O'Reilly logo

SOA Governance in Action: REST and Web Service Architectures by Jos Dirksen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Security policies

This chapter covers

  • Providing HTTPS-based access to your services
  • Validating message integrity using signatures
  • Using federated authentication and authorization using OpenAM
  • Implementing an OAuth-based scenario

Policies that deal with security are important for any organization. If you don’t have strict rules that determine how security is implemented within your services, you run a big risk of exposing confidential information. Your customers need to be sure that their credentials are handled correctly and the integrity of the information they send and receive from your service can be guaranteed. Imagine that your company provides sensitive information to its consumers. For instance, your company provides a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required