{"id":60,"date":"2012-07-14T12:13:00","date_gmt":"2012-07-14T12:13:00","guid":{"rendered":"http:\/\/anwi.gmbh\/?p=60"},"modified":"2023-09-17T14:14:46","modified_gmt":"2023-09-17T14:14:46","slug":"ws-security-unveiled-one-of-morecomplex","status":"publish","type":"post","link":"https:\/\/anwi.gmbh\/?p=60&lang=de","title":{"rendered":"WS-Security unveiled"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"text-align: center;\" align=\"center\"><b>&nbsp;<\/b><\/p>\n<div class=\"separator\" style=\"clear: both; text-align: right;\"><a style=\"clear: left; float: left; margin-bottom: 1em; margin-right: 1em;\" href=\"http:\/\/1.bp.blogspot.com\/-uk9MDJ8oKvk\/UAFgUbRlYoI\/AAAAAAAAAA0\/mna5rRwjrns\/s1600\/WS-Security_unveiled.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/anwi.gmbh\/wp-content\/uploads\/2012\/07\/WS-Security_unveiled.png\" width=\"400\" height=\"183\" border=\"0\"><\/a><i style=\"background-color: white;\">One of the more<br \/>\ncomplex examples that ship with WLS is a WS-Trust based authentication of a web<br \/>\nservice using SAML assertions. This example is quite easy to setup and run and<br \/>\nthe example\u2019s documentation gives a basic understanding of what is going on.<br \/>\nBut we want to look deeper and shed light on the complexity that is hidden<br \/>\nbehind SSL, WS-Trust and SAML authentication. In a first step we separate the<br \/>\nscenario from the example server and integrate it into eclipse, to create an<br \/>\nisolated laboratory environment for further investigation. We will use<br \/>\nWireshark to analyze the actual flow of messages on the wire. We even look<br \/>\ninside the SSL streams to identify the WS-Trust tokens and SAML assertions as<br \/>\nthey are passed between the participants.<\/i><\/div>\n<div>&nbsp;<\/div>\n<div>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>The WS-Trust specification, which is part of the WS-* stack of specifications for web services, was approved as OASIS standard in March 2007. Meanwhile it is generally accepted as an industry standard for implementing secure, trusted, and federated message exchange between service providers and consumers. So now is a good time to have a closer look at this technology. Despite the complexity of this topic, it is fairly easy to set up running examples of WS-Trust based java implementations using the examples that ship with Weblogic Server. We want to have a closer look at one of these examples: \u201cUsing SAML 1.1 Bearer Assertion for Authentication Case\u201d<\/p>\n<\/div>\n<p><strong>Read the full article as PDF:<\/strong> <a href=\"https:\/\/anwi.gmbh\/wp-content\/uploads\/2012\/07\/WS-Security_unveiled.pdf\" target=\"_blank\" rel=\"noopener\">WS-Security_unveiled.pdf (1,6 MB)<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Links to Files used in the Project:<\/strong><\/p>\n<ul>\n<li>Text file containing the output from building and running the project: <a href=\"https:\/\/anwi.gmbh\/wp-content\/uploads\/2012\/07\/saml_bearer11ssl.output.txt\">saml_bearer11ssl.output.txt<\/a><\/li>\n<li class=\"MsoNormal\" style=\"text-align: left;\">WLS example documentation as PDF: <a href=\"https:\/\/anwi.gmbh\/wp-content\/uploads\/2012\/07\/WLS_Example_SAML_Bearer11ssl.pdf\">WLS_Example_SAML_Bearer11ssl.pdf (177 KB)<\/a><\/li>\n<li class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"text-align: left;\">Eclipse project file: <\/span><a style=\"text-align: left;\" href=\"https:\/\/anwi.gmbh\/wp-content\/uploads\/2012\/07\/saml_bearer11ssl.zip\" target=\"_blank\" rel=\"noopener\">saml_bearer11ssl.zip (160 KB)<\/a><\/li>\n<\/ul>\n<div class=\"MsoNormal\" style=\"text-align: left;\" align=\"center\">&nbsp;<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; One of the more complex examples that ship with WLS is a WS-Trust based authentication of a web service using SAML assertions. This example is quite easy to setup and run and the example\u2019s documentation gives a basic understanding of what is going on. But we want to look deeper and shed light on &hellip; <a href=\"https:\/\/anwi.gmbh\/?p=60&#038;lang=de\" class=\"more-link\"><span class=\"screen-reader-text\">\u201eWS-Security unveiled\u201c<\/span> weiterlesen<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"series":[],"class_list":["post-60","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/anwi.gmbh\/index.php?rest_route=\/wp\/v2\/posts\/60","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/anwi.gmbh\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anwi.gmbh\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anwi.gmbh\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/anwi.gmbh\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=60"}],"version-history":[{"count":8,"href":"https:\/\/anwi.gmbh\/index.php?rest_route=\/wp\/v2\/posts\/60\/revisions"}],"predecessor-version":[{"id":760,"href":"https:\/\/anwi.gmbh\/index.php?rest_route=\/wp\/v2\/posts\/60\/revisions\/760"}],"wp:attachment":[{"href":"https:\/\/anwi.gmbh\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=60"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anwi.gmbh\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=60"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anwi.gmbh\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=60"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/anwi.gmbh\/index.php?rest_route=%2Fwp%2Fv2%2Fseries&post=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}