Part II. Building blocks of SOA security

Part II introduces the techniques you can use for addressing the following fundamental concerns of SOA security:

  • Claiming and verifying identity (authentication)
  • Protecting confidentiality of messages (chapter 6)
  • Verifying message integrity and guarding against repudiation (chapter 7)

The techniques we will describe in this part form the basis for most of the discussion in part III, where we discuss enterprise SOA security. In this sense, we can think of the techniques described in part II as the fundamental building blocks of SOA security. ...

Get SOA Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.