User Guide > Publishing Resources > Web Services Security > Supported Web Service Security Standards
 
Supported Web Service Security Standards
The following security policies, in the form of XML files, are provided for Web service clients.
Note: The transport level security policies (http basic and https basic) can be applied to a SOAP Web service, but they do not prevent an anonymous user from invoking the Web service. When using the basic security policies or when creating a custom security policy, consider this security issue.
Transport or Standard
System Security Policy
Description
HTTP
Http-Basic-Authentication.xml
Policy that requires a username and password when making a request.
HTTP
Http-Negotiate-Authentication.xml
Policy that enables Kerberos authentication.
HTTP
Http-NTLM-Authentication.xml
Policy that enables NTLM authentication.
HTTP
Http-UsernameToken-Digest.xml
Policy that validates against a UsernameToken header encrypted using a nonce value.
HTTP
Http-UsernameToken-Plain.xml
Policy that validates against a UsernameToken header. The password can be in plain text.
HTTPS
Https-Basic-Authentication.xml
Policy that requires a username and password when making a request.
HTTPS
Https-ClientCertificateRequire.xml
Policy that requires client certificates.
HTTPS
Https-UsernameToken-Digest.xml
Policy that validates against a UsernameToken header encrypted using a nonce value.
HTTPS
Https-UsernameToken-Plain.xml
Policy that validates against a UsernameToken header. The password can be in plain text.
SAML
Saml1.1-Bearer-Wss1.1.xml
Method in which the bearer assertion is used to facilitate single sign-on to the web browser.
SAML
Saml1.1-HolderOfKey-Wss1.0.xml
Method that establishes a correspondence between a SOAP message and the SAML assertions added to the SOAP message.
SAML
Saml1.1-SenderVouches-Wss1.1.xml
Subject-confirmation method that enables an attesting entity to vouch for the identity of a subject to a party that trusts the sender.
The following legacy WSS standards are supported:
OASIS Web Services Security: SOAP Message Security 1.0 Standard 200401, March 2004
Username Token profile V1.0
X.509 Token Profile V1.0
The TDV Server accepts certificate formats such as X.509 and JKS so that keys and message signatures do not need to be converted to ASCII before sending.
The TDV pipeline implementation allows SAML and Kerberos tokens to be passed through to message destinations, but TDV Server does not directly process or use SAML and Kerberos tokens.
WSS incorporates security features in the header of a SOAP message, and works in the application layer to help ensure end-to-end security for SOAP messages.
WSS UsernameToken SOAP header validation is independent of the message-security pipeline; the message security pipeline cannot process these contents.
Transport Layer Security (TLS) is supported to ensure message integrity and confidentiality through HTTPS, reducing performance overhead. If the messaging needs to pass through a proxy server, however, TLS should not be used without special handling considerations.