In This Chapter
Chapter 2, “The Fundamentals,” which covered the fundamentals of the Windows Communication Foundation, showed that the technology makes security simple. Just opting to use the
WSHttpBinding in configuring a service ensures not only that communications with the service are kept confidential, but also that the identities of the users of the clients are conveyed to the service so that the service can evaluate whether to grant the clients access to its resources.
More generally, by configuring the binding of a service, one can select how clients of the service are to be authenticated and how communications with the service are to be kept confidential. The built-in options for how a client may ...