Home
/
Middleware
/
Oracle Web Services Manager
1/8
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New in This Guide
New and Changed Features for Release 12
c
(12.2.1)
New and Changed Features for Release 12
c
(12.1.3)
New and Changed Features for Release 12
c
(12.1.2)
Other Significant Changes in this Book for Release 12
c
(12.1.2)
1
Introducing Oracle Web Services Manager
1.1
Overview of Oracle Web Services Manager
1.2
Overview of Oracle Web Services Manager Features
1.3
Overview of Oracle Web Service Manager Architecture
2
Understanding Web Service Security Concepts
2.1
Overview of Web Service Security
2.2
Understanding Transport-level and Application-level Security
2.3
Understanding Authentication
2.3.1
About Digest Authentication
2.4
Understanding Authorization
2.5
Understanding Message Protection
2.5.1
About Message Encryption
2.5.2
About Message Signing (XML Signature)
2.6
Understanding the Roles of Keys and Certificates in Security and Authentication
2.6.1
Overview of Private Keys and Certificates
2.6.2
Understanding How Different Security Policies Use Private Keys and Certificates
2.6.2.1
Overview of Message Protection Policy Types
2.6.2.2
Overview of Authentication Token Policy Types
2.6.3
Understanding How OWSM Locates Keystore and Key Passwords for the JKS Keystore
2.6.4
About Private Keys and Certificates Configuration for SSL Policies
2.6.5
About Setting up Private Keys and Certificates for Message Protection Policies
2.6.5.1
Understanding Sample Basic Configuration
2.6.5.2
About Advanced Setup Considerations
2.7
Understanding How OWSM Uses the Credential Store
2.8
Understanding Security Policies
2.9
Understanding Security Tokens
2.9.1
About the Username Token
2.9.2
About the X.509 Certificate
2.9.3
About the Kerberos Token
2.9.4
About the SAML Token
2.10
Understanding Secure Attachments
2.11
Understanding Secure Conversation
2.11.1
Understanding When to Use WS-SecureConversation
2.11.1.1
About WS-SecureConversation With WS-ReliableMessaging
2.11.2
Overview of WS-SecureConversation Architecture
2.11.3
Understanding When to Use WS-SecureConversation
2.11.4
Understanding When To Use Re-Authentication
2.11.5
About Setting the Bootstrap Mode
2.11.6
An Overview of Persistence
2.11.6.1
About Default Domain-Wide Persistence Implementation
2.11.6.2
About Client- and Web Service-Specific Persistence Implementation
2.12
Understanding the Kerberos Protocol
2.12.1
Understanding Credential Delegation in Kerberos
2.12.2
Understanding Kerberos and SPNEGO
2.12.3
About Kerberos and WS-SecureConversation Derived Keys
2.13
Understanding Web Services Addressing
2.14
Understanding Web Services Trust
2.15
Understanding Web Services ReliableMessaging
2.16
Understanding Fine-Grained Authorization Using Oracle Entitlements Server
2.16.1
About Prerequisite OES Reading
2.16.2
Understanding OES Integration: The Big Picture
2.16.2.1
Understanding Data Masking
2.16.2.2
About XACML Obligations
2.16.2.3
Understanding OES Fine- and Coarse-Grained Authorization
2.16.3
About OWSM OES Policies
2.16.4
Understanding Resource Mapping and Naming
2.16.4.1
Understanding an Example of OES Policies
2.16.5
Understanding How Attributes Are Processed
2.16.6
About the Guard Element
2.17
Understanding Personally Identifiable Information
2.17.1
Overview of PII Data
2.17.1.1
About the PII Security Policy
2.17.2
About PII Policy XPath Expressions
2.17.3
Understanding When to Use the PII Policy
2.17.3.1
Understanding the Single SOA Composite Use Case
2.17.3.2
Understanding the PII at the JCA Binding Use Case
2.17.4
Understanding Who Should Have Access to the PII
2.17.5
About Additional Considerations for Unmarshalling
2.18
Understanding OAuth 2.0 for REST and SOAP Services and Clients
2.19
Understanding REST APIs for Managing Credentials and Keystores
3
Understanding the OWSM Policy Framework
3.1
Overview of OWSM Policy Framework
3.1.1
About OWSM Policy Framework Components
3.1.2
Understanding OWSM Agent and Policy Manager Interaction
3.1.3
About OWSM Agent and Policy Manager Characteristics
3.1.4
Understanding the OWSM Agent and Policy Manager Request Flow
3.1.5
About OWSM Configuration Artifacts
3.2
Understanding Web Service Policies
3.3
Overview of Building Web Service Policies Using Policy Assertions
3.3.1
About Defining Multiple Policy Alternatives (OR Groups)
3.4
Understanding Policy Subjects
3.5
Overview of Attaching Policies to Policy Subjects
3.5.1
About Direct Policy Attachment
3.5.2
Understanding Global Policy Attachments Using Policy Sets
3.5.2.1
About Subject Types and Scope of Resources
3.5.2.2
Understanding Typical Uses for Global Policy Attachments
3.6
Understanding How Policies are Executed
3.7
About OWSM Predefined Policies and Assertion Templates
3.8
About Overriding the Security Policy Configuration
3.9
About Recommended Naming Conventions for Documents Created in WSM Repository
A
Web Service Security Standards
Scripting on this page enhances content navigation, but does not change the content in any way.