Go to main content
1/11
Contents
List of Examples
List of Figures
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New in This Guide
New and Changed Features for 12c (12.2.1.3.0)
New and Changed Features for 12c (12.2.1.2.0)
New and Changed Features for 12c (12.2.1.1.0)
1
Introducing Oracle Web Services Manager
1.1
Overview of Oracle Web Services Manager
1.2
Overview of Oracle Web Services Manager Features
1.3
Overview of Oracle Web Service Manager Architecture
2
Understanding Web Service Security Concepts
2.1
About Web Service Security
2.2
Understanding Transport-level and Application-level Security
2.3
Understanding Authentication
2.3.1
About Digest Authentication
2.4
Understanding Authorization
2.5
Overview of Message Protection
2.5.1
Understanding Message Protection
2.5.2
About Message Encryption
2.5.3
About Message Signing (XML Signature)
2.6
Overview of the Roles of Keys and Certificates in Security and Authentication
2.6.1
About Private Keys and Certificates
2.6.2
Understanding How Different Security Policies Use Private Keys and Certificates
2.6.2.1
Overview of Message Protection Policy Types
2.6.2.1.1
About SSL Policies
2.6.2.1.2
About wss11 Policies
2.6.2.1.3
About wss10 Policies
2.6.2.2
Overview of Authentication Token Policy Types
2.6.2.2.1
About the Username Token
2.6.2.2.2
About the Kerberos Token
2.6.2.2.3
About the X.509 Certificate Token
2.6.2.2.4
About the SAML Sender Vouches Token
2.6.2.2.5
About SAML Bearer and SAML HOK Tokens from an STS
2.6.3
How OWSM Locates Keystore and Key Passwords for the JKS Keystore
2.6.4
About Private Keys and Certificates Configuration for SSL Policies
2.6.5
About Setting up Private Keys and Certificates for Message Protection Policies
2.6.5.1
Understanding Sample Basic Configuration
2.6.5.2
About Advanced Setup Considerations
2.7
Understanding How OWSM Uses the Credential Store
2.8
Understanding Security Policies
2.9
Overview of Security Tokens
2.9.1
Understanding Security Tokens
2.9.2
About the Username Token
2.9.3
About the X.509 Certificate
2.9.4
About the Kerberos Token
2.9.5
About the SAML Token
2.10
Understanding Secure Attachments
2.11
Overview of Secure Conversation
2.11.1
About Secure Conversation
2.11.2
Overview of WS-SecureConversation Usage
2.11.2.1
When to Use WS-Secure Conversation
2.11.2.2
Benefits of WS-SecureConversation
2.11.2.3
About WS-SecureConversation With WS-ReliableMessaging
2.11.3
WS-SecureConversation Architecture
2.11.4
When to Use WS-SecureConversation
2.11.5
When To Use Re-Authentication
2.11.6
About Setting the Bootstrap Mode
2.11.7
Overview of Persistence
2.11.7.1
About Default Domain-Wide Persistence Implementation
2.11.7.2
About Client- and Web Service-Specific Persistence Implementation
2.12
Overview of the Kerberos Protocol
2.12.1
Understanding the Kerberos Protocol
2.12.2
Understanding Credential Delegation in Kerberos
2.12.3
Understanding Kerberos and SPNEGO
2.12.4
About Kerberos and WS-SecureConversation Derived Keys
2.13
Understanding Web Services Addressing
2.14
Understanding Web Services Trust
2.15
Understanding Web Services ReliableMessaging
2.16
Overview of Fine-Grained Authorization Using Oracle Entitlements Server
2.16.1
References for OES Reading
2.16.2
Overview of OES Integration
2.16.2.1
OES Integration: The Big Picture
2.16.2.2
Data Masking
2.16.2.3
About XACML Obligations
2.16.2.4
Overview of OES Fine- and Coarse-Grained Authorization
2.16.2.4.1
OES Fine-Grained (Obligations)
2.16.2.4.2
Fine-Grained with SAML
2.16.2.4.3
OES Coarse-Grained Authorization
2.16.3
About OWSM OES Policies
2.16.4
Overview of Resource Mapping and Naming
2.16.4.1
Resource Mapping and Naming
2.16.4.2
Example of OES Policies
2.16.5
How Attributes Are Processed
2.16.6
About the Guard Element
2.17
Overview of Personally Identifiable Information
2.17.1
Overview of PII Data
2.17.1.1
About PII Data
2.17.1.2
About the PII Security Policy
2.17.2
Example of How PII Data is Protected
2.17.3
About PII Policy XPath Expressions
2.17.4
When to Use the PII Policy
2.17.4.1
Single SOA Composite Use Case
2.17.4.2
Oracle Service Bus Proxy Service to Business Service Use Case
2.17.4.3
PII at the JCA Binding Use Case
2.17.5
Who Should Have Access to the PII
2.17.6
About Additional Considerations for Unmarshalling
2.18
Understanding OAuth 2.0 for REST and SOAP Services and Clients
2.19
Understanding REST APIs for Managing Credentials and Keystores
3
Understanding the OWSM Policy Framework
3.1
Overview of OWSM Policy Framework
3.1.1
About OWSM Policy Framework Components
3.1.2
Understanding OWSM Agent and Policy Manager Interaction
3.1.3
About OWSM Agent and Policy Manager Characteristics
3.1.4
Understanding the OWSM Agent and Policy Manager Request Flow
3.1.5
About OWSM Configuration Artifacts
3.2
Understanding Web Service Policies
3.3
Overview of Building Web Service Policies Using Policy Assertions
3.3.1
About Building Web Service Policies Using Policy Assertions
3.3.2
About Defining Multiple Policy Alternatives (OR Groups)
3.4
Understanding Policy Subjects
3.5
Overview of Attaching Policies to Policy Subjects
3.5.1
About Attaching Policies to Policy Subjects
3.5.2
About Direct Policy Attachment
3.5.3
Overview of Global Policy Attachments Using Policy Sets
3.5.3.1
Understanding Global Policy Attachments Using Policy Sets
3.5.3.2
About Subject Types and Scope of Resources
3.5.3.3
Understanding Typical Uses for Global Policy Attachments
3.6
Understanding How Policies are Executed
3.7
About OWSM Predefined Policies and Assertion Templates
3.8
About Overriding the Security Policy Configuration
3.9
About Recommended Naming Conventions for Documents Created in WSM Repository
A
Web Service Security Standards
A.1
Security Standards
Scripting on this page enhances content navigation, but does not change the content in any way.