Security Middleware

Linda Volonino and Richard P. Volonino, Canisius College

Introduction

Security Middleware Architecture

The CIA Triad and Access Control

Security Middleware Processes and Services

Authentication

Authorization and Directories

Application Programming Interfaces

Common Object Request Broker Architecture

Application-Based Authentication

Single Sign-On and Kerberos

Secure Socket Layer

Public Key Infrastructure and Message-Oriented Middleware

Network-Based Authentication

Lightweight Directory Access Protocol

Wired Equivalent Privacy

Virtual Private Networking

Internet Protocol Security

Web Services Security

Glossary

Cross References

References

Further Reading

INTRODUCTION

Security Middleware Architecture

Middleware refers to a broad range of software that enables communication or data exchange between network-based applications across networks. This type of software is often described as “glue” because it connects or integrates business-critical software applications to other applications. With today's networked-based applications— especially enterprise resource planning (ERP), supply chain management (SCM), customer relationship management (CRM), and business-to-business (B2B) and business-to-consumer (B2C) electronic commerce (e-commerce)—business operations depend on secured data transfers between these applications. Figure 1 shows a generic security middleware infrastructure. This diagram shows security middleware acting as an integrator of applications and data ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.