OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

wss message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Updated FAQ 1.2


1. Fixed format.
2. Fixed typo.
3. Added new question & answer about WSS 1.1.

Hal
Title: WSS TC FAQ
1. What is the rationale behind this standardization effort? What is the motivation of the sponsors/authors?

Web Services represent data using XML[1] and transmit it by means of SOAP[2]. Many applications which use SOAP have requirements for security services. However, existing security mechanisms do not provide all the capabilities required of these services in a SOAP/XML environment.

2. What is the scope of this effort? What is explicitly out-of-scope, and why?

The scope is message protection in a SOAP environment, specifically Authentication, Data Integrity and Data Confidentiality. It also enables these services, by introducing the abstraction of a Security Token, specifying how Tokens can be distributed in band, and providing a mechanism for referencing both in band and out of band Tokens. Other security services, such as Authorization and Audit Trail are out of scope.

3.Are there existing comparable or overlapping standards, or comparable standardization efforts currently under way (inside or outside OASIS)? How does the work of this technical committee relate to these? What distinguishes this TC from similar work? How do the differences add value?

Transport Layer Security[3] (TLS) and IP Security[4] (IPSec) can be used to provide some of the same services as WS-Security, but there are no existing or under development standards which provide the same capabilities.

 4. Is the product of this technical committee intended to be used in conjunction with other standards or complementary technologies? What are these? How does this work relate to these (is the usage of these complements mandatory? optional? restricted or profiled?)

WS-Security is intended to be used in a SOAP messaging environment. It is not applicable to other environments.

It is compatible with other Web Services standards, but their use is not required. Nor is the use of WS-Security required by other non-security Web Service standards. Depending on application requirements, security may not be required, or alternative security mechanisms may be used.

On the other hand, a number of other security-related Web Services specifications build on and extend WS-Security. Examples include: WS-Trust and WS-Secure Conversation.

WS-Security depends on the use of a number of other security standards which it explicitly references. These include XML Digital Signature[5], XML Encryption[6], X.509 PKI[7], Kerberos[8], OASIS SAML[9], ISO/IEC MPEG REL[10] and IETF MIME[11].

5. Can you give some example of concrete applications that will benefit from standardizing the specifications from this TC?

Any Web Services Application which requires message protection would benefit. E-commerce applications are a prominent example.

 6. Is it anticipated that TC deliverables will be broadly used, deployed, and/or implemented? Or are the deliverables intended for a narrow audience, possibly including only the TC membership?

WS-Security is already being broadly used.

 7. Do you see external factors that should help a broad acceptance and deployment of the specifications from this TC? And factors that may potentially hinder a broad acceptance and deployment?

The use of Web Services for applications where security services are required will tend to drive the use of WS-Security. Where security requirements are less complex, alternatives such as TLS may be used instead.

8. Do you know of companies or industry verticals that have already expressed interest in using the specification(s) produced by the TC in their products or services?

Most organizations which specify the use of Web Services identify WS-Security as the appropriate security standard.

 9. Regarding the adoption of this specification(s) by a vendor for its products: is this a decision that vendor companies can make individually, or are the interoperability aspects important enough to require industry-wide, coordinated adoption?

Dozens of vendors have already implemented WS-Security. The benefits of WS-Security require that different products interoperate, however this has been the case for several years.

10. Have the authors and their companies considered further ways to promote the produced specification(s) after completion (PR, marketing, campaigns, industry consortia....)

WS-Security is being promoted as a part of the promotion of the use of Web Services in general. The OASIS WSS TC sponsored an Interoperability Demonstration at the Gartner Conference in April of 2005.

11. What are the security implications, if any, of this effort?

WS-Security is intended to increase the security of SOAP messages passing over a network.

12. What new features are in WS-Security 1.1?

WS-Security 1.1 includes the following new features:
In addition, the text has been updated with errata and clarifications. Also the Attachments Profile and the Kerberos Token Profile are published for the first time.


 
[1]  Extensible Markup Language (XML) 1.0 (Third Edition) W3C Recommendation 4th February 2004, François Yergeau, Tim Bray, Jean Paoli, C. M. Sperberg-McQueen, Eve Maler

[2] W3C Note, "SOAP: Simple Object Access Protocol 1.1," 08 May 2000. W3C Recomendation, “http://www.w3.org/TR/2003/REC-soap12-part1-20030624/”, 24 June 2003

[3] Dierks, T. and C. Allen, "The TLS Protocol Version 1.0", RFC 2246, January 1999.

[4]  Kent, S. and R. Atkinson, "Security Architecture for the Internet Protocol", RFC 2401, November 1998

[5] W3C Recommendation, "XML Signature Syntax and Processing," 12 February 2002

[6] W3C Working Draft, "XML Encryption Syntax and Processing," 04 March 2002

[7] S. Santesson, et al,"Internet X.509 Public Key Infrastructure Qualified Certificates Profile," http://www.itu.int/rec/recommendation.asp?type=items&lang=e&parent=T-REC-X.509-200003-I

[8] J. Kohl and C. Neuman, "The Kerberos Network Authentication Service (V5)," RFC 1510, September 1993, http://www.ietf.org/rfc/rfc1510.txt .

[9] Oasis Standard, E. Maler, P.Mishra, and R. Philpott (Editors), Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V1.1, September 2003. Oasis Standard, S. Cantor, J. Kemp, R. Philpott, E. Maler (Editors), Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0, March 2005.

[10] ISO/IEC 21000-5:2004, "Information technology -- Multimedia framework (MPEG-21) -- Part 5: Rights Expression Language," http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=36095&ICS1=35&ICS2=40&ICS3=

[11] “Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies”, IETF RFC 2045, November 1996, http://www.ietf.org/rfc/rfc2045.txt.



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]