O'Reilly logo

Programming WCF Services by Juval Lowy

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Scenarios Summary

Now that you have seen the making of the five key scenarios, Tables 10-9 and 10-10 serve as a summary of their key elements. Table 10-9 lists the bindings used in each scenario. Note again that while technically you could use other bindings in almost each scenario, my selection of the bindings is aligned with the context in which the scenario is used.

Table 10-9. Bindings and security scenarios

Binding

Intranet

Internet

B2B

Anonymous

None

BasicHttpBinding

No

No

Yes

No

Yes

NetTcpBinding

Yes

Yes

No

Yes

Yes

NetPeerTcpBinding

No

No

No

No

Yes

NetNamedPipeBinding

Yes

No

No

No

Yes

WSHttpBinding

No

Yes

Yes

Yes

Yes

WSFederationHttpBinding

No

No

No

No

No

WSDualHttpBinding

No

Yes

Yes

Yes

Yes

NetMsmqBinding

Yes

No

No

Yes

Yes

Table 10-10 shows how each of the security aspects defined at the beginning of this chapter (transfer security, service and client authentication, authorization, and impersonation) relates to each scenario.

Table 10-10. The aspects of the security scenarios

Aspect

Intranet

Internet

B2B

Anonymous

None

Transport

Yes

No

No

No

No

Message

No

Yes

Yes

Yes

No

Service authentication

Windows

Certificate

Certificate

Certificate

No

Client authentication

Windows

ASP.NET

Certificate

No

No

Authorization

Windows

ASP.NET

No/ASP.NET

No

No

Impersonation

Yes

No

No

No

No

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required