Scenarios Summary
Now that you have seen the making of the five key scenarios, Table 10-9 and Table 10-10 serve as a summary of their key elements. Table 10-9 lists the bindings used in each scenario. Note again that while technically you could use other bindings in almost all of the scenarios, my binding selections are aligned with the contexts in which the scenarios are used.
Table 10-9. Bindings and security scenarios
Binding |
Intranet |
Internet |
B2B |
Anonymous |
None |
---|---|---|---|---|---|
|
No |
No |
Yes |
No |
Yes |
|
Yes |
Yes |
No |
Yes |
Yes |
|
Yes |
No |
No |
No |
Yes |
|
No |
Yes |
Yes |
Yes |
Yes |
|
No |
Yes |
Yes |
Yes |
Yes |
|
Yes |
No |
No |
Yes |
Yes |
Table 10-10 shows how each of the security aspects defined at the beginning of this chapter (transfer security, service and client authentication, authorization, and impersonation) relates to each scenario.
Table 10-10. The security aspects of the various scenarios
Aspect |
Intranet |
Internet |
B2B |
Anonymous |
None |
---|---|---|---|---|---|
Transport security |
Yes |
No |
No |
No |
No |
Message security |
No |
Yes |
Yes |
Yes |
No |
Service authentication |
Windows |
Certificate |
Certificate |
Certificate |
No |
Client authentication |
Windows |
Certificate |
No |
No | |
Authorization |
Windows |
No/ASP.NET |
No |
No | |
Impersonation |
Yes |
No |
No |
No |
No |
Get Programming WCF Services, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.