Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Web Services Securityservices security, or  or to be more precise, SOAP message security , identifies and provides solutions for general computer security threats as well as threats unique to Web services. WSO2 supports WS Security, WS-Policy and WS-Security Policy specifications. These specifications define a behavioral model for Web services. A Since a requirement for one Web service may not be valid for another. Therefore, , the Data Services Server also helps defining service-specific requirements might be necessary.Security functionality is provided by the Security Management feature which is bundled by default in the Service Management feature of the WSO2 feature repository. The Security Management feature makes it easy to secure your Web Services by providing 16 pre-definedsecurity.

It provides 16 predefined, commonly-used security scenarios. All you have to do is to apply the required security scenario into your service with a few clicks, using your service dashboard. These security features are disabled by default. You also have the option to use through the service's dashboard. You can also define a custom security policy if needed.

The following actions are available:

...

Understanding . Understanding the exact security requirements is the first step in planning to secure Web services. For example, consider Consider what security aspects are important to your service; , whether it is the integrity, confidentiality, or both. Follow the instructions below to enable a security feature.

1. Log on to the product's management console and select "List" under "Services."

Image Removed

2. The "Deployed Services" screen appears. Click on the service name for which you want to add security features. For example,

Image Removed

3. The "Service Dashboard" page appears. Click "Security" in the "Quality of Service Configuration" panel.

Image Removed

4. The "Security for the Service" page appears. Click "Yes" in the "Enable Security" list. This action will enable security for the service.

Image Removed

5. A   

Configuring security features

Security features are disabled in services by default. The following steps explain how to enable and configure them.

  1. Log in to the management console and select Services > List under the Main menu.  
  2. From the Deployed Services page that appears, click the service to which you want to enable security.  
  3. The service's dashboard opens. Click Security from the Quality of Service Configuration panel.Image Added
  4. Enable security for the service by selecting Yes .
    Image Added 
  5. Enable the options you require from the list of 16 default security scenarios

...

  1. that appears.  You can

...

  1. read more details of the scenarios by clicking the browse icon in front of them.

Image Removed

 

...

Use the Image Removed icon to see the scenarios in detail.

...

  1. Image Added
    You can read more information about each security scenario by clicking on the icon next to each. We have also given a graphical view of each scenario in the next section.

    In addition to the default security scenarios, you can also

...

  1. refer to a custom security policy

...

  1. that is stored in Configuration Registry or Governance Registry.

    Image Modified

...

 

...

Clicking either the "Configuration Registry" or "Governance Registry" link will open the respective "navigation tree" from which you can select a suitable policy path.

6. Select the suitable security features from the 16 default security scenarios and/or the custom security policy. Then click "Next." The "Activate Security" page appears. You can configure the security features on this page. The configurations depend on your previous selections.

...

  1.  

  2. Click Next to open the Activate Security page, using which you can configure the security features selected previously. 

    If you selected a default security scenario, this page

...

  1. shows you the user groups, key stores etc. according to the selected security scenario.

...

  1. For example,

    • In a default scenario, if you

...

    • select a policy that includes Username Token, you

...

    • get the User Group panel to choose the users who are allowed to access the service

...

    • In a default scenario, if you have selected a policy that requires signing or encryption, the

...

    • Trusted Key Stores

...

    • and

...

    • Private Key Store

...

    • panels appear.

...

Image Removed

 

...

    If you refer to a custom security policy from Registry,

...

  1. this page shows all options on user groups and key stores from which you can select the ones relevant to your policy. Even if you select irrelevant options, they will not be used at runtime.

The default security scenarios

The topics below explain the 16 default security scenarios provided by WSO2.

Table of Contents
maxLevel4
minLevel4

1. UsernameToken

Image Added

2. Non-repudiation

Image Added

3. Integrity

Image Added

4. Confidentiality

Image Added

5. Sign and encrypt - X509 Authentication

Image Added

6. Sign and Encrypt - Anonymous clients

Image Added

7. Encrypt only - Username Token Authentication

Image Added

8. Sign and Encrypt - Username Token Authentication

Image Added

9. SecureConversation - Sign only - Service as STS - Bootstrap policy - Sign and Encrypt , X509 Authentication

Image Added

10. SecureConversation - Sign Only - Service as STS - Bootstrap policy - Sign and Encrypt , Anonymous clients

Image Added

11. SecureConversation - Sign and Encrypt - Service as STS - Bootstrap policy - Sign and Encrypt , X509 Authentication

Image Added

12. SecureConversation - Sign Only - Service as STS - Bootstrap policy - Sign and Encrypt , Anonymous clients

Image Added

13. SecureConversation - Sign and Encrypt - Service as STS - Bootstrap policy - Sign and Encrypt , Anonymous clients

Image Added

14. SecureConversation - Encrypt Only - Service as STS - Bootstrap policy - Sign and Encrypt , Username Token Authentication

Image Added

15. SecureConversation - Sign and Encrypt - Service as STS - Bootstrap policy - Sign and Encrypt , Username Token Authentication

Image Added

16. Kerberos Token-based Security

If you are applying apply security scenario 16 (Kerberos Token-based Security), you have to must associate your service with a service principal. Security scenario 16 is only applicable if you have a " Key Distribution Center (KDC) " and an " Authentication Server " in your environment. Commonly Ideally you can find KDC and an Authentication Server in a LDAP Directory server.

Two configuration files are used to specify Kerberos related parameters as follows.

  • krb5.conf - Includes KDC server details, encryption/decryption algorithms etc.
  • jaas.conf - Includes information relevant to authorization.

Usually, the The above files are located at in <PRODUCT_HOME>/repository/conf/security folder.

After selecting scenario 16, you will be asked to fill information about the service principal to associate the Web service with. There you need to You must specify the service principal name and password. The service principal must be already defined in the LDAP Directory server.

Following picture depicts this behavior:

Image Removed

7. Click"Finish" once you are done applying security features to your Web service. You will see the message "Security Applied Successfully". Click "OK" and you will be redirected to the Service Dashboard.

Image Removed

...

This function is used to disable active security features for a particular service. Follow the instructions below to disable a security feature.

1. Log on to the product's management console and select "List" under "Services."

Image Removed

2. The "Deployed Services" screen appears. Click "Security" in the "Quality of Service Configuration" panel. For example,

Image Removed

3. The "Service Dashboard" page appears. Click "Security" in the "Quality of Service Configuration" panel.

Image Removed

4. The "Security for Service" page appears. To disable security for the service, in the "Enable Security" list, click "No."

Image Removed

5. Confirm your request by clicking "Yes" and click "OK" in the "Security disabled successfully" message that follows.

Image Removed

Image Removed

Info
titleNote

All security scenarios are described in the wizard.

...

hiddentrue

...

.