Scenarios Summary
Now that you have seen the making of the five key scenarios, Tables 10-9 and 10-10 serve as a summary of their key elements. Table 10-9 lists the bindings used in each scenario. Note again that while technically you could use other bindings in almost each scenario, my selection of the bindings is aligned with the context in which the scenario is used.
Table 10-9. Bindings and security scenarios
Binding |
Intranet |
Internet |
B2B |
Anonymous |
None |
---|---|---|---|---|---|
|
No |
No |
Yes |
No |
Yes |
|
Yes |
Yes |
No |
Yes |
Yes |
|
No |
No |
No |
No |
Yes |
|
Yes |
No |
No |
No |
Yes |
|
No |
Yes |
Yes |
Yes |
Yes |
|
No |
No |
No |
No |
No |
|
No |
Yes |
Yes |
Yes |
Yes |
|
Yes |
No |
No |
Yes |
Yes |
Table 10-10 shows how each of the security aspects defined at the beginning of this chapter (transfer security, service and client authentication, authorization, and impersonation) relates to each scenario.
Table 10-10. The aspects of the security scenarios
Aspect |
Intranet |
Internet |
B2B |
Anonymous |
None |
---|---|---|---|---|---|
Transport |
Yes |
No |
No |
No |
No |
Message |
No |
Yes |
Yes |
Yes |
No |
Service authentication |
Windows |
Certificate |
Certificate |
Certificate |
No |
Client authentication |
Windows |
ASP.NET |
Certificate |
No |
No |
Authorization |
Windows |
ASP.NET |
No/ASP.NET |
No |
No |
Impersonation |
Yes |
No |
No |
No |
No |
Get Programming WCF Services now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.