Diff for How to secure your web services using Oracle WSM

17. April 2009 - 15:10 by anusonia17. April 2009 - 15:33 by anusonia

Understand the basics of enterprise Security – Web Services, SSO, and Token Service

Changes to Description
 
Web services (WS) provide a simple, standardized way to connect
 
Web services (WS) provide a simple, standardized way to connect
 
applications over the Internet, however they require management of
 
applications over the Internet, however they require management of
-
security and other run-time operations to work effectively. Oracle Web
+
security and other run-time operations to work effectively. <a href="http://www.packtpub.com/oracle-web-services-manager/book" target="_blank">Oracle Web
-
Services Manager is a software solution for managing the operations of
+
Services Manager</a> is a software solution for managing the operations of
 
web services and the interactions between these services.
 
web services and the interactions between these services.
 
</p>
 
</p>
Current revision:

How to secure your web services using Oracle WSM

Web services (WS) provide a simple, standardized way to connect applications over the Internet, however they require management of security and other run-time operations to work effectively. Oracle Web Services Manager is a software solution for managing the operations of web services and the interactions between these services.

The following tutorial explains in detail how to digitally sign and verify messages in web services using Oracle Web Services Manager.

This tutorial is an extract from the book titled Oracle Web Services Manager. This book explains the business reasons why web services security is required and gives an architectural overview of WS Security for an enterprise. It then provides details about the Oracle Web Service Manager product and how it can be leveraged to address the key security issues of Confidentiality, Integrity, Authentication, and Authorization. Whilst addressing these key issues, the book describes them fully with examples. It ends with a couple of unique features: one is the various options available for a successful deployment and the other is an explanation, in depth, of how the security components work.

XML.org Focus Areas: BPEL | DITA | ebXML | IDtrust | OpenDocument | SAML | UBL | UDDI
OASIS sites: OASIS | Cover Pages | XML.org | AMQP | CGM Open | eGov | Emergency | IDtrust | LegalXML | Open CSA | OSLC | WS-I