itcamp 2012 - leonard abu-saa - wcf security

16
itcampro @ itcamp12 # Premium conference on Microsoft technologies WCF Security Abu-Saa Leonard, Software Architect Arobs Transilvania Software Blog: http://net-daylight.blogspot.com/

Upload: itcamp

Post on 13-May-2015

317 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

WCF Security

Abu-Saa Leonard, Software Architect

Arobs Transilvania Software

Blog: http://net-daylight.blogspot.com/

Page 2: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices ITCamp 2012 sponsors

Page 3: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• Overview

• Authentication & Authorization

• Security Modes

• Credential Types

• WCF Authentication Service

• Custom UserName & Password

Authentication

• Q&A

Agenda

Page 4: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• Online transactions

• Do we ignore security ?

Overview

Page 5: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• Auditing and Logging

• Authentication

• Authorization

• Configuration Management

• Message Protection

• Message Validation

• Senzitive data

• Session Management

Overview – Security fundamentals

Page 6: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• Asset

• Threat

• Vulnerability

• Attack

Threats, Vulnerabilities and Attacks

Page 7: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• Authentication identifies a user, process

• One of the most important aspect of

security

• We use id daily: ids, user names &

passwords, etc.

Authentication != Authorization

Page 8: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• Verifies what resources can access the

itentified party

• It happens after authentication

• Very close related with Authentication

Authorization

Page 9: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• None

• Basic

• NTLM

• Windows

• Certificate

• Username – Custom Provider

– SqlMembership Provider

• Issued Token

Authentication in WCF

Page 10: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• None

– Not recommended

• Transport Security

– Encrypts the communication channel

• Message Security

– The message is encrypted

Security Modes

Page 11: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• Transport Credential Only

– Credentials are sent as part of the message but are not

encrypted

• Transport With Message Credential

– Credentials are sent as part of the message and the

message protection is done at the transport level

Security Modes - Variations

Page 12: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• SSL over HTTP(S)/TCP

• Our purpose is to ensure integrity,

condidentiality and authentication

• Integrity = encryption key

• Confidentiality = data encryption

• Authentication = credentials

• Use a digital certificate to encrypt the

channel

Transport Security

Page 13: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• When we use Transport Security ?

• Advantages – Better performance

– Interoperability

• Disadvantages – ‘Point-2-Point’

Transport Security

Page 14: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• When we use Message Security?

• Encrypts only the message

• Advantages – ‘End-2-End’ security

– Independent of the communication protocol

• Disadvantages – Lower perfomance compared to transport

– Does not support interoperability with older ASMX

clients

Message Security

Page 15: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Architecture &

Best Practices

• Uses ASP.NET membership to authenticate

users

• It requires cookies

• Can customize user login

• Can customize authentication cookie

WCF Authentication Service

Page 16: ITCamp 2012 - Leonard Abu-Saa - WCF Security

itcampro @ itcamp12 # Premium conference on Microsoft technologies

Q & A