- Asymmetric Binding WS-Policies
-
WS-Policy Name Description AsymmetricBinding with Encrypted UsernameToken The service exposes an AsymmetricBindingwhere the client and server use their respective X.509v3 tokens to sign and encrypt the message. An encryptedUsernameTokenwith hash password must be included in all messages from the client to the server.AsymmetricBinding with SAML 1.1 (Sender Vouches) Assertion and Signed Supporting Token The service is secured with an AsymmetricBindingwhere the client and server use their respective X.509v3 certificates to secure the message. The client must include a SAML 1.1 Assertion (sender vouches) in all messages it sends to the service.AsymmetricBinding with Signed and Encrypted UsernameToken The service exposes an AsymmetricBindingwhere the client and server use their respective X.509v3 tokens to sign and encrypt the message. A signed and encryptedUsernameTokenwith plaintext password must be included in all messages from the client to the service.AsymmetricBinding with WSS 1.0 Mutual Authentication with X509 Certificates, Sign, Encrypt The service exposes an AsymmetricBindinginterface where the client and server use their respective X.509v3 certificates for mutual authentication, signing, and encrypting.AsymmetricBinding with X509v3 Tokens The service exposes an AsymmetricBindingwhere the client and server use their respective X.509v3 tokens to sign and encrypt the message.
- Message Level WS-Policies
-
WS-Policy Name Description Encrypt SOAP Body The SOAP body must be encrypted. Sign and Encrypt SOAP Body The SOAP body must be signed and encrypted. Sign SOAP Body The SOAP body must be signed.
- Oracle Web Services Manager WS-Policies
-
WS-Policy Name Description WS-Security 1.0 Mutual Auth with Certificates AsymmetricBindingwhere the client and server use their respective X.509v3 certificates to secure the message.WS-Security 1.0 SAML with Certificates AsymmetricBindingwith SAML assertion asSignedSupportingToken.WS-Security 1.0 Username with Certificates AsymmetricBindingwith WS-SecurityUsernameTokenasSignedSupportingToken.WS-Security 1.1 Mutual Auth with Certificates SymmetricBindingwhere the same X.509v3 certificate is used to secure all messages between the client and the service.WS-Security 1.1 Username with Certificates SymmetricBindingwith a WS-SecurityUsernameTokenas aSignedSupportingToken. The message is endorsed with an asymmetricSignature.WS-Security SAML Token Over SSL TransportBindingwith a SAML Token as aSupportingToken.WS-Security UsernameToken Over SSL TransportBindingwith a WS-SecurityUsernameTokenas aSupportingToken.
- Simple WS-Policies
-
WS-Policy Name Description SAML 1.1 Bearer The client must include a SAML 1.1 Assertion(bearer) representing the Requestor in all messages from the client to the service.Username SupportingToken Hash Password The client must authenticate with a WS-Security SAML UsernameTokenwith hash password.Username SupportingToken No Password The client must authenticate with a WS-Security UsernameTokenwithout a password.Username SupportingToken Plaintext Password The client must authenticate with a WS-Security UsernameTokenwith a plaintext password.
- Symmetric Binding WS-Policies
-
WS-Policy Name Description SymmetricBinding with SAML 2.0 (Sender Vouches) Assertion and Endorsing Supporting Token The service exposes a SymmetricBindingthat requires the client to send a SAML 2.0Assertionto the service. An X.509v3 token is also included in all messages from the client to the service as anEndorsingSupportingToken.SymmetricBinding with Signed and Encrypted UsernameToken The service uses a SymmetricBindingwhere the client and service use the same X.509v3 token to sign and encrypt the message. A signed and encryptedUsernameTokenwith plaintext password must be included in all messages from the client to the service. The policy uses WSS SOAP Message Security 1.1 options.SymmetricBinding with WSS 1.1 Anonymous Authentication with X.509v3, Sign, Encrypt The service is secured by a SymmetricBindingwhere the same X.509v3 certificate is used to secure all messages between the client and the service. Derived Keys are used for signing and encrypting and Signature Confirmation is required by the Policy.SymmetricBinding with WSS 1.1 Mutual Authentication with X.509v3, Sign, Encrypt The service exposes a SymmetricBindingwhere the same X.509v3 certificate is used to secure all messages between the client and the service. The client also endorses the primary message signature using another X.509v3 certificate.
- Transport Binding WS-Policies
-
WS-Policy Name Description SAML 1.1 Holder-of-Key over SSL The client includes a SAML 1.1 Assertion(sender vouches) in all messages from the client to the service. The client provides an endorsing signature to prove that it is the holder-of-key. ATransportBindingis used to sign and encrypt the message.SAML 1.1 Sender-Vouches over SSL The client includes a SAML 1.1 Assertion(sender vouches) on behalf of the Requestor to all messages from the client to the service. The service uses aTransportBindingto ensure that all messages are signed and encrypted.SAML 2.0 Holder-of-Key over SSL The client includes a SAML 2.0 Assertion(sender vouches) in all messages from the client to the service. The client provides an endorsing signature to prove that it is the holder-of-key. ATransportBindingis used to sign and encrypt the message.SAML 2.0 Sender-Vouches over SSL The client includes a SAML 2.0 Assertion (sender vouches) on behalf of the Requestor to all messages from the client to the service. The service uses a TransportBindingto ensure that all messages are signed and encrypted.SSL Transport Binding The service is secured by SSL (HTTPS). Username Token over SSL with no Timestamp The service is secured over SSL (HTTPS), the client is authenticated with a UsernameToken, and no timestamp should be included in the Security header.Username Token over SSL with Timestamp The service is secured over SSL (HTTPS), the client is authenticated with a UsernameToken. The Security header contains a timestamp.

