Introduction and Roadmap
Scope
Documentation Audience
Prerequisites for this Document
Guide to this Document
Related Information
Introduction to the Web Services Security Service Module
Overview of Web Services
Product Overview
Web Services Environment
Web Services Security Service Module
Client Trust Model
Deployment Model
Usage Model
Product Features
Optimizing Web Services Performance with Caches
Using the Web Services Client Authorization Cache
Installing the Web Services Authorization Cache
Authorization Cache Operation
Configuring the Client Authorization Cache
Using the Web Services SSM Identity Cache
Using Failover with a Web Services Client
Configuring a Web Services Client for Failover
Client Configuration File
FailOverManager API
getInstance()
getInstance(ArrayList failOverEndPoints,int noOfRetries, int httpConTimeOut)
setEndPointList (ArrayList endpoints)
getEndPointList()
Web Services Interfaces
Registry Service Interface
How the Registry Service Works
Registry Service Methods
Methods Common to All Web Services Interfaces
Authentication Service Interface
Authentication Process
Authentication Service Methods
isAssertionTokenSupported() Method
Authorization Service Interface
Authorization Process
Authorization Service Methods
isAuthenticationRequired() Method
Authorization Via XACML
Two-Way SSL Recommended
XACML Service Use Case
Sample XACML Client Application is Provided
Overview of XACML Context
Authentication and Valid Token Types
SOAP Binding of XACML Context
How the XACML Request Element is Interpreted in AquaLogic Enterprise Security
Mapping Other Subject and Attribute Elements to AquaLogic Enterprise Security Identity
Mapping Resources and the AquaLogic Enterprise Security Resource
Mapping Actions and the AquaLogic Enterprise Security Action
How the Environment Element is Interpreted in AquaLogic Enterprise Security
How the AquaLogic Enterprise Security XACML Response is Generated
WSDL Definition of the XACML Service
Auditing Service Interface
Auditing Process
Auditing Service Method
Role Mapping Service Interface
Role Mapping Process
Role Mapping Service Method
Credential Mapping Service Interface
Credential Mapping Process
Credential Mapping Method