Part II. Building blocks of SOA security

Part II introduces the techniques you can use for addressing the following fundamental concerns of SOA security:

  • Claiming and verifying identity (authentication)
  • Protecting confidentiality of messages (chapter 6)
  • Verifying message integrity and guarding against repudiation (chapter 7)

The techniques we will describe in this part form the basis for most of the discussion in part III, where we discuss enterprise SOA security. In this sense, we can think of the techniques described in part II as the fundamental building blocks of SOA security. ...

Get SOA Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.