SlideShare a Scribd company logo
Security In SOA


 WSO2 Security Team
Do we need
security.. It’s extra
   cost right…?
Everything comes
at a cost… security
 is not an option
… not an
option.. But
  a must..

Recommended for you

Trust and Security, presented by Geoff Huston
Trust and Security, presented by Geoff HustonTrust and Security, presented by Geoff Huston
Trust and Security, presented by Geoff Huston

Geoff Huston, Chief Scientist at APNIC delivers a remote presentation on Internet fragmentation and its effect on the trust and security of Internet at VNNIC Internet Conference 2024 held in Hanoi, Vietnam from 4 to 7 June 2024.

apnicvnnicvietnam
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David JohanssonOWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson

1) Authentication solutions like SSL/TLS client certificates and SAML SSO can compromise user privacy through design flaws. SSL/TLS does not properly validate server identity before sending client certificates, exposing them. SAML allows passive authentication requests without user consent. 2) Privacy requirements for authentication include knowing who you communicate with, when you authenticate, what information is revealed, and that only the intended recipient sees your identity. Current solutions do not always fulfill these. 3) Upcoming TLS 1.3 and careful design of client certificates and authentication requests can help address privacy issues, but flaws remain and privacy must be explicitly considered in authentication system design.

privacyinternettls
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC

The document discusses digital signatures and public key infrastructure (PKI) for building trust in online transactions. It explains symmetric and asymmetric encryption techniques, including how public key encryption works using key pairs to ensure authentication, confidentiality, integrity and non-repudiation. Digital signatures encrypt a hash of a message with the sender's private key to verify authenticity and integrity without revealing the original message. A PKI uses digital certificates issued by a certificate authority to associate users with their public keys.

ecommercelawpki
Security is NOT
an option – it’s
     a must
Security should
be by design –
 not an after
    thought
We run
 everything on
HTTPS – aren’t
we yet secured…?
It’s NOT the best
      of the
 assumptions in
 the world you
  could make…

Recommended for you

Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec

Secure Gate is a web-based solution that provides secure remote access to internal resources using strong encryption and authentication over the internet. It acts as a reverse proxy, sitting within the firewall, to allow authenticated and encrypted access to internal servers from any internet browser without requiring custom client software. It supports SSL/TLS to encrypt communications and offers authentication methods like basic authentication, external authentication via RADIUS/LDAP, and client-side certificate authentication for high security requirements.

reverseproxy
Secured SOA
Secured SOASecured SOA
Secured SOA

Prabath Siriwardana - WSO2 SOA Security Architect, gives out a presentation on secured SOA at the SOA workshop in Colombo, Sri Lanka (September 17, 2009).

 
by WSO2
wso2 esbopen source identity serverwssecurity policy
Identity, Security and XML Web Services
Identity, Security and XML Web ServicesIdentity, Security and XML Web Services
Identity, Security and XML Web Services

The use of security credentials and concepts of single-sign-on and “identity” play a big part in Web Services as developers start writing enterprise-grade line-of-business applications. An overview is provided of the emerging XML security credential standards such as SAML, along with various “identity” standards such as Passport and Liberty. We examine how “identity aware” Web Service implementations need to be, and the value a Web Services platform can add in reducing complexity in this area, with lessons drawn from experiences using J2EE technology for real-world security scenarios.

securityidentitywebservices
LISTEN..!!! I
   know
 HTTPS….
HTTPS helps
you transfer
data from one
  point to
   another
   point..
 Securely..
That is..
 HTTPS helps
you to encrypt
     data
 transferred
  between a
 client and a
    server
That’s all about
confidentiality –
   how about
    integrity?

Recommended for you

Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)

The document discusses Secure Socket Layer (SSL) protocol and how it provides security for internet transactions. It explains that SSL uses cryptography, digital signatures, and certificates to provide confidentiality, message integrity, and authentication. It details how SSL works, including the handshake protocol for authentication and key exchange, the record protocol for encrypting data transfer, and SSL roles/elements like certificates and certificate authorities. The goal of the project is to implement a client and server that can securely communicate and transfer data using the SSL protocol.

Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys

The public key is used to encrypt the data. As it can be openly distributed, it’s called a public key. Once a public key encrypts the data, no one can use the public key to decrypt the data. On the other hand, the private key is used to decrypt the data. As it can’t be openly distributed but needs to be kept a secret, that’s why it’s called a private key. In symmetric cryptography, the private key can encrypt and decrypt data. Public and private keys both have their special objectives and uses in cryptography. As for public vs. private keys, we will discuss some key factors to better understand the situation. These are - working mechanism, performance, visibility, type, sharing, and storing. To help you better understand the differences between a public key and a private key, 101 Blockchain offers exclusive courses. These courses will help you understand the principle behind both encryption types and make it easier for you to incorporate these in your blockchain project. The following course will help you stay on top of the game -> Blockchain Like a Boss masterclass https://academy.101blockchains.com/courses/blockchain-masterclass Learn more about the certification courses from here -> Certified Enterprise Blockchain Professional (CEBP) course https://academy.101blockchains.com/courses/blockchain-expert-certification Certified Enterprise Blockchain Architect (CEBA) course https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect Certified Blockchain Security Expert (CBSE) course https://academy.101blockchains.com/courses/certified-blockchain-security-expert Learn more from our guides -> https://101blockchains.com/private-key-vs-public-key/ https://101blockchains.com/public-key-cryptography-in-blockchain/ https://101blockchains.com/public-key-cryptography/

public vs private keysdifference between public key and private keyblockchain course
Getting authentication right
Getting authentication rightGetting authentication right
Getting authentication right

The document discusses authentication and identity. It covers common authentication factors like passwords, two-factor authentication using a mobile phone, and biometrics. It provides details on securely storing passwords using techniques like salts and hash functions to prevent cracking. It also discusses risks of password reuse across sites and how two-factor authentication helps address this. The document emphasizes the importance of secure authentication and not allowing the security level to be degraded without re-authentication.

roots
Confidentiality
  The assurance
 that a message
has not been read
 by anyone other
than the intended
     reader
Integrity
The assurance
that data is
complete and
  accurate
Authentication
The verification
 of a claimed
   identity
With HTTPS we
    can have
Confidentiality,
 Authentication
       &
   Integrity

Recommended for you

WSO2 SOA Security
WSO2 SOA SecurityWSO2 SOA Security
WSO2 SOA Security

- Securing web services involves ensuring end-to-end confidentiality, integrity, authentication, and non-repudiation of messages through standards like XML Encryption, XML Signature, WS-Security, WS-Trust, and WS-Security Policy. - WS-Security provides message-level security through username tokens, X.509 tokens, and XML signatures and encryption. WS-Trust allows delegating authentication to external domains. - Sign & encrypt and encrypt & sign are two approaches to securing messages with XML Signature and Encryption, with tradeoffs in terms of integrity and confidentiality.

 
by WSO2
Secured SOA
Secured SOASecured SOA
Secured SOA

- Securing web services involves ensuring confidentiality, integrity, authentication, and non-repudiation of messages. This can be achieved through transport security (HTTPS), message security (XML Encryption and Signature), and security tokens (UsernameToken, X.509). - WS-Security provides standards for applying security to SOAP messages using XML Signature and Encryption. It supports security tokens like UsernameToken and X.509 profiles. - WS-Trust allows delegating authentication of external users to their external domains through requesting and issuing security tokens. - WS-Security Policy allows communicating security requirements like algorithms, key sizes, signed/encrypted elements to external services in a standard way.

securitysoa
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions

Anti-virus software scans files to identify viruses by matching signatures of previously discovered viruses. It offers real-time protection and scheduled scans, and can delete or quarantine infected files. Passwords are commonly used with usernames to authenticate users, and should be at least 8 characters long without including personal details. Biometrics authenticate users using unique biological traits like fingerprints, iris patterns, or facial recognition. Encryption converts data into an unreadable format, while decryption reverses the process, and different encryption methods include symmetric, asymmetric, and digital signatures.

higher computing science
Service
         Authentic     Service
         ates to the
           client




Client
Mutual     Service
         Authentic
           ation




Client
Don’t think all
our clients want to
  have their own
 certificates – can
   we have user
  name/password
     instead???
Easy thing –
use BasicAuth
 over HTTPS

Recommended for you

SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications

Presenting the basics of SSL/TLS , usage of SSL protocol to secure the IBM MQ channels. Secure Communications between two Queue Managers and various test cases , between an application and Queue Manager , Errors , Certificate Renewal ..

tlskeystoressl
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks

In this talk, I will explain the foundations of the TLS protocol: symmetric encryption, digital signature, PKI, and how these concepts come together to secure your network connections

open source
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies

This document provides a high-level overview of TLS (Transport Layer Security) in 3 sentences or less: TLS allows two parties to establish an encrypted connection by using public key cryptography for authentication during the initial handshake and then using symmetric encryption for faster encrypted data transfer. It relies on certificate authorities to validate server identities through digital signatures on their public keys. The initial handshake establishes a shared secret for deriving the symmetric encryption keys through techniques like Diffie-Hellman key exchange to provide forward secrecy if private keys are later compromised.

conferencepossworteks
Wait…. Basic
  auth sends
   username /
  password in
clear text..right?
But – we are
on HTTPS and
it won’t be an
  issue… BTW
 what are the
other options…
The other
Option is to
use Digest…
Let’s
summarize..
               Securing
                 web
               services
              with HTTPS

Recommended for you

TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security

TLS (Transport Layer Security) is a cryptographic protocol that provides encryption and security for data sent over the internet. It is used by HTTPS to encrypt communication between web browsers and servers. TLS 1.2, the previous standard, had security flaws in how it exchanged encryption keys. TLS 1.3 improves security by using Diffie-Hellman key exchange so keys are not sent directly over the network. To upgrade a website from HTTP to HTTPS, an SSL certificate must be purchased and installed, all links on the site must be changed to HTTPS, and HTTP traffic should be redirected to HTTPS.

technologynetworking
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2

E-Mail System Architecture, PGP, MIME and MIME Headers, Review of SSL protocol, Secure Shell (SSH) Protocol for Secure Remote Login

e-mail system architecturepgpmime and mime headers
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless

Key takeaways: Challenges of building platforms and the benefits of platformless. Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience. How Choreo enables the platformless experience. How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo. Demo of an end-to-end app built and deployed on Choreo.

 
by WSO2
choreodevchoreoplatformless
Let’s
summarize..
                1.Provides
              confidentiality
                  through
                encryption
Let’s
summarize..     2.Service
              authenticates
              to the client
                   via
              certificates
Let’s      3.Client can
summarize..
              authenticate
                   via
              certificates,
              basic auth /
                 digest
I need a better subject…
     any guesses???

Recommended for you

WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation

WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation

 
by WSO2
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf

Architecting AI in the Enterprise: APIs and Applications

 
by WSO2
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2

Driving Innovation: Scania's API Revolution with WSO2

 
by WSO2
That’s actually
Transport-level
   security
OMG….I remember
 somebody saying
  Transport level
security – can be
 insufficient….???
 Who said that…?
Patience….
 Sir.. It’s
  me….
I can
explain….

Recommended for you

Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform

At its core, the challenge of managing Human Resources data is an integration challenge: estimates range from 2-3 HR systems in use at a typical SMB, up to a few dozen systems implemented amongst enterprise HR departments, and these systems seldom integrate seamlessly between themselves. Providing a multi-tenant, cloud-native solution to integrate these hundreds of HR-related systems, normalize their disparate data models and then render that consolidated information for stakeholder decision making has been a substantial undertaking, but one significantly eased by leveraging Ballerina. In this session, we’ll cover: The overall software architecture for VHR’s Cloud Data Platform Critical decision points leading to adoption of Ballerina for the CDP Ballerina’s role in multiple evolutionary steps to the current architecture Roadmap for the CDP architecture and plans for Ballerina WSO2’s partnership in bringing continual success for the CD

 
by WSO2
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina

The integration landscape is changing rapidly with the introduction of technologies like GraphQL, gRPC, stream processing, iPaaS, and platformless. However, not all existing applications and industries can keep up with these new technologies. Certain industries, like manufacturing, logistics, and finance, still rely on well-established EDI-based message formats. Some applications use XML or CSV with file-based communications, while others have strict on premises deployment requirements. This talk focuses on how Ballerina's built-in integration capabilities can bridge the gap between "old" and "new" technologies, modernizing enterprise applications without disrupting business operations.

 
by WSO2
enterprise applicationslegacy systems
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...

WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive Advantage

 
by WSO2
Transport
level security
  secures a
 message only
  during the
transfer from
 one point to
another point.
In other
words.. Only
  while the
message is on
  the wire…
HTTPS   HTTPS
When we use
Transport level
 security [SSL]
our messages are
 not secured on
‘intermediaries’

Recommended for you

WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI

WSO2CON 2024 - Unlocking Value with AI

 
by WSO2
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability

In this keynote, Asanka Abeysinghe, CTO,WSO2 will explore the shift towards platformless technology ecosystems and their importance in driving digital adaptability and innovation. We will discuss strategies for leveraging decentralized architectures and integrating diverse technologies, with a focus on building resilient, flexible, and future-ready IT infrastructures. We will also highlight WSO2's roadmap, emphasizing our commitment to supporting this transformative journey with our evolving product suite.

 
by WSO2
platformless technologyplatformlessdigital arcihtecture
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing

Quantum computers are rapidly evolving and are promising significant advantages in domains like machine learning or optimization, to name but a few areas. In this keynote we sketch the underpinnings of quantum computing, show some of the inherent advantages, highlight some application areas, and show how quantum applications are built.

 
by WSO2
quantum computing
Not – just that –
  we cant even
 encrypt only a
   part of the
message – if we
   depend on
 transport level
    security
Need a way to
    get rid of
transport level
   security….
We can
    handle
security at the
message level…
That way – we
  can protect
entire message
 or even just a
  part of it….

Recommended for you

WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud

WSO2CON 2024 - Elevating the Integration Game to the Cloud

 
by WSO2
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation

WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation

 
by WSO2
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source

WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source

 
by WSO2
Just –
confidentiality is
NOT enough – we
  need to think
  about adding
  Integrity and
Authentication at
   the Message
      level…
Let’s start with
one by one – can
 anyone tell me
   how do we
     support
authentication at
   the message
    level….???
It’s simple – I
  will add a
custom SOAP
    HEADER
<Credentials>
<UserName></UserName>
 <Password></Password>
     </Credentials>

Recommended for you

WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS

WSO2CON 2024 - Open Source to SaaS

 
by WSO2
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?

WSO2CON 2024 - Does Open Source Still Matter?

 
by WSO2
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...

WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing IoT Ecosystem

 
by WSO2
I don’t like having custom
    headers… that kills
    interoperability….
Yes – true – we
should not try to re-
implement the wheel..
Okay – then
somebody explain –
what do we have on
   our hands…?
Haven’t you
guys heard of
     WS-
  Security….

Recommended for you

WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...

WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platformless Approach

 
by WSO2
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses

WSO2CON 2024 - Software Engineering for Digital Businesses

 
by WSO2
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...

WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, WebSub, AsyncAPI and More

 
by WSO2
It defines how
    to achieve
confidentiality,
  integrity and
authentication
     on SOAP
    messages…
Let me clarify – ws-
   security doesn’t
define new security
     technology….
It focuses on
  applying existing
security technologies
 to SOAP messages…
Wow… exactly
  what we
  wanted…

Recommended for you

WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation

WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation

 
by WSO2
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...

Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.

insider securitycybersecurity threatsenterprise security
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses

CIO Council Cal Poly Humboldt September 22, 2023

national research platformdistributed supercomputerdistributed systems
For
authentication –
  WS-Security
     defines
 UsernameToken
<wsse:UsernameToken wsu:Id="Example-1">
     <wsse:Username> ... </wsse:Username>
     <wsse:Password
          Type="..."> ... </wsse:Password>
     <wsse:Nonce
          EncodingType="..."> ... </wsse:Nonce>
      <wsu:Created> ... </wsu:Created>
</wsse:UsernameToken>
I looked into the
WS-Security spec
– but it does NOT
 provide enough
    details on
UsernameToken….
    Where else
  should I look
      into..?
Here it is – you
need to look into
       the
UsernameToken
  Profile spec…

Recommended for you

Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation

Java Servlet programs

Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence

Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently. Visit- https://onliveserver.com/linux-web-hosting/

cheap linux hosting
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces

An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)

augmented realitycross realityvirtual reality
Let’s summarize..
Your findings on    Securing
  Message level
   security and       web
Username Token…
                    services
                      with
                    Message
                     level
                    Security
Let’s summarize..
Your findings on
  Message level
   security and     1.Defined in
Username Token…
                    WS-Security
                    specification
Let’s summarize..
Your findings on
  Message level
   security and     2.End to end
Username Token…     security with
                    support for
                    confidentiality,
                    integrity and
                    authentication
Let’s summarize..
Your findings on
  Message level
   security and     3.UsernameToken
Username Token…
                    can be used to
                    authenticate
                    users to the
                    service.

Recommended for you

How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf

In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.

social media hackerfacebook hackerhire a instagram hacker
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf

To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.

data recoverydatadiskwarrior
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024

Everything that I found interesting about engineering leadership last month

quantumfaxmachine
Let’s summarize..
Your findings on
  Message level
   security and     4.UsernameToken
Username Token…
                    can have
                    password in
                    clear text or
                    as a digest.
Let’s summarize..
Your findings on
  Message level
   security and     5.UsernameToken
Username Token…
                    defined in
                    UsernameToken
                    Profile
                    specification.
Let’s move forward –
      how about
  Encryption with
     Message level
       security
With WS-Security
 we can encrypt
Body, Header and
any of those sub-
   structures…

Recommended for you

Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time

Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality. Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality. Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality. Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank? ** Episode Overview ** In this first episode of our quality series, Kristen Hansen and the panel discuss: ⦿ What do we mean when we say patent quality? ⦿ Why is patent quality important? ⦿ How to balance quality and budget ⦿ The importance of searching, continuations, and draftsperson domain expertise ⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications https://www.aurorapatents.com/patently-strategic-podcast.html

patentspatent applicationpatent prosecution
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx

Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.

rpa in transportationrpa in transportation industryrpa in transportation sector
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf

Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 : - Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants. - REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.

genaicloudrgpd
Can somebody
explains me how
 this encryption
   happens???
That is basically a
shared symmetric
       key….
It can be with a key
   already shared or
  known to both the
service and the client
We are going off
the topic here..
Anyway here’s
  some basic
explanation….

Recommended for you

Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides

If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights. During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to: - Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value - Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems - Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors - Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported - Look Ahead: Gain insights into where FME is headed with coordinate systems in the future Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!

What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx

This is a slide deck that showcases the updates in Microsoft Copilot for May 2024

microsoftmicrosoft copilot
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024

Everything that I found interesting last month about the irresponsible use of machine intelligence

quantumfaxmachine
Symmetric key
 encryption
uses a shared
key for both
 encryption
     and
 decryption…
Public key
encryption
   uses
 different
 keys for
encryption
    and
decryption…
Let me add more….
Symmetric key
encryption is
    fast…

Recommended for you

DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition

The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.

Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf

Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment. How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.

pigging solutionsprocess piggingproduct transfers
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf

These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.

air force fighter planebiggest submarinezambia port
It can
operate on
large plain
   text
 messages…
Symmetric key
 encryption
 uses public
     key
encryption to
manage shared
     key
distribution
  securely
Okay..okay.. I know…
  AES, 3DES are
    shared key
    encryption
    algorithms
Back to the topic….
 WS-Security can
 also use wrapped
key encryption as
       well…

Recommended for you

Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems

Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states. In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing. Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.

RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx

Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation

rpa in healthcarerpa in healthcare usarpa in healthcare industry
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...

Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023 https://arxiv.org/abs/2307.12980

Got the point…. If
shared key being
 used then both
client and service
have to share the
      key…..
If client doesn’t have
    a key – then a
  shared key will be
  derived through a
     key wrapping
    algorithm with
  service’s certificate
That sounds good –
  even client not
having a cert – we
   still can have
 encryption…. Let’s
 move to the other
aspect… Integrity…..
WS-Security brings
XML Signature in to
  SOAP messages to
 achieve integrity….

Recommended for you

BTW.. Signature not
    only gives you
 integrity – but also
the non-repudiation
Let me add little
more… if you need
to know bit more
   about XML
    Signature
XML Signature
defines three types
  of Signatures –
    enveloping,
  enveloped and
  detached. WS-
 Security utilizes
 only Detached…
Okay – that’s
 enough… let’s start
  building the big
  picture on WS-
Security now… from
   what we have
 discussed so far….

Recommended for you

WS - Security




                   XML            Username       X.509 Token
XML Signature
                Encryption       Token Profile      Profile
Now we
know how to
authenticate
 users with
message level
 security….
Also how to
     add
confidentiali
     ty…
And..
Integrity and
    non-
repudiation…

Recommended for you

Now – the
 question is…
who should be
able to access
our system???
All our
 employees
need access…
Some of our
   partner
 companies
  also need
   access…
We maintain
the credentials
     of our
employees - so
 we can easily
 authenticate
    them…

Recommended for you

How can we
authenticate
 users from
  partner
companies…
Let’s create
  individual
  accounts to
 each of them
and maintain
 those records
   locally….
What a dumb idea
is that… you want
    to maintain
   thousands of
external domain
   user accounts
    internally…
We need not to trust
each individual belong
     to our partner
 companies… we only
 trust them until they
 belong to our partner
      companies…

Recommended for you

Exactly – we only trust
our partners only… But
    we can let their
employees to access our
system if the company
  says it’s okay to give
         access…
In simple terms now
we need to find out a
way to establish trust
between our partner
     companies…
That’s simple… let’s
accept requests from
out-siders - only if
those requests being
 signed by a trusted
      partner…
That sounds cool..
    So we’ll be
maintaining a set
 of public certs of
trusted partners to
validate signatures

Recommended for you

This only solves
     part of the
  problem… how
  about our users
who need access to
 external system….
How do we sign all
the requests when
   they go out to
external services…
Listen… I found
    some thing
 interesting – WS-
Trust – this exactly
     solves our
     problem….
Summer School - Security in SOA
We’ll be
maintaining
  an STS –
  which is
connected to
our internal
 user store

Recommended for you

Any of our
users who needs
 access to an
    external
 service will
send a request
to our internal
      STS
Need to
 authenticate
  him with a
Username Token
Since the
internal STS is
connected to the
 internal user
store – STS can
  verify user
  credentials
Once the
  credentials
 validated, the
STS will issue a
 token with the
required claims
 and sign it by
our private key

Recommended for you

If the external
service trusts
 our STS – our
users will let
      in…
Sounds GREAT..!!!
  It’s the same for
external users who
needs access to our
 services… we will
  only trust their
         STS…
Let me build
   the BIG
picture once
  again…..
WS - Trust




                 WS - Security



              XML        Username   X.509
   XML
            Encryptio      Token    Token
Signature
                n         Profile   Profile

Recommended for you

Now we have
 secured our
   system…..
Also we know
 who to trust
 and how….
But – how do we
 let other’s who
  work with us
 know security
  standards we
       use….
Ah… yes… when
   external users
accessing our system
 they must provide
their email address
   with all their
     requests….

Recommended for you

Not – just that –
  they also have to
        know
encryption/signature
 algorithms we use….
Also – we are not
going to encrypt entire
 message – only some
 parts – so we need to
tell them which parts
      to encrypt…
I am going to prepare
   a document which
    includes all our
security requirements..
- Requires Email address…

- Encryption algorithms
AES
- Encryption key size
256
- Encryption algorithms
AES
- All the parts in the
<Body> must be signed

- Parts to be encrypted
depends on the service…

Recommended for you

Looks good… we need
   to extend this
further…And this is
our security policy…
There should be a
  standard way of
communicating our
 security policy to
   others… let me
      Google….
Oh.. Yes.. WS-
SecurityPolicy…
We can use it to express
security requirements of
a Web service according
           to,
    What needs to be
       protected…
  What tokens to use…
  Algorithms, reference
       types, etc….

Recommended for you

We need to have different
   security policies for
 different services… how
    can we associate a
 security policy with a
      given service….
That’s simple – you
can point to a policy
   from the WSDL
But .. People may
 access our service
with SOAP1.1 over
 HTTP, SOAP 1.2
over HTTPS, SOAP
  1.1 over JMS…
We may need to change
   our policy based on
  different ways people
 access…. If we have this
  pointed in WSDL – it
will be same for all those
     cases… right….?

Recommended for you

Okay – you want
   to change the
  policy based on
the message format
 and the protocol
That is… you want
 to have different
 security policies
    for different
‘bindings’… that is
  possible and it’s
         the
recommendation…
<wsdl:binding name="HelloServiceSoap11Binding“
              type="ns:HelloServicePortType">
        <wsp:PolicyReference xmlns:wsp=“"
                              URI="#SgnEncrUsername" />
        <soap:binding
          transport=http://schemas.xmlsoap.org/soap/http
          style="document" />
        <wsdl:operation name="greet">
            <soap:operation soapAction="urn:greet“
                            style="document" />
            <wsdl:input>
                <soap:body use="literal" />
            </wsdl:input>
            <wsdl:output>
                <soap:body use="literal" />
            </wsdl:output>
        </wsdl:operation>
</wsdl:binding>
Now.. Let’s see how
  we can express
   some of our
 requirements in
WS-SecurityPolicy

Recommended for you

UsernameToken
   should be
  included….
<wsp:Policy>
     <sp:UsernameToken sp:IncludeToken=“”/>
</wsp:Policy>
We should accept
UsernameToken –
 only if they are
     signed…
<sp:SignedSupportingTokens xmlns:sp="">
        <wsp:Policy>
          <sp:UsernameToken sp:IncludeToken=“"/>
        </wsp:Policy>
</sp:SignedSupportingTokens>

Recommended for you

Will be using
AES with 256
  key size…
<sp:AlgorithmSuite>
    <wsp:Policy>
       <sp:Basic256/>
    </wsp:Policy>
</sp:AlgorithmSuite>
We need entire
<Body> of the
message to be
   signed…
<sp:SignedParts>
    <sp:Body/>
</sp:SignedParts>

Recommended for you

How about
encrypting just a
   part of the
    <Body>….
<sp:EncryptedElements XPathVersion="xs:anyURI"? ... >
         <sp:XPath>xs:string</sp:XPath>+ ...
</sp:EncryptedElements>
Also… we need to
   express the
requirement for
  the required
   claim set….
<sp:RequestSecurityTokenTemplate xmlns:t="">
  <t:TokenType>
   http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
 </t:TokenType>
 <t:KeyType >
   http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
  </t:KeyType>
  <t:KeySize>256</t:KeySize>
  <t:Claims Dialect=http://wso2.org/claims xmlns:ic="">
   <ic:ClaimType Uri="http://wso2.org/claims/email" />
  </t:Claims>
</sp:RequestSecurityTokenTemplate>

Recommended for you

That’s it… let’s move
forward… Now we are
  secured.. We know
who to trust and how
       to trust…
We also know how to
  communicate our
security requirements
     to the rest….
Let me build
   the BIG
picture once
  again…..
WS - Trust
   WS-
SecurityPo
   licy
                              WS - Security



                           XML        Username   X.509
                XML
WS-Policy                Encryptio      Token    Token
             Signature
                             n         Profile   Profile

Recommended for you

Now we need to
find out a way to
   put this all-
    together…
We should not expose
   all our services
 directly to external
      domain…
Agreed – having
 multiple entry point
into the system could
create security holes…
Let’s make sure
we authenticate
 and authorize
users centrally….
And we can load
balance on that
  end point….

Recommended for you

So let’s not expose any
 of our services to out
          side….
We can have proxy
 service and in front
     and only the
  authenticated and
 authorized requests
 will flow through to
the internal services…
Authentication Module



     Authorization Module




Service    Service     Service
   A          B           C
This is a familiar
security pattern…
Message Interceptor
    Gateway…

Recommended for you

Let me improve
the diagram a
     bit…..



                        Authentication Module



                         Authorization Module


             LDAP

                    Service    Service     Service
                       A          B           C
Anybody knows what
 the authorization
 module does…? We
 need fine grained
  authorization….
Yes.. Exactly… we need
  a way to say.. Users
 belong to the role X
can access Resource Y
   only during this
   particular time…
We should also be
  able to say – any
users belong to role Z
  cannot access any
      resources….

Recommended for you

That’ s simple – give
me your requirement
 – I’ll right a policy
      for it –and
   Authorization
module will evaluate
           it…
Oh..NO… don’t panic
   – we need not to
reinvent the wheel…
  this what exactly
    XACML does…..
Sounds good – we
should go ahead with
   the standards….
I know XACML….

Recommended for you

It’s a
  specification
  which defines
      how to
 implement fine
     grained
authorization in
a standard way…
Let me add
XACML to out
 architecture
  diagram…
Now – under
   the XACMl
terminology, our
 Authorization
module will act
  as the Policy
   Evaluation
   Point [PEP]
Authentication Module


         Authorization Module [PEP]


LDAP

       Service    Service     Service
          A          B           C

Recommended for you

PEP is not just
enough – we need to
have a XACML engine
  to act as a Policy
  Decision Point….
Yes…. Policy
 decision is made
   at the PDP –
 PEP will build
    the Auth’Z
    request and
  contact PDP…
let’s bring PDP to
   the picture…
Authentication Module


         Authorization Module [PEP]


LDAP

       Service    Service     Service
                                        PDP
          A          B           C
Then again –
  PDP has to
retrieve XACML
policies from a
 policy store….

Recommended for you

Authentication Module


         Authorization Module [PEP]


LDAP

       Service    Service     Service
                                           PDP
          A          B           C




                                        Policy Store
How do we going to
add new policies… we
 also need to have a
policy administration
        point…
Authentication Module              PAP



         Authorization Module [PEP]


LDAP

       Service    Service     Service
                                           PDP
          A          B           C




                                        Policy Store
Let’s celebrate – we
   completed the
security design for
    our backend
      services…

Recommended for you

Now… we need to
think about how we
 authenticate users
 at the front-end….
I hate passwords…
     how many
passwords I have to
   remember even
 now… If this going
   to add another
password to that list
 – I am against it…
I agree – too many
   password is a
     problem…
See… even
  within our
 company we
 need to have
   different
 passwords to
access different
   systems…

Recommended for you

Okay… let’s solve the
too many passwords
     problem…
Hey…. We need not to
  worry about it…
 OpenID is for that…
Also – OpenID
     facilitates
decentralized single
      sign on…
That’s great – if we
use OpenID – we only
    sign in once…

Recommended for you

How can we
implement this…?
First thing… our web
application needs to
be an OpenID relying
 party…. That is our
  application will
    accept OpenID
       logins….
Also – we can
run our own
   OpenID
  Provider…
Then all our
web applications
  will redirect
users to our own
OpenID Provider
       for
authentication….

Recommended for you

I don’t like
OpenID – it’s
   phishing
   heaven…
Hey.. Man… You got it
wrong… Phishing is a
  separate issue –
OpenID doesn’t try to
 address Phishing…
Then who’s
going to solve the
   problem of
     solving
   phishing…?
Heard of
  Information
 Cards…??? It’s
going to address
   the issue of
    phishing…

Recommended for you

I know Information
   cards… it’s an
application of WS-
      Trust….
We already decided
 to run an STS – so
we can easily become
an information cards
    provider too…..
Then what…???
Then – at the OpenID
  provider – we can
      ask users to
  authenticate with
 information cards –
     in a phishing
  resistant manner….

Recommended for you

Great.. That
sounds perfect….
Okay.. We are
almost done…
But… yet we need
to figure out how
  to implement
       this…
Remember guys….
The cost matters
   the most….

Recommended for you

Yes.. We can’t let
product vendors
     kill us…
So… let’s figure out
  available open
  source options
      first….
Let’s use WSAS to
   deploy our
     services…
Who knows more
 about WSAS….?

Recommended for you

It is an open
source, enterprise-
    ready, Web
  services engine
 based on Apache
      Axis2….
Authentication Module            PAP



         Authorization Module [PEP]


LDAP


                                         PDP

       Service   Service    Service
          A         B          C

                                      Policy Store
Now… What..
Anybody knows
an open source
XACMl engine….
WSO2 Identity
Server can do it
   for sure…

Recommended for you

It’s not just an
 XACML engine…
 we can use it as
    our OpenID
Provider as well…
Also… it comes
     with an
Information Card
    provider…
Wow… that looks
 perfect for us…
let’s see how this
   fits into our
   architecture
    diagram….
Authentication Module
                                           PAP


         Authorization Module [PEP]
                                           PDP

LDAP




       Service   Service    Service
          A         B          C      Policy Store

Recommended for you

Looks good….
hmm… a question
– can we deploy
 Identity Server
 over our LDAP
    server…?
Yes…. That’s a
must – we need to
 use our existing
   user store….
That’s easy – you
    can simply
 connect Identity
   Server to our
  LDAP server…
Exactly – it’s a
matter of a simple
 configuration…

Recommended for you

Okay…. That sounds
 good.. So… Identity
 Server will be our
   XACMl engine,
OpenID Provider and
also the Information
  Card provider….
Authentication Module
                                           PAP


  Authorization Module [PEP]
                                           PDP




Service   Service    Service   LDAP
   A         B          C             Policy Store
How about the
STS…? Can we use
Identity Server for
      that…?
One more thing…
we need the STS to
 be claim aware…

Recommended for you

… it should
  connect to our
 LDAP and pick
the user attributes
 from there… can
Identity Server do
         it?
Look at this… you
  can do it with
 Identity Server…
… it has this claim
     management
 component… we can
   easily configure
Identity Server STS to
   use our LDAP…
Authentication Module
                                      PAP




                                                     STS
  Authorization Module [PEP]
                                      PDP




Service   Service    Service   LDAP
   A         B          C             Policy Store

Recommended for you

Looks perfect….
  What else
  missing…
How about using
 WSO2 ESB… as
  the service
    bus…?
Yes… that helps
us implementing
     Message
   Interceptor
Gateway pattern
     easily…
See this… it comes
     with an
   Entitlement
   Mediator –
    which can
  connect to the
 Identity Server’s
 XACMl engine…

Recommended for you

Wow…!!! I like
whatever makes
 us less work…
Who knows
 more about
WSO2 ESB….?
It enables the loose-
coupling of services,
 connecting systems
    in a managed
     virtualized
      manner….
…. allowing
  administrators to
 control and direct
   communication
 without disrupting
existing applications

Recommended for you

PAP
   Authentication Module




                                      STS
 Authorization Module [PEP]    PDP




Service   Service    Service   LDAP         Policy Store
   A         B          C
Okay…. Now we
 need a policy
    store….
Let me.. Suggest
this time… WSO2
   Governance
 Registry will do
      that….
So.. Clever 
 I also found the
  same… It’s very
 much more than
just a policy store
 – or a registry…

Recommended for you

…It is an
enterprise-ready
   open source
   product for
 governing SOA
 deployments…
Sounds great.. Let’s
    update the
 diagram… we are
 almost getting to
    the end….
PAP
   Authentication Module




                                            STS
 Authorization Module [PEP]           PDP




Service    Service   Service   LDAP
   A          B         C
Looks great..!!!
Finally we came
up with a fully
   open source
solution for our
security design…

Recommended for you

Thanks a lot… for
      your
 participation…
Time for
questions… I am
 sure you guys
have many….???
…also you can reach us
          through…
       http://wso2.com,
http://wso2.com/about/contact
               &
       bizdev@wso2.com
Thank You…!!!

Recommended for you

More Related Content

Similar to Summer School - Security in SOA

Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
Abdulaziz Mohd
 
Ssl
SslSsl
Documentation20
Documentation20Documentation20
Documentation20
gebremedhinfitsum
 
Trust and Security, presented by Geoff Huston
Trust and Security, presented by Geoff HustonTrust and Security, presented by Geoff Huston
Trust and Security, presented by Geoff Huston
APNIC
 
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David JohanssonOWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson
David Johansson
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
Adv Prashant Mali
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Sylvain Maret
 
Secured SOA
Secured SOASecured SOA
Secured SOA
WSO2
 
Identity, Security and XML Web Services
Identity, Security and XML Web ServicesIdentity, Security and XML Web Services
Identity, Security and XML Web Services
Jorgen Thelin
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
Mumbai Academisc
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
101 Blockchains
 
Getting authentication right
Getting authentication rightGetting authentication right
Getting authentication right
Andre N. Klingsheim
 
WSO2 SOA Security
WSO2 SOA SecurityWSO2 SOA Security
WSO2 SOA Security
WSO2
 
Secured SOA
Secured SOASecured SOA
Secured SOA
Prabath Siriwardena
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
Forrester High School
 
SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications
nishchal29
 
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
Paris Open Source Summit
 
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies
Worteks
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
ByronKimani
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
Infinity Tech Solutions
 

Similar to Summer School - Security in SOA (20)

Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
Ssl
SslSsl
Ssl
 
Documentation20
Documentation20Documentation20
Documentation20
 
Trust and Security, presented by Geoff Huston
Trust and Security, presented by Geoff HustonTrust and Security, presented by Geoff Huston
Trust and Security, presented by Geoff Huston
 
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David JohanssonOWASP London 16 Jan-2017 - Identities Exposed by David Johansson
OWASP London 16 Jan-2017 - Identities Exposed by David Johansson
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
Secured SOA
Secured SOASecured SOA
Secured SOA
 
Identity, Security and XML Web Services
Identity, Security and XML Web ServicesIdentity, Security and XML Web Services
Identity, Security and XML Web Services
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
 
Getting authentication right
Getting authentication rightGetting authentication right
Getting authentication right
 
WSO2 SOA Security
WSO2 SOA SecurityWSO2 SOA Security
WSO2 SOA Security
 
Secured SOA
Secured SOASecured SOA
Secured SOA
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications SSL Implementation - IBM MQ - Secure Communications
SSL Implementation - IBM MQ - Secure Communications
 
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
 
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
Network Security CS2
Network Security CS2Network Security CS2
Network Security CS2
 

More from WSO2

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
WSO2
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
WSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
WSO2
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
WSO2
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
WSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
WSO2
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2
 

More from WSO2 (20)

Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 

Recently uploaded

Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 

Recently uploaded (20)

Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 

Summer School - Security in SOA