Security router solution - its excellent.

- Intalio can build links to LDAP in the process but this is a high overhead performance issue possibly.

I would not recommend you do this with BPMS, it a common trap in focusing on enterprise packages and processes

Rather than services.

SAP may have a Web services management capability or you need to investgate further a 3rd party Registry and control system

Wth SAP XI consultants.

Performance will be a big issue - see the datapower and Oblix / COREid info at their web sites etc...

Example Vendor Security view and SOA

SECURITY SOLUTION IN SOA

I think you need to have the BP Security solution defined in at least 6 levels:

1. Field Level XML security

- use XML encrpton and Digital signatures at message or element level. - use WS-Security

2. Web services access control

- use SAML/ Liberty, XACML, WS-Security for new systems - see if they support it

- use LDAP/ Radius or SSO for old systems to control acess

3. Data Validation

- Use to vaidate the XML schema to guard against Denial of service (DoS) attacks

- this is Firewall filtering of messages schemas

4. Application access

- SAP Portal level - SSO with compliance through the apps - to be defined.

5. Distributed Security services

- UDDI security

- Federated Security certificates for 3rd parties e.g. X.509 certificates held by a thrid party.

6. a Security policy that states all application interactions and screens via the Portal SSO

And all integration messages with WS-Security framework. I know from my time at BP I was not allowed

To access the Databases direct in ISP for example as this violated BP IT from BP germany. It was seen

As a block at the time but its actually very important and should be addressed upfront early one.

From an end to end process view point you merntioned I think the security would be via the Portal access

And the Services integration as above. That is the security layer is maining in the Middleware messaging control

And access controls.

Overall my experience tells me that security must be on every Technology stack level. I include a couple of slides one from

My presentation recently and one from AmberPoint a Vendor in partnership with BEA.

Security and SOA

I feel some of your wording is a little confused around processes and services below. The key message is that a Security Platform

needs layers of security management from fine grained to coarse grained. E.g. HTTP security, Message security (WS-Security),

Role based security, SSO and IAM layers in the Portal and apps etc.

The other key point is that Security is built into a process - Sarbanes-Oxely etc are are key issues. You should be designing security into

The process. Its not a question of processes or services.

I strongly recommend you get hold of the BP Security policy for business and IT. This must exist somewhere. BP should also have a data protection

Officer and a Security department in the business or IT. You must get hold of the BP Policy documents on security to ensure compliance.

 
 
 

Comments


Featured Posts
Recent Posts
Archive
Search By Tags
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square

Mark Skilton    Copyright 2019  ©

  • White Twitter Icon
  • White Facebook Icon
  • White LinkedIn Icon
  • White YouTube Icon
  • White LinkedIn Icon
bottom of page