‹ Back To Training

Securing Java Web Services

Timeline: 4 Days

Topics

Expand All › ‹ Collapse All

  • Why and what?
  • Characteristics of application security
  • Basic security mechanisms
  • Role-based authentication
  • Specifying security constraints
  • Programmatic security
  • Declarative security
  • Challenges and pitfalls
  • WS-I Basic Security Profile
  • Standards (WS-Security, wS-SecurityPolicy, SAML)
  • What it is
  • Asymmetric vs symmetric encryption
  • Signing messages and files
  • Encrypting files
  • What it is
  • Creating policies
  • Working with WS-SecurityPolicy
  • Attachment techniques
  • XML Security Tokens
  • Signed Security Tokens (X.509 and Kuberos)
  • Unsigned security tokens
  • Using interceptors