Chapter 4. Protecting an Enterprise WCF Service

After completing this chapter, you will be able to:

  • Describe the different aspects of security that you should consider when implementing a WCF service.

  • Explain how to provide privacy and integrity of messages at the message level and at the transport level when communicating between a client application and a WCF service.

  • Explain how to configure a WCF service to authenticate users when running in a Windows environment and how a client application can provide a user’s credentials to a WCF service for authentication.

  • Describe how to define and use roles to authorize access to operations in a WCF service.

  • Summarize how a WCF service can use impersonation to provide fine-grained access control over resources ...

Get Microsoft® Windows® Communication Foundation Step by Step now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.