Scenarios Summary

Now that you have seen the making of the five key scenarios, Table 10-9 and Table 10-10 serve as a summary of their key elements. Table 10-9 lists the bindings used in each scenario. Note again that while technically you could use other bindings in almost all of the scenarios, my binding selections are aligned with the contexts in which the scenarios are used.

Table 10-9. Bindings and security scenarios

Binding

Intranet

Internet

B2B

Anonymous

None

BasicHttpBinding

No

No

Yes

No

Yes

NetTcpBinding

Yes

Yes

No

Yes

Yes

NetNamedPipeBinding

Yes

No

No

No

Yes

WSHttpBinding

No

Yes

Yes

Yes

Yes

WSDualHttpBinding

No

Yes

Yes

Yes

Yes

NetMsmqBinding

Yes

No

No

Yes

Yes

Table 10-10 shows how each of the security aspects defined at the beginning of this chapter (transfer security, service and client authentication, authorization, and impersonation) relates to each scenario.

Table 10-10. The security aspects of the various scenarios

Aspect

Intranet

Internet

B2B

Anonymous

None

Transport security

Yes

No

No

No

No

Message security

No

Yes

Yes

Yes

No

Service authentication

Windows

Certificate

Certificate

Certificate

No

Client authentication

Windows

ASP.NET

Certificate

No

No

Authorization

Windows

ASP.NET

No/ASP.NET

No

No

Impersonation

Yes

No

No

No

No

Get Programming WCF Services, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.