Username Password Kerberos PKI X509 Certificates

following we will only enumerate the authentication method and point to the WSS token profile

8.1.1 Username Password

Username Password authentication is described in the Username Token Profile v1.1 available at the following address: http:www.oasis-open.orgcommitteesdownload.php16782wss-v1.1-spec-os- UsernameTokenProfile.pdf Although this authentication method is quite trivial, the above mentioned specification does a good job by adding features that help protecting the password and avoiding reply attacks. These features include the use of hashed passwords, nonces and or creation dates. Furthermore a key derivation algorithm is presented which can be used when computing Message Authentication Codes MACs or as a symmetric key for encryption. This authentication method was used during OWS4, see section 9.1.1 for details.

8.1.2 Kerberos

Kerberos is a computer network authentication protocol which allows individuals communicating in an insecure network to prove their identity to one another in a secure fashion. Kerberos is a project originating from MIT, which has various implementations, one of them being used in Microsoft Windows networks. The Kerberos Token Profile v1.1 with errata is available at the following address: http:docs.oasis-open.orgwssv1.1wss-v1.1-spec-errata-os-KerberosTokenProfile.pdf The document describes the use of Kerberos tokens with respect to WS-Security. It specifies how to encode Kerberos tickets in SOAP messages and how use these tokens for digital signatures and encryption. This authentication method was not used during OWS4.

8.1.3 PKI X509 Certificates

An X.509 certificate specifies a binding between a public key and a set of attributes that includes at least a subject name, issuer name, serial number and validity interval. Public Key Infrastructures based on X.509 certificates are widely deployed today for authentication usually done by means of digital signatures and encryption. The use of X.509 authentication framework in the context of SOAP web services is described in X.509 Token Profile v1.1 with errata, available at the following address: http:docs.oasis-open.orgwssv1.1wss-v1.1-spec-errata-os-x509TokenProfile.pdf The document describes how X.509 certificates or references to them can be attached to SOAP messages. Furthermore the document describes how digital signatures and encryption blocks can reference keys attached in this fashion. Copyright © 2007 Open Geospatial Consortium 37 If a digital signature is verified and the key used for the digital signature is associated to an identity, a service provider can assert, using the X.509 certificate attached to the message and assuming that this certificate is valid the identity of the message emitter. Authentication via X.509 certificates has been used during OWS4, see section 9.1.2 for details.

8.1.4 SAML