WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message confidentiality, and single message authentication. These mechanisms can be used to accommodate a wide variety of security models and encryption technologies. WS-Security also provides a general-purpose mechanism for associating security tokens with messages. No specific type of security token is required by WS-Security. It is designed to be extensible (e.g. support multiple security token formats). For example, a client might provide proof of identity and proof that they have a particular business certification. Additionally, WS-Security describes how to encode binary security tokens. Specifically, the specification describes how to encode X.509 certificates and Kerberos tickets as well as how to include opaque encrypted keys. It also includes extensibility mechanisms that can be used to further describe the characteristics of the credentials that are included with a message. Composable Architecture By using the SOAP extensibility model, SOAP-based specifications are designed to be composed with each other to provide a rich messaging environment. By itself, WS-Security does not ensure security nor does it provide a complete security solution. WS-Security is a building block that is used in conjunction with other Web service and application-specific protocols to accommodate a wide variety of security models and encryption technologies. Implementing WS-Security does not mean that an application cannot be attacked or that the security cannot be compromised. Status of this Document WS-Security and related specifications are provided as-is and for review and evaluation only. IBM and Microsoft and VeriSign hope to solicit your contributions and suggestions in the near future. IBM and Microsoft and Versign make no warrantees or representations regarding the specifications in any manner whatsoever.
[1]
John T. Kohl,et al.
The Kerberos Network Authentication Service (V5
,
2004
.
[2]
Scott O. Bradner,et al.
Key words for use in RFCs to Indicate Requirement Levels
,
1997,
RFC.
[3]
Roy T. Fielding,et al.
Uniform Resource Identifiers (URI): Generic Syntax
,
1998,
RFC.
[4]
Arvind Malhotra,et al.
Xml schema part 2: datatypes
,
1999
.
[5]
Robert W. Shirey,et al.
Internet Security Glossary
,
2000,
RFC.
[6]
Stefan Santesson,et al.
Internet X.509 Public Key Infrastructure Qualified Certificates Profile
,
2001,
RFC.
[7]
Allen Brown.
SOAP Security Extensions: Digital Signature
,
2001
.
[8]
D. Eastlake,et al.
XML Encryption Syntax and Processing
,
2003
.