473,385 Members | 2,069 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Webservices and "pass through" security

Tom
Hi,

I am currently on a project where one site needs to send the user
credentials to another site, through web services.

Scenario:

* "User 1" will authenticate to "Site A" using NTLM ("Site A" provides
front-end presentation of data)
* "Site A" will request confidential information about "User 1" to "Site B"
("Site B" has a database of confidential data for each user), via web
service call

The developers of "Site B" are worried about "Site A" sending the wrong
credentials (i.e. wrong NT login ID), meaning that the visitor of "Site A"
could see someone else data...

How could we resolve this using standard .NET webservices?

How can we garantee to "Site B" that the visitor on "Site A" is really "User
1"?

Also, how can we ensure that only the webservice client from "Site A" can
access the webservice from B? We suggested IP address registration of Site A
servers with "Site B", but the developers think this is not enough.

Many thanks!!
Tom
Nov 23 '05 #1
2 1936
yes there is a way of doing it....

i quote this from the WSE2.0(web serivce enhancement) document

Web services can be secured today, but limitations exist when it comes to
building scalable distributed applications based on Web services.
Specifically, it is difficult to build scalable applications that cross
security domains. Today, you can secure Web services by having the message
sent over a secure transport, such as Secure Sockets Layer (SSL), but that
only works when the communication is point-to-point. That is, if the SOAP
message must be routed to one or more intermediaries before reaching the
ultimate receiver and the entire route uses SSL, then the ultimate receiver
still has to communicate with the sender to authenticate the sender of the
SOAP message. That scenario is difficult to scale.

One of the ways WSE helps to build scalable distributed applications is by
providing an efficient and scalable mechanism to secure Web services. It uses
the mechanisms defined in the WS-Security specification to place security
credentials in the SOAP message itself. This is done by having a client
obtain security credentials from a source that is trusted by both the sender
and receiver. When a SOAP message sender sends a SOAP request, those security
credentials, which are generically known as security tokens, are then placed
in the SOAP message.
...............

for full article, please refer here:

http://msdn.microsoft.com/library/de...c5b2f2191d.asp

--
Can You?You Can.
"Tom" wrote:
Hi,

I am currently on a project where one site needs to send the user
credentials to another site, through web services.

Scenario:

* "User 1" will authenticate to "Site A" using NTLM ("Site A" provides
front-end presentation of data)
* "Site A" will request confidential information about "User 1" to "Site B"
("Site B" has a database of confidential data for each user), via web
service call

The developers of "Site B" are worried about "Site A" sending the wrong
credentials (i.e. wrong NT login ID), meaning that the visitor of "Site A"
could see someone else data...

How could we resolve this using standard .NET webservices?

How can we garantee to "Site B" that the visitor on "Site A" is really "User
1"?

Also, how can we ensure that only the webservice client from "Site A" can
access the webservice from B? We suggested IP address registration of Site A
servers with "Site B", but the developers think this is not enough.

Many thanks!!
Tom

Nov 23 '05 #2
yes there is a way of doing it....

i quote this from the WSE2.0(web serivce enhancement) document

Web services can be secured today, but limitations exist when it comes to
building scalable distributed applications based on Web services.
Specifically, it is difficult to build scalable applications that cross
security domains. Today, you can secure Web services by having the message
sent over a secure transport, such as Secure Sockets Layer (SSL), but that
only works when the communication is point-to-point. That is, if the SOAP
message must be routed to one or more intermediaries before reaching the
ultimate receiver and the entire route uses SSL, then the ultimate receiver
still has to communicate with the sender to authenticate the sender of the
SOAP message. That scenario is difficult to scale.

One of the ways WSE helps to build scalable distributed applications is by
providing an efficient and scalable mechanism to secure Web services. It uses
the mechanisms defined in the WS-Security specification to place security
credentials in the SOAP message itself. This is done by having a client
obtain security credentials from a source that is trusted by both the sender
and receiver. When a SOAP message sender sends a SOAP request, those security
credentials, which are generically known as security tokens, are then placed
in the SOAP message.
...............

for full article, please refer here:

http://msdn.microsoft.com/library/de...c5b2f2191d.asp

--
Can You?You Can.
"Tom" wrote:
Hi,

I am currently on a project where one site needs to send the user
credentials to another site, through web services.

Scenario:

* "User 1" will authenticate to "Site A" using NTLM ("Site A" provides
front-end presentation of data)
* "Site A" will request confidential information about "User 1" to "Site B"
("Site B" has a database of confidential data for each user), via web
service call

The developers of "Site B" are worried about "Site A" sending the wrong
credentials (i.e. wrong NT login ID), meaning that the visitor of "Site A"
could see someone else data...

How could we resolve this using standard .NET webservices?

How can we garantee to "Site B" that the visitor on "Site A" is really "User
1"?

Also, how can we ensure that only the webservice client from "Site A" can
access the webservice from B? We suggested IP address registration of Site A
servers with "Site B", but the developers think this is not enough.

Many thanks!!
Tom

Nov 23 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: jiing.deng | last post by:
I want to use the system command to set user's priority $cmd = "cacls d:\\appserv\\www\\accountMng\\$userName /G $userName:F"; system($cmd); Then it appears Are you sure (Y/N)? How can I...
2
by: Alex | last post by:
Greetings all, I'm trying to use the "opendir" command on Win32 in a CGI script. I'm using Apache 2.0.48 for Win32. The "openDir" command works from the CGI script when I try to open a...
6
by: Vern | last post by:
I'd like to make the following a generic method that all my forms can call to validate all the fields on the form. So how do I pass the form object that is represented as "this" in the following...
4
by: Benjamin Joldersma | last post by:
Hello all, My company is installing a Bluecoat caching machine to help serve some of our dynamic content. This is fine for free documents, but we have to make a minor architectural tweak for...
1
by: Tom | last post by:
Hi, I am currently on a project where one site needs to send the user credentials to another site, through web services. Scenario: * "User 1" will authenticate to "Site A" using NTLM ("Site...
6
by: Martijn Coppoolse | last post by:
Hello everyone, I've got two little apps which are able to create a window that displays something on the desktop, but are not clickable. Instead, when you click on the window, the item...
3
by: sloan | last post by:
How does one "pass thru" a Raised Event.... I am using the Adapter Pattern to sync up some different interfaces. http://www.dofactory.com/Patterns/PatternAdapter.aspx My Question is this:
1
by: Klaas | last post by:
I have a dropdownlist. When the user clicks on a button I want the selected listitems text to be line-through. Is this possible in IE? or with some javascript? tia
4
by: Jon Slaughter | last post by:
is there a simple way to "step" through enums? I have a button that I want to click and have it "cycle" through a set of states defined by enums but the only way I can think of doing this...
7
by: pthomet | last post by:
Another formulation of the message tittle could be : is it really "safe" (in the business sense) to embed a SSL webservice consumer into any given software, given that any time a proxy server will...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.