7 Interoperability with Oracle Service Bus 10g Security Environments
This chapter includes the following sections:
7.1 Understanding the Interoperability of Oracle Service Bus 10g Security Environments
In Oracle Service Bus 10g, you attach policies to configure your security environment for inbound and outbound requests. Oracle Service Bus uses the underlying WebLogic security framework as building blocks for its security services.
For information about configuring and attaching policies, see "Using WS-Policy in Oracle Service Bus Proxy and Business Services" in Oracle Service Bus Security Guide at http://download.oracle.com/docs/cd/E13159_01/osb/docs10gr3/security/ws_policy.html
.
Note:
Ensure that you have downloaded and applied the TYBN and U37Z patches released for Oracle Service Bus 10.3 using the patch tool.
OWSM policies and Oracle Service Bus 10g interoperability scenarios are described in the following sections:
7.1.1 OWSM Policies and Assertions
With OWSM 14c, you attach policies to web service endpoints. Each policy consists of one or more assertions, defined at the domain-level, that define the security requirements. A set of predefined policies and assertions are provided out-of-the-box.
For more information about:
-
OWSM predefined policies, see "Predefined Policies" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
Configuring and attaching OWSM 14c policies, see "Securing Web Services" and "Attaching Policies" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
Configuring and attaching Oracle Service Bus 10g policies, see "Using WS-Policy in Oracle Service Bus Proxy and Business Services" in Oracle Service Bus Security Guide at
http://download.oracle.com/docs/cd/E13159_01/osb/docs10gr3/security/ws_policy.html
.
7.1.2 Interoperability Scenarios for Oracle Service Bus 10g
You can review the different scenarios for interoperability between OWSM 14c and Oracle Service Bus 10g.
The Oracle Service Bus 10g interoperability scenarios are based on the following security requirements: authentication, message protection, and transport.
Note:
In the following scenarios, ensure that you are using a keystore with v3 certificates. By default, the JDK 1.5 keytool generates keystores with v1 certificates.
In addition, ensure that the keys use the proper extensions, including DigitalSignature, Non_repudiation, Key_Encipherment, and Data_Encipherment.
The following table describes the OWSM 14c service policy and Oracle Service Bus 10g client policy interoperability scenarios:
Table 7-1 OWSM 14c Service Policy and Oracle Service Bus 10g Client Policy Interoperability
Identity Token | WS-Security Version | Message Protection | Transport Security | Service Policy | Client Policy |
---|---|---|---|---|---|
Username |
1.0 |
Yes |
No |
|
|
SAML |
1.0 |
Yes |
No |
|
|
SAML or Username |
1.0 and 1.1 |
No |
Yes |
|
|
Mutual Authentication |
1.0 |
Yes |
No |
|
|
The following table describes the Oracle Service Bus 10g service policy and OWSM 14c client policy interoperability scenarios:
Table 7-2 Oracle Service Bus 10g Service Policy and OWSM 14c Client Policy Interoperability
Identity Token | WS-Security Version | Message Protection | Transport Security | Service Policy | Client Policy |
---|---|---|---|---|---|
Username |
1.0 |
Yes |
No |
|
|
SAML |
1.0 |
Yes |
|
|
|
Mutual Authentication |
1.0 |
Yes |
No |
|
|
7.2 Implementing a Username Token with Message Protection (WS-Security 1.0) for Oracle Service Bus 10g Client
The Username Token with Message Protection policy conforms to the WS-Security 1.0 standard. This policy is implemented to achieve the interoperability of OWSM 14c web service with Oracle Service Bus 10g client and the interoperability of Oracle Service Bus 10g web service with OWSM 14c client.
The following interoperability scenarios are supported:
-
OWSM 14c web service with Oracle Service Bus 10g client
-
Oracle Service Bus 10g web service with OWSM 14c client
For either scenario, you must perform prerequisite tasks for the WebLogic Server on which Oracle Service Bus is running. See Configuring Prerequisites for Interoperability (Username token with WS-Security 1.0 Message Protection).
After completing the prerequisite tasks, see the detailed instructions for your supported scenario:
7.2.1 Configuring Prerequisites for Interoperability (Username token with WS-Security 1.0 Message Protection)
Before you implement a username token with WS-Security 1.0 message protection for interoperability between OWSM 14c and Oracle Service Bus 10g, you must complete a number of high-level tasks.
To configure prerequisites for interoperability:
-
Copy the
default-keystore.jks
andtrust.jks
files to your domain directory.The
default-keystore.jks
is used to store public and private keys for SOAP messages within the WebLogic Domain. The trust.jks
is used to store private keys, digital certificates, and trusted certificate authority certificates that are used to establish and verify identity and trust in the WebLogic Server environment. -
Invoke the WebLogic Remote Console.
-
Configure the Custom Identity and Custom Trust keystores.
-
Configure SSL.
-
Specify the private key alias, as required. For example:
oratest
. -
Configure a credential mapping provider.
Create a PKICredentialMapper and configure it as follows (leave all other values set to the defaults):
-
Keystore Provider: N/A
-
Keystore Type: jks
-
Keystore File Name: default_keystore.jks
-
Keystore Pass Phrase: <password>
-
Confirm Keystore Pass Phrase: <password>
-
-
Restart Oracle WebLogic Server.
-
Invoke the OSB Console. For example:
http://<host name>:<port number>/servicebus
-
Create a ServiceKeyProvider.
-
Specify Encryption Key and Digital Signature Key, as required.
You must use different keys on the OWSM and Oracle Service Bus servers. You can use the same key for encryption and signing, if desired.
7.2.2 Configuring an OWSM 14c Web Service and an Oracle Service Bus 10g Client (Username Token with Message Protection)
You can implement a username token with message protection (WS-Security 1.0) using an OWSM 14c web service and an Oracle Service Bus 10g client.
The following topics describe how to configure the OWSM 14c web service and then the Oracle Service Bus 10g client:
7.2.2.1 Configuring OWSM 14c Web Service for Oracle Service Bus 10g Client (Username Token with WS-Security 1.0 Message Protection)
You can configure an OWSM 14c web service to implement username token with WS-Security 1.0 message protection for interoperability with an Oracle Service Bus 10g client.
To configure the OWSM 14c web service:
-
Clone the following policy:
wss10_username_token_with_message_protection_service_policy
.For more information, see "Cloning a Web Service Policy" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
Edit the policy settings, as follows:
-
Set Encryption Key Reference Mechanism to
issuerserial
. -
Set Algorithm Suite to Basic128Rsa15 to match the algorithm suite used for Oracle Service Bus.
-
Enable the Include Timestamp configuration setting.
-
Set Is Encrypted to false for the Username token element only.
-
-
Attach the policy to the web service.
For more information, see "Attaching Policies" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
7.2.2.2 Configuring Oracle Service Bus 10g Client (Username Token with Message Protection)
You can configure an Oracle Service Bus 10g client to implement username token with WS-Security 1.0 message protection for interoperability with an OWSM 14c web service.
To configure the Oracle Service Bus 10g client:
Additional Information
"Cloning a Web Service Policy" in Securing Web Services and Managing Policies with Oracle Web Services Manager
"Using WS-Policy in Oracle Service Bus Proxy and Business Services" in Oracle Service Bus Security Guide at http://download.oracle.com/docs/cd/E13159_01/osb/docs10gr3/security/ws_policy.html
7.2.3 Configuring an Oracle Service Bus 10g Web Service and an OWSM 14c Client (Username Token with Message Protection)
You can implement a username token with WS-Security 1.0 message protection using Oracle Service Bus 10g web service and an OWSM 14c client.
The following topics describe how to configure the Oracle Service Bus 10g web service and then the OWSM 14c client:
7.2.3.1 Configuring Oracle Service Bus 10g Web Service (Username Token with Message Protection)
You can configure an Oracle Service Bus 10g web service to implement username token with message protection for interoperability with an OWSM 14c client.
To configure the Oracle Service Bus 10g web service:
-
Clone the
Encrypt.xml
andSign.xml
policy files.For example, copy the files to
myEncrypt.xml
andmySign.xml
. It is not recommended to edit the predefined policy files directly. -
Edit the encryption algorithm in the
myEncrypt.xml
file to prevent encryption compliance failure, as follows:<wssp:Target> <wssp:EncryptionAlgorithm URI="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/> <wssp:MessageParts Dialect="http://schemas.xmlsoap.org/2002/12/wsse#part"> wsp:Body() </wssp:MessageParts> </wssp:Target>
For more information, see "Using WS-Policy in Oracle Service Bus Proxy and Business Services" in Oracle Service Bus Security Guide at
http://download.oracle.com/docs/cd/E13159_01/osb/docs10gr3/security/ws_policy.html
. -
Edit the
mySign.xml
policy file attached to the proxy service request only to specify that the security token is unsigned:<wssp:Integrity SignToken="false">
Also, for SOA clients only, comment out the target for system headers, as shown:
<!-- wssp:Target> <wssp:DigestAlgorithm URI="http://www.w3.org/2000/09/xmldsig#sha1" /> <wssp:MessageParts Dialect="http://www.bea.com/wls90/security/policy/wsee#part"> wls:SystemHeaders() </wssp:MessageParts> </wssp:Target -->
-
Create a web service application that invokes the Oracle Service Bus routing service.
7.2.3.2 Configuring OWSM 14c Client for Oracle Service Bus 10g (Username Token with WS-Security 1.0 Message Protection)
You can configure an OWSM 14c client to implement username token with WS-Security 1.0 message protection for interoperability with an Oracle Service Bus 10g web service.
To configure the OWSM 14c client:
-
Clone the following policy:
wss10_username_token_with_message_protection_client_policy
.Edit the policy settings, as follows:
-
Set Encryption Key Reference Mechanism to issuerserial.
-
Set Recipient Encryption Key Reference Mechanism to issuerserial.
-
Set Algorithm Suite to Basic128Rsa15 to match the algorithm suite used for Oracle Service Bus.
-
Disable the Include Timestamp configuration setting.
-
Set Is Encrypted to false.
-
Leave the default configuration set for message signing and encryption.
For more information, see "Cloning a Web Service Policy" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
-
Attach the policy to the web service client.
-
Invoke the web service from the client.
For more information, see "Attaching Policies" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
7.3 Implementing a SAML Sender Vouches Token with WS-Security 1.0 Message Protection for Oracle Service Bus 10g Client
The SAML Sender Vouches Token with Message Protection policy conforms to the WS-Security 1.0 standard. This policy is implemented to achieve the interoperability of OWSM 14c web service with Oracle Service Bus 10g client and the interoperability of Oracle Service Bus 10g web service with OWSM 14c client.
The following interoperability scenarios are supported:
-
OWSM 14c web service with Oracle Service Bus 10g client
-
Oracle Service Bus 10g web service with OWSM 14c client
For either scenario, you must complete prerequisite tasks for the WebLogic Server on which Oracle Service Bus is running. For more information on the prerequisites, see Configuring Prerequisites for Interoperability (SAML Sender Vouches Token). After completing the prerequisite tasks, complete one of the following tasks depending upon your specific deployment:
7.3.1 Configuring Prerequisites for Interoperability (SAML Sender Vouches Token)
Before you implement SAML sender vouches token with WS-Security 1.0 message protection for interoperability between OWSM 14c and Oracle Service Bus 10g, you must complete a number of high-level tasks.
To configure prerequisites for interoperability:
-
Copy the
default-keystore.jks
andtrust.jks
files to your domain directory.The
default-keystore.jks
is used to store public and private keys for SOAP messages within the WebLogic Domain. Thetrust.jks
is used to store private keys, digital certificates, and trusted certificate authority certificates that are used to establish and verify identity and trust in the WebLogic Server environment. For more information, see "Configuring Keystores for Message Protection" in Securing Web Services and Managing Policies with Oracle Web Services Manager. -
Invoke the WebLogic Remote Console.
For more information, see "Accessing Oracle WebLogic Administration Console" in Administering Web Services.
-
Create a SAMLIdentityAsserterV2 authentication provider.
For more information, see "Configuring Authentication and Identity Assertion providers" in Oracle WebLogic Server Administration Console Online Help.
-
Restart WebLogic Server to add the new provider to the Administration Server's Runtime MBean server.
-
Select the authentication provider created in step 3.
-
Create and configure a SAML asserting party.
Configure the SAML asserting party as follows (leave other values set to the defaults):
-
Profile: WSS/Sender-Vouches
-
Target URL: <OSB Proxy Service Endpoint URI>
-
Issuer URI: www.oracle.com
Select the Enabled checkbox and click Save.
-
-
Create a SamlCredentialMapperV2 credential mapping provider.
Select SamlCredentialMapperV2 from the drop-down list and name the credential mapper, for example, UC2_SamlCredentialMapperV2.For more information, see "SAML Identity Asserter V2: Create an Asserting Party" and "SAML Identity Asserter V2: Asserting Party: Configuration" in Oracle WebLogic Server Administration Console Online Help.
-
Restart WebLogic Server.
-
Configure the credential mapper as follows (leave other values set to the defaults):
-
Issuer URI: www.oracle.com
Note:
This value is specified in the policy file.
-
Name Qualifier: oracle.com
For more information, see "Configure Credential Mapping Providers" in Oracle WebLogic Server Administration Console Online Help.
-
-
Create and configure a SAML relying party.
Configure the SAML relying party as follows (leave other values set to the defaults):
-
Profile: WSS/Sender-Vouches
-
Target URL: <OWSM 14c Web Service>
-
Description: <your_description>
Select the Enabled checkbox and click Save. For more information, see "SAML Credential Mapping Provider V2: Create a Relying Party" and "SAML Credential Mapping Provider V2: Relying Party: Configuration" in Oracle WebLogic Server Administration Console Online Help.
-
-
Restart WebLogic Server.
7.3.2 Configuring an OWSM 14c Web Service and an Oracle Service Bus 10g Client (SAML Sender Vouches Token)
You can configure implement SAML sender vouches with WS-Security 1.0 message protection using OWSM 14c web service and an Oracle Service Bus 10g client.
The following topics describe how to configure the OWSM 14c web service and then the Oracle Service Bus 10g client:
7.3.2.1 Configuring OWSM 14c Web Service for Oracle Service Bus 10g Client (SAML Sender Vouches Token)
You can configure an OWSM 14c web service to implement SAML sender vouches token for interoperability with an Oracle Service Bus 10g client.
To configure the OWSM 14c web service:
-
Clone the following policy:
oracle/wss10_saml_token_with_message_protection_service_policy
.For more information, see "Cloning a Web Service Policy" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
Set Encryption Key Reference Mechanism to issuerserial.
-
Set Algorithm Suite to Basic128Rsa15 to match the algorithm suite used for Oracle Service Bus.
-
Set Is Encrypted to false for the Username token element only.
-
Leave the default configuration set for message signing and encryption.
-
-
Attach the policy to the web service.
For more information, see "Attaching Policies" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
7.3.2.2 Configuring Oracle Service Bus 10g Client (SAML Sender Vouches Token)
You can configure an Oracle Service Bus 10g client to implement SAML sender vouches token for interoperability with an OWSM 14c web service.
To configure the Oracle Service Bus 10g client:
-
Clone the
Encrypt.xml
andSign.xml
policy files.For example, to
myEncrypt.xml
andmySign.xml
. It is not recommended to edit the predefined policy files directly. -
Edit the encryption algorithm in the
myEncrypt.xml
file to prevent encryption compliance failure, as follows:<wssp:Target> <wssp:EncryptionAlgorithm URI="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/> <wssp:MessageParts Dialect="http://schemas.xmlsoap.org/2002/12/wsse#part"> wsp:Body() </wssp:MessageParts> </wssp:Target>
For more information, see "Using WS-Policy in Oracle Service Bus Proxy and Business Services" in Oracle Service Bus Security Guide at
http://download.oracle.com/docs/cd/E13159_01/osb/docs10gr3/security/ws_policy.html
. -
Edit the
mySign.xml
file attached to the Oracle Service Bus business service request only to sign the SAML assertion by including the following target:<wssp:Target> <wssp:DigestAlgorithm URI="http://www.w3.org/2000/09/xmldsig#sha1" /> <wssp:MessageParts Dialect= "http://www.bea.com/wls90/security/policy/wsee#part"> wls:SecurityHeader(wsse:Assertion) </wssp:MessageParts> </wssp:Target>
-
Edit the
mySign.xml
file attached to the Oracle Service Bus business service response only to specify that the security token is unsigned, as follows:<wssp:Integrity SignToken="false">
Also, for SOA clients only, comment out the target for system headers, as shown:
<!-- wssp:Target> <wssp:DigestAlgorithm URI="http://www.w3.org/2000/09/xmldsig#sha1" /> <wssp:MessageParts Dialect="http://www.bea.com/wls90/security/policy/wsee#part"> wls:SystemHeaders() </wssp:MessageParts> </wssp:Target -->
-
Use the custom SAML policy file shown in the following Custom SAML Policy sample:
<?xml version="1.0"?> <wsp:Policy xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wssp="http://www.bea.com/wls90/security/policy" xmlns:wsu=" http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" xmlns:wls="http://www.bea.com/wls90/security/policy/wsee#part" wsu:Id="custom_saml"> <wssp:Identity xmlns:wssp="http://www.bea.com/wls90/security/policy"> <wssp:SupportedTokens> <wssp:SecurityToken TokenType= "http://docs.oasis-open.org/wss/2004/01/oasis-2004-01-saml-token-profile-1.0#SAMLAssertionID"> <wssp:Claims> <wssp:ConfirmationMethod> sender-vouches </wssp:ConfirmationMethod> </wssp:Claims> </wssp:SecurityToken> </wssp:SupportedTokens> </wssp:Identity> </wsp:Policy>
-
Invoke the web service from the client.
7.3.3 Configuring an Oracle Service Bus 10g Web Service and an OWSM 14c Client (SAML Sender Vouches Token)
You can implement SAMLsender vouches with WS-Security 1.0 message protection using an Oracle Service Bus 10g web service and an OWSM 14c client.
The following topics describe how to configure the Oracle Service Bus 10g web service and then the OWSM 14c client:
7.3.3.1 Configuring Oracle Service Bus 10g Web Service (SAML Sender Vouches Token)
You can configure an Oracle Service Bus 10g web service to implement SAML sender vouches token for interoperability with an OWSM 14c client.
To configure the Oracle Service Bus 10g web service:
-
Clone the
Encrypt.xml
andSign.xml
policy files.For example, to
myEncrypt.xml
andmySign.xml
. It is not recommended to edit the predefined policy files directly. -
Edit the encryption algorithm in the
myEncrypt.xml
policy file to prevent encryption compliance failure, as follows:<wssp:Target> <wssp:EncryptionAlgorithm URI="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/> <wssp:MessageParts Dialect="http://schemas.xmlsoap.org/2002/12/wsse#part"> wsp:Body() </wssp:MessageParts> </wssp:Target>
For more information, see "Using WS-Policy in Oracle Service Bus Proxy and Business Services" in Oracle Service Bus Security Guide at
http://download.oracle.com/docs/cd/E13159_01/osb/docs10gr3/security/ws_policy.html
. -
Edit the
mySign.xml
policy file attached to the proxy service request only to specify that the security token is unsigned:<wssp:Integrity SignToken="false">
Also, for SOA clients only, comment out the target for system headers, as shown:
<!-- wssp:Target> <wssp:DigestAlgorithm URI="http://www.w3.org/2000/09/xmldsig#sha1" /> <wssp:MessageParts Dialect="http://www.bea.com/wls90/security/policy/wsee#part"> wls:SystemHeaders() </wssp:MessageParts> </wssp:Target -->
-
Use the custom SAML policy file shown in the following Custom SAML Policy sample:
<?xml version="1.0"?> <wsp:Policy xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wssp="http://www.bea.com/wls90/security/policy" xmlns:wsu=" http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" xmlns:wls="http://www.bea.com/wls90/security/policy/wsee#part" wsu:Id="custom_saml"> <wssp:Identity xmlns:wssp="http://www.bea.com/wls90/security/policy"> <wssp:SupportedTokens> <wssp:SecurityToken TokenType= "http://docs.oasis-open.org/wss/2004/01/oasis-2004-01-saml-token-profile-1.0#SAMLAssertionID"> <wssp:Claims> <wssp:ConfirmationMethod> sender-vouches </wssp:ConfirmationMethod> </wssp:Claims> </wssp:SecurityToken> </wssp:SupportedTokens> </wssp:Identity> </wsp:Policy>
7.3.3.2 Configuring OWSM 14c Client for Oracle Service Bus 10g (SAML Sender Vouches Token)
You can configure an OWSM 14c client to implement SAML sender vouches token for interoperability with an Oracle Service Bus 10g web service.
To configure the OWSM 14c client:
-
Clone the following policy:
wss10_saml_token_with_message_protection_client_policy
.Edit the policy settings, as follows:
-
Set Encryption Key Reference Mechanism to issuerserial.
-
Set Recipient Encryption Key Reference Mechanism to issuerserial.
-
Set Algorithm Suite to Basic128Rsa15 to match the algorithm suite used for Oracle Service Bus.
-
Disable the Include Timestamp configuration setting.
-
Leave the default configuration set for message signing and encryption.
For more information, see "Cloning a Web Service Policy" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
-
Attach the policy to the web service client.
For more information, see "Attaching Policies" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
Invoke the web service from the client.
7.4 Implementing a SAML or Username Token Over SSL for Oracle Service Bus 10g Client
The SAML or Username Token over SSL policy conforms to the WS-Security 1.0 and 1.1 standards. This policy is implemented to achieve the interoperability between OWSM 14c web service and Oracle Service Bus 10g client.
Note:
The interoperability scenario described in this section also applies to the SAML Token Over SSL and Username Token Over SSL policies.
For this scenario, you must first perform prerequisite tasks for the WebLogic Server on which Oracle Service Bus is running, as described in the following sections:
-
Configure the username token.
-
Configure the SAML token.
-
For SAML, perform the prerequisite steps for the WebLogic Server on which Oracle Service Bus is running as described in Configuring SAML prerequisites for Interoperability.
For configuration instructions of the supported scenario, see Configuring an OWSM 14c Web Service and an Oracle Service Bus 10g Client (SAML or Username Token over SSL).
7.4.1 Configuring SAML prerequisites for Interoperability
Before you implement SAML or Username Token Over SSL for interoperability between OWSM 14c web service and Oracle Service Bus 10g client, you must complete a number of high-level tasks.
To configure SAML prerequisites for interoperability:
-
Create a SamlCredentialMapperV2 credential mapping provider.
Select SamlCredentialMapperV2 from the drop-down list and name the credential mapper; for example, UC2_SamlCredentialMapperV2.For more information, see "Configure Credential Mapping Providers" in Oracle WebLogic Server Administration Console Online Help.
-
Restart WebLogic Server.
-
Configure the credential mapper as follows (leave other values set to the defaults):
-
Issuer URI: www.oracle.com
Note:
This value is specified in the policy file.
-
Name Qualifier: oracle.com
-
-
Create and configure a SAML relying party.
Configure the SAML relying party as follows (leave other values set to the defaults):
-
Profile: WSS/Sender-Vouches
-
Target URL: <OWSM 14c Web Service>
-
Description: <your_description>
Select the Enabled checkbox and click Save.
For more information, see "SAML Credential Mapping Provider V2: Create a Relying Party" and "SAML Credential Mapping Provider V2: Relying Party: Configuration" in Oracle WebLogic Server Administration Console Online Help.
-
-
Restart WebLogic Server.
7.4.2 Configuring an OWSM 14c Web Service and an Oracle Service Bus 10g Client (SAML or Username Token over SSL)
You can implement the SAML or username token over SSL policy using an OWSM 14c web service and an Oracle Service Bus 10g client. Both the SAML token client and the username token client are supported.
The following topics describe how to configure the OWSM 14c web service and then the Oracle Service Bus 10g client:
7.4.2.1 Configuring OWSM 14c Web Service for Oracle Service Bus 10g Client (SAML or Username Token over SSL)
You can configure an OWSM 14c web service to implement SAML or username token over SSL for interoperability with an Oracle Service Bus 10g client.
To configure the OWSM 14c web service:
-
Configure the server for two-way SSL.
-
If the service policy is Username Token Over SSL, set Two Way Client Cert Behavior to "Client Certs Requested and Not Enforced."
-
If the service policy is SAML Token Over SSL, set Two Way Client Cert Behavior to "Client Certs Requested and Enforced."
For more information, see "Configuring SSL on WebLogic Server (Two-Way)" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
-
Clone the following policy:
wss_saml_or_username_token_over_ssl_service_policy
.-
For
wss_username_token_over_ssl_service_policy
, disable the Create Element and Nonce configuration settings. -
For
wss_saml_token_over_ssl_service_policy
, disable the Include Timestamp configuration setting.
For more information, see "Cloning a Web Service Policy" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
-
Use JDeveloper to create a simple SOA composite.
-
Attach the copy of the
wss_saml_or_username_token_over_ssl_service_policy
policy to the composite and deploy it.For more information, see "Attaching Policies" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
7.4.2.2 Configuring Oracle Service Bus 10g Client (SAML or Username Token Over SSL)
You can configure an Oracle Service Bus 10g client to implement SAML or username token over SSL for interoperability with an OWSM 14c web service.
To configure the Oracle Service Bus 10g client:
-
Configure the server for two-way SSL:
-
If the client policy is the equivalent of Username Token Over SSL, then set Two Way Client Cert Behavior to "Client Certs Requested and Not Enforced."
-
If the client policy is the equivalent of SAML Token Over SSL, then set Two Way Client Cert Behavior to "Client Certs Requested and Enforced."
For more information, see "Configuring SSL on WebLogic Server (Two-Way)" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
-
In the Oracle Service Bus console, import the WSDL for the relying party. Make sure that there is no policy attached. (Policy assertions are not allowed on this service.)
-
For SAML token, create a business service.
-
Attach the policy to the request.
Use the custom SAML policy file shown in the following Custom SAML Policy sample:
<?xml version="1.0"?> <wsp:Policy xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wssp="http://www.bea.com/wls90/security/policy" xmlns:wsu=" http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" xmlns:wls="http://www.bea.com/wls90/security/policy/wsee#part" wsu:Id="custom_saml"> <wssp:Identity xmlns:wssp="http://www.bea.com/wls90/security/policy"> <wssp:SupportedTokens> <wssp:SecurityToken TokenType= "http://docs.oasis-open.org/wss/2004/01/oasis-2004-01-saml-token-profile-1.0#SAMLAssertionID"> <wssp:Claims> <wssp:ConfirmationMethod> sender-vouches </wssp:ConfirmationMethod> </wssp:Claims> </wssp:SecurityToken> </wssp:SupportedTokens> </wssp:Identity> </wsp:Policy>
-
Change the WSDL from HTTP to HTTPS.
-
-
For username token, create a business service.
-
Attach the
auth.xml
policy to the request. -
Change the WSDL from HTTP to HTTPS.
-
-
Create a proxy service, and create a route to the business service.
In HTTP Transport Configuration, set Authentication to "basic."
On the Security page, associate the Service key provider. This is needed for Oracle Service Bus to send the client cert to SOA.
-
Run the proxy service from the Oracle Service Bus console with the username and password.
7.5 Implementing a Mutual Authentication with WS-Security 1.0 Message Protection for Oracle Service Bus 10g Client
The Mutual Authentication with Message Protection policy conforms to the WS-Security 1.0 standard. This policy is implemented to achieve the interoperability of OWSM 14c web service with Oracle Service Bus 10g client and the interoperability of Oracle Service Bus 10g web service with OWSM 14c client.
The following scenarios are supported:
-
OWSM 14c web service with Oracle Service Bus 10g client
-
Oracle Service Bus 10g web service with OWSM 14c client
For either scenario, you must first perform prerequisite tasks:
After completing the prerequisite tasks, complete one of the following tasks depending upon your specific deployment:
7.5.1 Configuring Prerequisites for Oracle WebLogic Server
Before you implement mutual authentication with WS-Security 1.0 message protection for interoperability between OWSM 14c and Oracle Service Bus 10g, you must complete a number of high-level tasks for the Oracle WebLogic Server.
To configure prerequisites for the Oracle WebLogic Server:
-
Copy the default-keystore.jks and trust.jks files to your domain directory.
The
default-keystore.jks
is used to store public and private keys for SOAP messages within the WebLogic Domain. Thetrust.jks
is used to store private keys, digital certificates, and trusted certificate authority certificates that are used to establish and verify identity and trust in the Oracle WebLogic Server environment.For more information, see "Configuring Keystores for Message Protection" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
Invoke the WebLogic Remote Console.
For more information, see "Accessing Oracle WebLogic Administration Console" in Administering Web Services.
-
Configure the Custom Identity and Custom Trust keystores.
For more information, see "Configure keystores" in Oracle WebLogic Server Administration Console Online Help.
-
Configure SSL.
Specify the private key alias, as required. For example:
oratest
.For more information, see "Set up SSL" in Oracle WebLogic Server Administration Console Online Help.
-
Configure a credential mapping provider.
-
Create a PKICredentialMapper and configure it as follows (leave all other values set to the defaults):
-
Keystore Provider: N/A
-
Keystore Type: jks
-
Keystore File Name: default_keystore.jks
-
Keystore Pass Phrase: <password>
-
Confirm Keystore Pass Phrase: <password>
For more information, see "Configure Credential Mapping Providers" in Oracle WebLogic Server Administration Console Online Help.
-
-
Select the Authentication tab and configure as follows:
-
Click DefaultIdentityAsserter and add X.509 to Chosen active types
-
Click Provider Specific and configure the following:
-
Default User Name Mapper Attribute Type: CN
-
Active Types: X.509
-
Use Default User Name Mapper: True
For more information, see "Configure Authentication and Identity Assertion providers" in Oracle WebLogic Server Administration Console Online Help.
-
-
-
Configure a token handler to specify that a client invoking a message-secured web service uses an X.509 certificate to establish their identity. In WebLogic Remote Console, navigate to the Web Service Security page of the domain and configure the inbound and outbound messages as follows:
Note:
Only username token with message protection or mutual authentication with message protection is available at any given time. Once you enable mutual authentication with message protection, username authentication will fail.
-
Click _SERVICE_BUS_INBOUND_WEB_SERVICE_SECURITY_MBEAN_ and select the Token Handler tab.
-
Click X.509 token handler and configure the following:
-
Name: UseX509ForIdentity
-
Value: True
-
-
Perform the same steps for the outbound Oracle Service Bus MBean: _SERVICE_BUS_OUTBOUND_WEB_SERVICE_SECURITY_MBEAN_
-
-
If the users are not added, add the Common Name (CN) user specified in the certificate.
For more information, see "Create users" in Oracle WebLogic Server Administration Console Online Help.
-
Restart Oracle WebLogic Server.
7.5.2 Configuring prerequisites for OWSM
Before you implement mutual authentication with WS-Security 1.0 message protection for interoperability between OWSM 14c and Oracle Service Bus 10g, you must complete a number of high-level tasks.
To configure prerequisites for OWSM:
-
Configure authentication.
Select the Authentication tab and configure as follows:
-
Click DefaultIdentityAsserter and add X.509 to Chosen active types
-
Click Provider Specific and configure the following:
-
Default User Name Mapper Attribute Type: CN
-
Active Types: X.509
-
Use Default User Name Mapper: True
-
For more information, see "Configure Authentication and Identity Assertion providers" in Oracle WebLogic Server Administration Console Online Help.
-
-
If the users are not added, add the Common Name (CN) user specified in the certificate.
-
Restart Oracle WebLogic Server.
For more information, see "Create users" in Oracle WebLogic Server Administration Console Online Help.
7.5.3 Configuring an OWSM 14c Web Service and an Oracle Service Bus 10g Client (Mutual Authentication with WS-Security 1.0 Message Protection)
You can implement mutual authentication with WS-Security 1.0 message protection using an OWSM 14c web service and Oracle Service Bus 10g client. Configure the web service, then configure the client.
To configure the OWSM 14c web service:
-
Create and deploy a SOA composite.
-
Clone the following policy:
wss10_x509_token_with_message_protection_service_policy
.Edit the policy settings, as follows:
-
Set Encryption Key Reference Mechanism to issuerserial.
-
Set Algorithm Suite to Basic128Rsa15 to match the algorithm suite used for Oracle Service Bus.
For more information, see "Cloning a Web Service Policy" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
-
Attach the policy to the web service.
For more information, see "Attaching Policies" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
To configure Oracle Service Bus 10g Client, create an Oracle Service Bus business service.
-
Clone the
Encrypt.xml
andSign.xml
policy files.For example, copy the files to
myEncrypt.xml
andmySign.xml
. It is not recommended to edit the predefined policy files directly. -
Attach the X.509 policy shown in sample at the end of this procedure, to the Oracle Service Bus business service request.
-
Attach the
Sign.xml
policy file to the Oracle Service Bus business service request. -
Edit the
myEncrypt.xml
policy, as shown in sample at the end of this procedure, and attach it to the Oracle Service Bus business service request.For more information, see "Using WS-Policy in Oracle Service Bus Proxy and Business Services" in Oracle Service Bus Security Guide at
http://download.oracle.com/docs/cd/E13159_01/osb/docs10gr3/security/ws_policy.html
. -
Edit the
mySign.xml
policy file attached to the Oracle Service Bus business service response to specify that the security token is unsigned:<wssp:Integrity SignToken="false">
Also, for SOA clients only, comment out the target for system headers, as shown in sample at the end of this procedure.
-
Attach the
myEncrypt.xml
policy file from Step 6 to the Oracle Service Bus business service response. -
Create a ServiceKeyProvider.
-
Specify Encryption Key and Digital Signature Key, as required.
You must use different keys on the OWSM and Oracle Service Bus servers. You can use the same key for encryption and signing, if desired.
-
Create a proxy service, and create a route to the business service.
On the Security page, associate the Service key provider. This is needed for Oracle Service Bus to send the client certificate to SOA.
-
Run the proxy service from the Oracle Service Bus console.
See the following X.509 Policy sample:
<wsp:Policy xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wssp="http://www.bea.com/wls90/security/policy" xmlns:s0="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" s0:Id="X509Auth"> <wssp:Identity xmlns:wssp="http://www.bea.com/wls90/security/policy"> <wssp:SupportedTokens> <wssp:SecurityToken TokenType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"/> </wssp:SupportedTokens> </wssp:Identity> </wsp:Policy>
See the following myEncrypt.xml Policy sample:
<?xml version="1.0"?> <wsp:Policy xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wssp="http://www.bea.com/wls90/security/policy" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" xmlns:wls="http://www.bea.com/wls90/security/policy/wsee#part" wsu:Id="X509Encrypt"> <wssp:Confidentiality> <wssp:KeyWrappingAlgorithm URI="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/> <wssp:Target> <wssp:EncryptionAlgorithm URI="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/> <wssp:MessageParts Dialect="http://schemas.xmlsoap.org/2002/12/wsse#part">wsp:Body()</wssp:MessageParts> </wssp:Target> <wssp:KeyInfo/> </wssp:Confidentiality> </wsp:Policy>
See the following mySign Policy sample:
<?xml version="1.0"?> <wsp:Policy xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wssp="http://www.bea.com/wls90/security/policy" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity- utility-1.0.xsd" xmlns:wls="http://www.bea.com/wls90/security/policy/wsee#part" wsu:Id="X509Sign"> <wssp:Integrity SignToken="false"> <wssp:SignatureAlgorithm URI="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/> <wssp:CanonicalizationAlgorithm URI="http://www.w3.org/2001/10/xml-exc-c14n#"/> <!--wssp:Target> <wssp:DigestAlgorithm URI="http://www.w3.org/2000/09/xmldsig#sha1" /> <wssp:MessageParts Dialect="http://www.bea.com/wls90/security/policy/wsee#part"> wls:SystemHeaders() </wssp:MessageParts> </wssp:Target--> <wssp:Target> <wssp:DigestAlgorithm URI="http://www.w3.org/2000/09/xmldsig#sha1" /> <wssp:MessageParts Dialect="http://www.bea.com/wls90/security/policy/wsee#part"> wls:SecurityHeader(wsu:Timestamp) </wssp:MessageParts> </wssp:Target> <wssp:Target> <wssp:DigestAlgorithm URI="http://www.w3.org/2000/09/xmldsig#sha1" /> <wssp:MessageParts Dialect="http://schemas.xmlsoap.org/2002/12/wsse#part"> wsp:Body() </wssp:MessageParts> </wssp:Target> </wssp:Integrity> <wssp:MessageAge/> </wsp:Policy>
7.5.4 Configuring an Oracle Service Bus 10g Web Service and an OWSM 14c Client (Mutual Authentication With WS-Security 1.0 Message Protection)
You can implement mutual authentication with WS-Security 1.0 message protection using Oracle Service Bus 10g web service and an OWSM 14c client.
The following topics describe how to configure the Oracle Service Bus 10g web service and then the OWSM 14c client:
7.5.4.1 Configuring Oracle Service Bus 10g Web Service (Mutual Authentication with WS-Security 1.0 Message Protection)
You can configure an Oracle Service Bus 10g web service to implement mutual authentication with message protection for interoperability with an OWSM 14c client.
To configure the Oracle Service Bus 10g web service:
-
Create a Oracle Service Bus proxy service.
-
Clone the
Encrypt.xml
andSign.xml
policy files.For example, to
myEncrypt.xml
andmySign.xml
. It is not recommended to edit the predefined policy files directly. -
Attach the X.509 policy to the proxy service request.
-
Edit the
mySign.xml
policy file attached to the proxy service request and comment out the target for system headers and timestamp, as shown in the sample at the end of this procedure.For more information, see "Using WS-Policy in Oracle Service Bus Proxy and Business Services" in Oracle Service Bus Security Guide at
http://download.oracle.com/docs/cd/E13159_01/osb/docs10gr3/security/ws_policy.html
. -
Edit the encryption algorithm in the
myEncrypt.xml
file attached to the proxy service request as shown in the sample at the end of this procedure. -
Attach
mySign.xml
andmyEncrypt.xml
policy files from the previous steps to the proxy service response. -
Create a Service Key Provider.
mySign.xml Policy sample:
<?xml version="1.0"?> <wsp:Policy xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wssp="http://www.bea.com/wls90/security/policy" xmlns:s0="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" s0:Id="X509SignRequest"> <wssp:Integrity xmlns:wls="http://www.bea.com/wls90/security/policy/wsee#part" xmlns:wssp="http://www.bea.com/wls90/security/policy" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity- utility-1.0.xsd"> <wssp:SignatureAlgorithm URI="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> <wssp:CanonicalizationAlgorithm URI="http://www.w3.org/2001/10/xml-exc-c14n#" /> <!-- wssp:Target> <wssp:DigestAlgorithm URI="http://www.w3.org/2000/09/xmldsig#sha1" /> <wssp:MessageParts Dialect="http://www.bea.com/wls90/security/policy/wsee#part">wls:SystemHeaders ()</wssp:MessageParts> </wssp:Target --> <!-- wssp:Target> <wssp:DigestAlgorithm URI="http://www.w3.org/2000/09/xmldsig#sha1" /> <wssp:MessageParts Dialect="http://www.bea.com/wls90/security/policy/wsee#part">wls:SecurityHeader (wsu:Timestamp)</wssp:MessageParts> </wssp:Target --> <wssp:Target> <wssp:DigestAlgorithm URI="http://www.w3.org/2000/09/xmldsig#sha1" /> <wssp:MessageParts Dialect="http://schemas.xmlsoap.org/2002/12/wsse#part">wsp:Body()</wssp:MessageParts> </wssp:Target> </wsp:Policy>
myEncrypt.xml sample:
<?xml version="1.0"?> <wsp:Policy xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy" xmlns:wssp="http://www.bea.com/wls90/security/policy" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" xmlns:wls="http://www.bea.com/wls90/security/policy/wsee#part" wsu:Id="X509Encrypt"> <wssp:Confidentiality> <wssp:KeyWrappingAlgorithm URI="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/> <wssp:Target> <wssp:EncryptionAlgorithm URI="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/> <wssp:MessageParts Dialect="http://schemas.xmlsoap.org/2002/12/wsse#part">wsp:Body()</wssp:MessageParts> </wssp:Target> <wssp:KeyInfo/> </wssp:Confidentiality> </wsp:Policy>
7.5.4.2 Configuring OWSM 14c Client for Oracle Service Bus 10g (Mutual Authentication with WS-Security 1.0 Message Protection)
You can configure an OWSM 14c client to implement mutual authentication with WS-Security 1.0 message protection for interoperability with an Oracle Service Bus 10g web service.
To configure the OWSM 14c client:
-
Clone the following policy:
wss10_x509_token_with_message_protection_client_policy
.In Fusion Middleware Control, edit the policy settings, as follows:
-
Set Encryption Key Reference Mechanism to issuerserial.
-
Set Recipient Encryption Key Reference Mechanism to issuerserial.
-
Set Algorithm Suite to Basic128Rsa15 to match the algorithm suite used for Oracle Service Bus.
-
Disable the Include Timestamp configuration setting.
For more information, see "Cloning a Web Service Policy" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
-
In Fusion Middleware Control, specify keystore.recipient.alias in the client configuration. Ensure that the keystore.recipient.alias keys specified for the client exist as trusted certificate entry in the trust store configured for the web service.
-
Attach the policy to the web service client.
For more information, see "Attaching Policies" in Securing Web Services and Managing Policies with Oracle Web Services Manager.
-
Invoke the web service from the client.