Cargando…

Oracle web services manager /

This book not only describes the need for Web Services security but also explains with detailed examples how to define security policies and enforce those policies using Oracle Web Services Manager. This book emphasizes how to use Oracle WSM to address various security use cases with detailed step-b...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Lakshminarayanan, Sitaraman
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, U.K. : Packt Pub., 2008.
Colección:From technologies to solutions.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn657856253
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 100824s2008 enk o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d CDX  |d IDEBK  |d OCLCQ  |d OCLCF  |d NLGGC  |d OCLCQ  |d VTS  |d NLE  |d UKMGB  |d WYU  |d STF  |d AU@  |d M8D  |d UKAHL  |d OCLCQ  |d OCLCO  |d K6U  |d INARC  |d OCLCO  |d OCLCQ 
015 |a GBB742543  |2 bnb 
016 7 |a 018011552  |2 Uk 
019 |a 270109731  |a 815685396  |a 823116079 
020 |a 9781847193841  |q (electronic bk.) 
020 |a 1847193846  |q (electronic bk.) 
020 |a 1281737550 
020 |a 9781281737557 
020 |z 1847193838  |q (Paper) 
029 1 |a AU@  |b 000050978776 
029 1 |a AU@  |b 000051399979 
029 1 |a CDX  |b 8797101 
029 1 |a DEBBG  |b BV043161492 
029 1 |a DEBSZ  |b 421695382 
029 1 |a UKMGB  |b 018011552 
035 |a (OCoLC)657856253  |z (OCoLC)270109731  |z (OCoLC)815685396  |z (OCoLC)823116079 
037 |a 9781847193841  |b Packt Publishing Pvt. Ltd 
050 4 |a TK5105.88813  |b .L35 2008eb 
072 7 |a COM  |x 051170  |2 bisacsh 
072 7 |a UVX  |2 bicssc 
082 0 4 |a 005.75/65  |2 22 
049 |a UAMI 
100 1 |a Lakshminarayanan, Sitaraman. 
245 1 0 |a Oracle web services manager /  |c Sitaraman Lakshminarayanan. 
260 |a Birmingham, U.K. :  |b Packt Pub.,  |c 2008. 
300 |a 1 online resource (236 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a From technologies to solutions 
500 |a Includes index. 
588 0 |a Print version record. 
520 |a This book not only describes the need for Web Services security but also explains with detailed examples how to define security policies and enforce those policies using Oracle Web Services Manager. This book emphasizes how to use Oracle WSM to address various security use cases with detailed step-by-step examples to learn Oracle Web Service Manager. This is the book for those who want to learn how to: Secure web services. Use Oracle WSM to configure web services security. It is mainly for Developers and Architects who want to learn how to use Oracle WSM to address the security challenges of web services and those who want to learn how to use Oracle WSM to address their security needs. If you have a basic knowledge of Web Services then this book will help you understand the need for security and how to use Oracle WSM to address the security challenges. 
505 0 |a Cover -- Table of Contents -- Preface -- Chapter 1: Introduction to Web Services Security -- The Need for Web Services Security -- Security Challenges in a Web Services Environment -- The Need for Identity Propagation from Calling Application to Web Services -- Why HTTPS Based Security Is Not Enough -- Components of Web Services Security -- Authentication -- Authorization -- Confidentiality -- Integrity -- Return on Investment -- Summary -- Chapter 2: Web Services Security-Architectural Overview -- Overview of XML Security Standards -- Closer Look at SOAP Messages -- Authentication -- Confidentiality -- Integrity -- Overview of WS-Security Standards -- Implementing WS-*Security in Applications -- Centralized Management of WS-*Security -- The Need for Centralizing WS-*Security Operations -- Benefits of Centralizing Web Services Security Operations -- Introduction to Oracle Web Services Manager -- Summary -- Chapter 3: Architecture Overview of Oracle WSM -- Oracle WSM Architecture 
505 0 |a Oracle WSM Policy Manager -- Overview of Oracle WSM Policy Manager -- Relationship Between Policy and Service -- Oracle WSM Gateway -- Proxy, or Exposing Internal Service to External Business Partner, or Outside of Intranet -- Transport Protocol Translation -- Content Routing -- Summary -- Chapter 4: Authentication and Authorization of Web Services Using Oracle WSM -- Oracle WSM: Authentication and Authorization -- Oracle WSM: File Authenticate and Authorize -- Oracle WSM: Active Directory Authenticate and Authorize -- Oracle WSM: Policy Template -- Oracle WSM: Sample Application AD Authentication -- Web Service Security Policy -- Oracle WSM Test Page as Client Application -- Microsoft .NET Client Application -- Summary -- Chapter 5: Encrypting and Decrypting Messages in Oracle WSM -- Overview of Encryption and Decryption -- Symmetric Cryptography -- Asymmetric Cryptography -- Oracle WSM and Encryption -- Encryption and Decryption with Oracle WSM -- Encryption Algorithm 
505 0 |a Key Transport Algorithm -- Internal Working of the XML Encrypt Policy Step -- Oracle WSM Sample Application Overview -- Oracle WSM Encryption and Decryption Policy -- Creating the Security Policy -- Oracle WSM Test Page as Client Application -- Microsoft .NET Client Application -- Summary -- Chapter 6: Digitally Signing and Verifying Messages in Web Services -- Overview of Digital Signatures -- Digital Signatures in Web Services -- Signature Generation Using Oracle WSM -- Sign Message Policy Step -- Internals of Sign Message Policy Step -- Signature Generation and Verification Example -- Registering Web Service with Oracle WSM -- Signature Verification by Oracle WSM -- Signature Generation by Oracle WSM -- Oracle WSM Test Page as Client Application -- Microsoft .NET Client Application -- Summary -- Chapter 7: Oracle WSM Custom Policy Step -- Overview of Oracle WSM Policy Steps -- Implementing a Custom Policy Step -- Extending the AbstractStep Class 
505 0 |a Deploying the Custom Policy Step -- Step Template XML File Creation -- Custom Policy Step Example: Restrict Access Based on IP Address to the Specified Method -- Extending the AbstractStep -- Testing the Custom Policy Step -- Summary -- Chapter 8: Deployment Architecture -- Oracle WSM Components. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a Oracle (Computer file) 
630 0 7 |a Oracle (Computer file)  |2 fast  |0 (OCoLC)fst01363816 
650 0 |a Web services. 
650 0 |a Relational databases. 
650 6 |a Services Web. 
650 6 |a Bases de données relationnelles. 
650 7 |a COMPUTERS  |x Programming Languages  |x SQL.  |2 bisacsh 
650 7 |a Relational databases.  |2 fast  |0 (OCoLC)fst01093575 
650 7 |a Web services.  |2 fast  |0 (OCoLC)fst01173242 
776 0 8 |i Print version:  |a Lakshminarayanan, Sitaraman.  |t Oracle web services manager.  |d Packt Pub., 2008. ; Birmingham  |z 9781847193834  |w (OCoLC)260294358 
830 0 |a From technologies to solutions. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=331991  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26942562 
938 |a Coutts Information Services  |b COUT  |n 8797101 
938 |a EBSCOhost  |b EBSC  |n 331991 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 173755 
938 |a Internet Archive  |b INAR  |n oraclewebservice0000laks 
994 |a 92  |b IZTAP