Index
[SYMBOL][A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
SAML (Security Assertion Markup Language)scenarios.
[See School of Fine Art example] schema types for messagesSchool of Fine Art example directory-based discovery example dynamic discovery encryption example endpoint references enumeration example FaultTo addresses HTTP message headers identifiers, message Infoset for message exchanges metadata mustUnderstand attribute overview processing semantics referencing addresses reply addresses secure conversation example security signatures for SOAP example trust creation water fountains example WS-AtomicTransaction WS-Eventing in WS-Management WS-Policy for WS-Transfer example WSDL for SCTs (Security Context Tokens) 2ndsecurity assertion proof requirement attacks against authentication 2nd 3rd 4th authorization 2nd autonomous services implications Basic Security Profile claims confidentiality 2nd 3rd contexts domainsencryption for.
[See encryption] end-to-end message security requirements existing approaches, reuse of hash creation identities integrity 2nd message-level models supported overviewpolicies.
[See WS-Policy] principals relay services requestors, federated School of Fine Art example serialization issues sign-out operationssignature for.
[See signatures]specification.
[See WS-Security] system federationstokens.
[See tokens, security] transport-level, limitations of trust-based tokenstrust.
[See WS-Trust] WS-Federation WS-SecureConversation 2nd X.509 2nd XML Signature Security Assertion Markup Language (SAML) Security Context Tokens (SCTs) 2nd security contexts 2nd security policies [See also WS-Policy] Security Token Service (STS) 2ndsecurity tokens.
[See tokens, security] sequences of messagesserialization defined security issuesservice autonomy.
[See autonomous services] service elements, WSDL service orientation services defined shared secrets sign-out operations 2ndsignatures canonicalization defined elements for message body encryption with multiple School of Fine Art example security tokens for X.509 tokens for XML Signature signed security tokens Single Sign On (SSO) smart requestorsSOAP Action elements 2nd 3rd 4th address blocks advantages of attachments example autonomous services with Body elements 2nd Coordination Context header blocks encryption issues Envelope elements 2nd Header elements 2nd 3rd 4th header mechanism 2nd HTTP message headers intermediary nodes message elements message exchange patterns message orientation based on message transmittal messaging specifications MIME with MTOM 2nd mustUnderstand attribute 2nd 3rd Next role nodes 2nd processing model protocol composability with purpose relay attribute roles School of Fine Art message example transport independence UltimateReceiver role WS-Addressing bindings XOP specification profiles spontaneous coordination spoofing attacks SSO (Single Sign On) STAR (Secure Transacted and Reliable) state management STS (Security Token Service) 2ndsubscriptions batched delivery batched events ending subscriptions event sinks with expiration dates GetStatus messages GetStatusResponse messages message scenario Notification messages Pull delivery Renew messages RenewReponse messages Subscribe messages SubscribeResponse messages 2nd Trap Delivery messages unsubscribe messages unsubscribe response messages WS-Eventing WS-Management symmetric key algorithms synchronous request/response pattern 2ndsystems management applications.
[See WS-Management] systems, defined