When you deploy web services, understand the important security considerations. The default configuration when using HTTP is insecure, as it is for all information in web service calls sent between the client and the server in plain text over the network using the HTTP protocol. This includes not only application data, such as ticket descriptions and contact names, but also web service session identifiers (SID). Depending upon the web service application login methods used, it can include passwords.
We recommand that Administrators deploying web services review this information carefully, and to take additional configuration steps at the application and network levels to secure their web service environment.
Important! The default web service configuration used with HTTP is insecure and vulnerable to security threats, which can include password discovery, session fixation, and data spying, among others.
There are three interrelated key security considerations in deploying Web Services:
The following describes each security feature:
Authentication with username/password methods may be disabled using the following security configuration command:
disable_user_logon
Before enabling this option, the administrator needs to determine if each web service client for which an enterprise is requesting Web Services access, can actually provide support for the alternative authentication method, which is the PKI-based login method. The key advantage to the PKI technology is that Web Services client applications do not require maintained system user accounts, that is; the maintenance, storage, and transmission of their passwords.
Important! We recommend using SSL (or https) when deploying Web Services to protect the application-level authentication exchanges and subsequent transmissions of session identification and data.
require_secure_logon
This security feature requires you to use SSL (or https) for calling the Login() and LoginService() methods. This feature also provides a handy method for protecting the username and password, while avoiding the overhead of SSL for the rest of the web services.
Important! If you use the require_secure_logon command, the Web Services application will not confirm that communications protocol-level security is enforced for methods other than Login() and LoginService(). Unless other precautions are taken, the other Web Services methods may be invoked insecurely, causing greater vulnerability to security threats.
require_secure_connection
This security feature requires you to use SSL to access any part of the web service. If https is required but not used, then a SOAP Fault with code UDS_SECURE_CHANNEL_REQUIRED is returned.
Note: For information about how to configure SSL, see your J2EE Servlet Container documentation.
|
Copyright © 2013 CA.
All rights reserved.
|
|