Scenarios Summary
Now that you have seen the making of the five key scenarios, Table 10-9 and Table 10-10 serve as a summary of their key elements. Table 10-9 lists the bindings used in each scenario. Note again that while technically you could use other bindings in almost all of the scenarios, my binding selections are aligned with the contexts in which the scenarios are used.
Table 10-9. Bindings and security scenarios
|
Binding |
Intranet |
Internet |
B2B |
Anonymous |
None |
|---|---|---|---|---|---|
|
|
No |
No |
Yes |
No |
Yes |
|
|
Yes |
Yes |
No |
Yes |
Yes |
|
|
Yes |
No |
No |
No |
Yes |
|
|
No |
Yes |
Yes |
Yes |
Yes |
|
|
No |
Yes |
Yes |
Yes |
Yes |
|
|
Yes |
No |
No |
Yes |
Yes |
Table 10-10 shows how each of the security aspects defined at the beginning of this chapter (transfer security, service and client authentication, authorization, and impersonation) relates to each scenario.
Table 10-10. The security aspects of the various scenarios
|
Aspect |
Intranet |
Internet |
B2B |
Anonymous |
None |
|---|---|---|---|---|---|
|
Transport security |
Yes |
No |
No |
No |
No |
|
Message security |
No |
Yes |
Yes |
Yes |
No |
|
Service authentication |
Windows |
Certificate |
Certificate |
Certificate |
No |
|
Client authentication |
Windows |
Certificate |
No |
No | |
|
Authorization |
Windows |
No/ASP.NET |
No |
No | |
|
Impersonation |
Yes |
No |
No |
No |
No |