Geeks With Blogs
Pradeep Loganathan Distributed
A SOAP message using WS-Security is protected by security tokens. These security tokens can be obtained in a variety of ways such as username/password or x509 certificate, Kerberos e.t.c. Even though the SOAP message is now protected the recipient may not be able to use the token due to 1. Security token format incompatibility: The recipient may find ......

XML encryption is used to ensure confidentiality of XML documents. With XML encryption you can either encrypt the whole XML document or just portions of the document. The .net implementation of XML encryption is totally w3c compliant. XML encryption scores over transport level security in two areas by ensuring that only certain portions of the document ......

using System; using System.Collections.Generic; using System.Text; using System.IO; using System.Xml; using System.Security; using System.Security.Cryptography; using System.Security.Cryptograph... namespace XMLDIGSIG { class Class1 { static void Main(string[] args) { TripleDES tdes = new TripleDESCryptoServiceProvi... EncryptXML(tdes); DecryptXML(tdes); ......

As web services are increasingly crossing organizational and domain boundaries the problems of representing identity and its associated attributes across these boundaries is becoming more essential. A system is secure if it knows all its users and all information is secure if the information is intact, non-tampered and can be proven to be confidential. ......

Web services can be secured using either Transport level security or Message level security. The main goal of transport level security is to establish a secure pipe between two endpoints and all messages that go into and out of the pipe are secured from point to point. The advantages of transport level security are The technologies for Transport level ......

Foundations of Message Level Security The main aim of securing Web services is to secure the messages sent and consumed by the services. This depends on using standards such as XML signature and XML encryption. To understand XML signature and XML encryption we need to understand the principles of shared Key cryptography and public Key cryptography. ......

XML signature and XML encryption are used to ensure the integrity & confidentiality of SOAP messages and are the basic pillars of WS-security. A XML signature is a method of associating a Key to data using XML to represent the signature. XML signatures can be applied to any digital content. Once a XML document is signed any attempts to modify the contents ......

using System.IO; using System.Xml; using System.Security; using System.Security.Cryptography; using System.Security.Cryptograph... namespace XMLDIGSIG { class Program { static void Main(string[] args) { SignXML(); ValidateXML(); Console.ReadKey(); } private static void SignXML() { XmlDocument doc = new XmlDocument(); doc.Load("xmlfile1.xml"); SignedXml ......

27
Mar 06
The current trend with SOA required developers to reorient thier thinking in terms of messages and contracts and schemas rather than in terms of pure objects. This is a major change for a lot of dev's especially for people like me. so i am back to looking at schemas , contracts, undertanding wsdl & soap. While quite a few out there may argue that ......

To understand how a two phase commit works we need to understand all the actors involved in a two phase commit Resource Manager: A resource manager manages either a durable resource such as a database, (e.g. SQL Server), a queuing system (e.g. MSMQ) or a volatile resource (e.g. in-memory transacted hash table) and provides facilities for the transaction ......

To understand how a two phase commit works we need to understand all the actors involved in a two phase commit Resource Manager: A resource manager manages either a durable resource such as a database, (e.g. SQL Server), a queuing system (e.g. MSMQ) or a volatile resource (e.g. in-memory transacted hash table) and provides facilities for the transaction ......

In .Net 1.1 it is possible to use the some of the services provided by System.EnterpriseServices without having to inherit from serviced component. For example of you want to use the transaction support functionality you could do this. public void DoWork() { System.EnterpriseServices.S... sc; try { sc = new ServiceConfig(); sc.Transaction = ......

Was playing around with MSDTC today and had a a big gotcha. If you get any issues with the distrubuted transaction check this. Go to Component services MMC and right click on My Computer --> Properties and then click on the MSDTC tab and then on Security configuration . Make sure that “Network DTC access ” is checked and so is “No ......

The declarative model has the following problems Forces you to inherit from Serviced component limiting any class modeling that you may want to implement. Always makes use of MSDTC even if the transaction is local and restricted to only one resource. MSDTC is mainly used for transactions that span multiple resources and is a huge overhead on transactions ......

The declarative model has the following problems Forces you to inherit from Serviced component limiting any class modeling that you may want to implement. Always makes use of MSDTC even if the transaction is local and restricted to only one resource. MSDTC is mainly used for transactions that span multiple resources and is a huge overhead on transactions ......

When transactions span across multiple resources each additional resource increases the chances of failure. For transactions spanning across multiple resources windows uses the MSDTC service. MSDTC coordinates between all the resource managers involved in the transaction using OLE TX . namespace TestTrans1 { [Transaction] class Worker : ServicedComponent ......

Explicit Transactions: Explicit transactions are basically ADO.net based transactions where you need to explicitly enlist & manage a transaction. If you are transaction spans a single resource you should be using this . The sample below lists a Explicit transaction. using System; using System.Data.SqlClient; namespace TransTest1 { class Class1 { ......

Copyright © Pradeep Loganathan | Powered by: GeeksWithBlogs.net