SlideShare a Scribd company logo
ICTA Technology Meetup 03

Enterprise Security
(Part 01)

By Crishantha Nanayakkara
Agenda
●

Functional Aspects of Security

●

An Introduction to PKI

●

An Introduction to SOA Security

●

Securing SOAP Web Services

●

An Introduction to Apache Rampart

●

Security Patterns with Apache Rampart

●

Mediating SOAP Web Services via ESB
2
Functional Aspects 
of Security

3
Authentication
Confidentiality
Integrity
Non­Repudiation
4
An Introduction to 
PKI

5
PKI enables parties to an e­commerce 
transaction to identify one another by 
providing authentication with digital 
certificates, and allows reliable business 
communications by providing confidentiality 
through the use of encryption, and 
authentication, data integrity and a 
reasonable basis for nonrepudiation through 
the use of digital signatures.
(Resource ­ WebTrust)
6
Ensuring
Authentication

7
–

Transport Layer  
●

–

SSL certificates

HTTP Layer / Message Layer – 
●

●

–

HTTP Basic Authentication
UserNameTokens

Application Layer – 
●

Form based Authentication 

8
Ensuring
Confidentiality

9
Public Key Encryption

10
Ensuring
Non Repudiation

11
By maintaing key pairs at both ends with 2­way 
authentication can ensure non­repudiation

12
Ensuring
Integrity

13
Digital Signatures
(Signing Process)

14
Digital Signatures
(Verification Process)

Step 1

Step 2

15
Digital Certificates
A digital certificate is basically a wrapper around a 
public key, which includes identifying information 
for the party owning that key. This wrapped body is 
then signed by a trusted third party, and the 
signature is included in the certificate. The trusted 
third party vouches for the public key and 
identifying information by issuing the certificate with 
its signature.
16
Creating Digital Certificates
●

Step 1: Creating the “public­private” key­pair
keytool  ­genkey  ­keyalg  RSA  ­keysize  2048  ­keystore 
crish_keystore.jks ­alias certificatekey

At this stage your certificate is owned and issued by you. 
However, a certificate issued by you will not be trusted by 
other organizations that does business with you electronically. 
Therefore your certificate would need to be “signed” by a recognized
certification authority.

17
Creating SSL Digital Certificates
●

Step 2: Retrieve the contents of the keystore
keytool ­list ­v ­keystore crish_keystore.jks ­storepass password
crishantha@crishantha-laptop$ keytool -list -v -keystore crish_keystore.jks -storepass password
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 1 entry
Alias name: certificatekey
Creation date: Mar 10, 2012
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=Crishantha Nanayakkara, OU=ICTA, O=ICTA, L=Colombo, ST=Western, C=SL
Issuer: CN=Crishantha Nanayakkara, OU=ICTA, O=ICTA, L=Colombo, ST=Western, C=SL
Serial number: 4f5b98a6
Valid from: Sat Mar 10 23:38:38 IST 2012 until: Fri Jun 08 23:38:38 IST 2012
Certificate fingerprints:
MD5: D0:56:A2:FE:EF:B0:CE:08:A6:28:FF:2C:2C:33:D7:4D
SHA1: 1D:77:C2:42:FD:AC:FA:32:7C:2B:D1:FF:70:95:0A:A2:66:4C:CE:27
Signature algorithm name: SHA1withRSA
Version: 3

18
Creating Digital Certificates
●

Step  3:  Generating  the  Certification  Service 
Request (CSR)
keytool  ­certreq  ­alias  certificatekey  ­keystore  crish_keystore.jks 
­file certificate_request.csr
crishantha@crishantha-laptop:~/test$ cat certificate_request.csr
-----BEGIN NEW CERTIFICATE REQUEST----MIICtTCCAZ0CAQAwcDELMAkGA1UEBhMCU0wxEDAOBgNVBAgTB1dlc3Rlcm4xEDAOBgNVBAcTB0Nv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-----END NEW CERTIFICATE REQUEST-----

19
Creating Digital Certificates
●

●

Step  4:  Send  the  generated  CSR  to  the 
Certification Authority (CA)
Step 5: CA will send you two things
–

CA root certificate

–

CA signed certificate
Both of these need to be imported to the keystore of 
yours

20
Creating Digital Certificates
●

Step 6: Importing the CA root certificate
keytool  ­import  ­alias  root­ca  ­v  ­trustcacerts    ­keystore 
crish_keystore.jks ­file ca.der

●

Step 7: Importing the CA signed certificate
keytool ­import ­alias certificatekey ­file signed_ca.der  ­keystore 
crish_keystore.jks

●

Step 8: Retrieve the contents of the keystore
keytool ­list ­v ­keystore crish_keystore.jks ­storepass password
21
Keystore and Truststore

22
PKI
Trust Models

23
PKI Trust Models
(Rooted Heirarchy Model)

24
PKI Trust Models
(Rooted Heirarchy Model)

The subordinate CAs (intermediate CAs and 
Issuing CAs) are certified by the parent CAs. 
The parent CAs are usually an intermediate 
CA or a Root CA.

25
PKI Trust Models

(Network/ Cross Certification Model)

26
PKI Trust Models

(Network/ Cross Certification Model)

Root CA can cross certify the other Root CA by 
just importing the public key certificate of the 
other Root CA. This relationship can be 
unidirectional or bidirectional

27
So what is National 
CA?

28
An Introduction to
SOA Security

29
SOA Security
●

SOAP Web Services
–

●

Transport Level and Message Level (Using 
WS­Security)

REST Web Services
–

Transport Level and OAuth

30
Securing SOAP 
Web Services

31
Securing a SOAP web service
with HTTPS

Client
Client

Server Public Key

Secured using
HTTPS

Web Service
Web Service

Server Certificate

32
Securing a SOAP 
web service
with WS­Security

33
WS­Security 
An Introduction

The standard framework for including XML­
formatted security data into SOAP messages 
is WS­Security

34
WS­Security 
An Introduction

It basically provides a XML based Abstraction 
Layer for the above established cryptography 
techniques.

35
WS­Security 
An Introduction

36
WS­Security 
SOAP

37
Apache Rampart 
An Introduction

●

●

●

Apache Rampart is the security module of 
Apache Axis2
It provides the WS­Security functionality 
to Axis2 web services and their clients
Mainly has 3 components
–

Rampart core

–

Rampart policy

–

Rampart trust

38
Apache Rampart 
An Introduction

●

●

●

Rampart Core: This drives security enforcement and 
validation on SOAP messages. Implements WS­Security 
and WS­SecureConversation.
Rampart Policy: This implements WS­SecurityPolicy 
specification, which is an extension to WS­Policy, Apache 
Neethi implements the WS­Policy specification.
Rampart Trust: This implements the WS­Trust 
specification. Basically this provides a framework to 
issue, cancel, renew and validate security tokens. For 
example STS (Security Token Service) tokens.
39
Apache Rampart 
An Introduction

40
Securing a SOAP web service
Transport level with HTTPS

Client
Client

Server Public Key

Secured using
HTTPS

Web Service
Web Service

Server Key Pair

41
Securing a SOAP web service

UserNameToken with Transport level HTTPS
Client
Client

Server Public Key

UsernameToken

Secured using
HTTPS
+
Authenticated with
UserNameToken

Web Service
Web Service

Server Key Pair

Call back Handler

42
The Callback Handler

43
The Service Policy

44
Securing a SOAP web service
Message Level Security – Asymmetric (Sign)
Client
Client

Client Key Pair

Callback Handler

Message is
Signed

Web Service
Web Service

Server Key Pair

Call back Handler

45
Service Policy (Sign only)

46
Service Policy (Sign) cont..

47
The Callback Handler



48
Securing a SOAP web service
Message Level Security ­ Asymmetric

49
Securing a SOAP web service
Message Level Security – Asymmetric 
(SignEncrypt)
Client
Client

Client Key Pair

Callback Handler

Message is
Signed and Encrypted

Web Service
Web Service

Server Key Pair

Call back Handler

50
Service Policy (SignEncrypt)

51
The Callback Handler

52
Ensuring Interoperablity

53
Mediating Secure 
Web Services via
ESB

54
End to End Security
with a ”Pass Through Proxy”

55
End to End Security
 with a ”Secure Proxy”

56
57

More Related Content

PDF
[WSO2Con EU 2017] WHO CARES? A WSO2 Cloud Oriented Reference Architecture for...
PPT
iPlanet presentation
PDF
WSO2 Enterprise Integrator Deployment Patterns
PDF
The Role of Data Virtualization in an API Economy
PDF
Cloud Computing and Service oriented Architecture
PDF
Hybrid integration platform reference architecture
PDF
Developing, Administering and Debugging with WSO2 Enterprise Integrator
PDF
Observability for Integration Using WSO2 Enterprise Integrator
[WSO2Con EU 2017] WHO CARES? A WSO2 Cloud Oriented Reference Architecture for...
iPlanet presentation
WSO2 Enterprise Integrator Deployment Patterns
The Role of Data Virtualization in an API Economy
Cloud Computing and Service oriented Architecture
Hybrid integration platform reference architecture
Developing, Administering and Debugging with WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise Integrator

What's hot (20)

PDF
SSO with the WSO2 Identity Server
PDF
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
PDF
Integration Solution Patterns
PPTX
SOA Security
PDF
Deep-dive into APIs in a Microservice Architecture
PPTX
Architecture blockchain-azure
PDF
Service mesh in Microservice World to Manage end to end service communications
PDF
Microservice architecture-api-gateway-considerations
PDF
[WSO2Con EU 2017] Extending Your Enterprise Integration Patterns Beyond ESBs
PPTX
API Security in a Microservice Architecture
PDF
Anypoint platform cloud
PPTX
Intro to Microservices Architecture
PPT
SOA Security - So What?
PDF
Microservice Architecture
PDF
Heterogeneous Enterprise and Cloud Systems
PDF
[WSO2Con EU 2017] Creating Composite Services Using Ballerina
PPTX
Web Services and the Service-Oriented Architecture
PDF
The Complete Guide to Service Mesh
PPT
EAI (Integration) and Mulesoft
PDF
SOA Integration Blueprint with Oracle SOA Suite
SSO with the WSO2 Identity Server
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Integration Solution Patterns
SOA Security
Deep-dive into APIs in a Microservice Architecture
Architecture blockchain-azure
Service mesh in Microservice World to Manage end to end service communications
Microservice architecture-api-gateway-considerations
[WSO2Con EU 2017] Extending Your Enterprise Integration Patterns Beyond ESBs
API Security in a Microservice Architecture
Anypoint platform cloud
Intro to Microservices Architecture
SOA Security - So What?
Microservice Architecture
Heterogeneous Enterprise and Cloud Systems
[WSO2Con EU 2017] Creating Composite Services Using Ballerina
Web Services and the Service-Oriented Architecture
The Complete Guide to Service Mesh
EAI (Integration) and Mulesoft
SOA Integration Blueprint with Oracle SOA Suite
Ad

Similar to ICTA Technology Meetup 03 - SOA Security (20)

PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PPT
ch17.ppt
PDF
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
PDF
Narrative of digital signature technology and moving forward
PDF
eMCA Suite
PPTX
SignSDK_Architecture_Developer_Presentation.pptx
PDF
electronic_payment_system_in_korea_eng
PPT
Presentation on Public Key Infrastructure x.509
PDF
Pki and OpenSSL
PDF
PKI Industry growth in Bangladesh
PPTX
Voip security
PDF
Digital certificates & its importance
PPT
ch1 eriht eriotery erogyteip ergy7.ppt
PPT
chap17 computer and programming in cpp.ppt
PPT
Public Key Infrastructure and Application_Applications.ppt
PPT
Implementing Public-Key-Infrastructures
PPT
Chapter 6 Presentation
PPTX
Public Key Infrastructure (PKI) in Action
PPTX
Public Key Infrastructure (PKI) in Action
PPTX
Digital signature and certificate authority
Ch12 Cryptographic Protocols and Public Key Infrastructure
ch17.ppt
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
Narrative of digital signature technology and moving forward
eMCA Suite
SignSDK_Architecture_Developer_Presentation.pptx
electronic_payment_system_in_korea_eng
Presentation on Public Key Infrastructure x.509
Pki and OpenSSL
PKI Industry growth in Bangladesh
Voip security
Digital certificates & its importance
ch1 eriht eriotery erogyteip ergy7.ppt
chap17 computer and programming in cpp.ppt
Public Key Infrastructure and Application_Applications.ppt
Implementing Public-Key-Infrastructures
Chapter 6 Presentation
Public Key Infrastructure (PKI) in Action
Public Key Infrastructure (PKI) in Action
Digital signature and certificate authority
Ad

More from Crishantha Nanayakkara (20)

PDF
Sri Lanka Government Enterprise Architecture
PDF
Application Deployement Strategies
PDF
Azure for AWS Developers
PDF
Enterprise Integration in Cloud Native Microservices Architectures
PDF
AWS Systems Manager
PDF
AWS Big Data Landscape
PDF
1BT_Designing_Microservices
PDF
1BT_Tech_Talk_AWS_Cross_Account_Access
PDF
AWS Security Hub
PDF
Resiilient Architectures on AWS
PDF
Reactive Microservices
PDF
Expectaions in IT industry
PDF
Towards Cloud Enabled Data Intensive Digital Transformation
PDF
Container Architecture
PDF
Domain Driven Design and Hexagonal Architecture
PDF
Microservices
PDF
Enterprise architecture in the current e-Government context in Sri Lanka
PDF
Modern Trends in IT
PDF
ICTA Meetup 12 - Message Brokers
PDF
ICTA Meetup 11 - Big Data
Sri Lanka Government Enterprise Architecture
Application Deployement Strategies
Azure for AWS Developers
Enterprise Integration in Cloud Native Microservices Architectures
AWS Systems Manager
AWS Big Data Landscape
1BT_Designing_Microservices
1BT_Tech_Talk_AWS_Cross_Account_Access
AWS Security Hub
Resiilient Architectures on AWS
Reactive Microservices
Expectaions in IT industry
Towards Cloud Enabled Data Intensive Digital Transformation
Container Architecture
Domain Driven Design and Hexagonal Architecture
Microservices
Enterprise architecture in the current e-Government context in Sri Lanka
Modern Trends in IT
ICTA Meetup 12 - Message Brokers
ICTA Meetup 11 - Big Data

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Electronic commerce courselecture one. Pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Modernizing your data center with Dell and AMD
Electronic commerce courselecture one. Pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Diabetes mellitus diagnosis method based random forest with bat algorithm
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Understanding_Digital_Forensics_Presentation.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
MYSQL Presentation for SQL database connectivity

ICTA Technology Meetup 03 - SOA Security