Point-to-Point or End-to-End Security Transport-Level Security Message-Level Security

9-2 Concepts and Technologies Guide for Oracle Application Integration Architecture enforcement of web services security is in silo mode. Integration architects and developers can focus on integration logic, and the security architects and administrators can focus on security and management. Having security policies enforced through a centralized tool enables the administrators to ensure that the corporate rules are applied as well as to apply the policy changes centrally instead of applying them in each of the web services. With tools such as OWSM, an administrator creates security and management policies using a browser-based tool as and when needed during deployment. Security should be avoided unless it is absolutely needed as it degrades performance. A typical web service security can have multiple policies attached that can: ■ Decrypt the incoming XML message ■ Extract the users credentials ■ Perform an authentication for this user ■ Perform an authorization check for this user and this web service ■ Write a log record of the preceding information ■ Pass the message to the intended web service, if all steps are successful ■ Return an error and write an exception record, if all of the steps are not successful To apply the security policy, OWSM intercepts every incoming request to a web service and applies any one of the policy items listed previously. As the policy is executed, OWSM collects statistics about its operations and sends them to a monitoring server. The monitor displays errors, service availability data, and so on. As a result, each web service in an enterprise network can automatically gain security and management control, without the service developer coding extra logic.

9.1.1 Point-to-Point or End-to-End Security

Because a typical interaction in the Oracle AIA framework is part of multiple discrete interactions involving a service requester, client-specific Application Business Connector Service ABCS, Enterprise Business Service EBS, server-specific ABCS and the service provider, choosing a security model plays a critical role. Oracle AIA provides support for point-to-point and end-to-end security models. The architecture enables you to choose one over the other at the implementation time for each of the transactions. To choose a specific security model and implementation technique, the following issues should be discussed: ■ Can an entire transaction be considered as secured as long as the individual discrete transactions are secured? ■ Can the trusted model expressed previously be agreed to in principle, or must it be enforced using certificates provided by a certificate authority for the discrete interactions? ■ Can the communication-level security methods such as SSL encryption be used to secure the individual discrete transactions within a trusted model? Adoption of the industry-standard WS-Security security model is possible, provided that all participating applications in the transactions provide inherent support. Understanding Security 9-3

9.1.2 Transport-Level Security

Existing technologies such as SSL can be used to secure the transport channel. SSL enables two applications to securely connect over a network and authenticate each other. It also enables you to encrypt the data exchanged between the applications. In Oracles Web Services Security model, this transport security mechanism can be used to provide point-to-point security, data integrity, and data confidentiality.

9.1.3 Message-Level Security

Oracle AIA places strong emphasis on message-level security. For a web service, XML encryption provides security for applications that require a secure exchange of data. While SSL was considered the standard way to secure data exchanges, it has limitations. For example, assume that a document visits several web services before hitting its eventual endpoint. By using XML encryption, the document can be encrypted while at rest or in transport. Encrypting only portions of a document instead of the whole document is also possible.

9.2 Oracle AIA Methodology