Home Page Icon
Home Page
Table of Contents for
III. Security
Close
III. Security
by Matt Winkler, Nigel Watling, Marc Mercuri, Craig McMurtry
Windows Communication Foundation Unleashed
Copyright
Tell Us What You Think!
Foreword
Introduction
I. Introducing the Windows Communication Foundation
1. Prerequisites
Introduction
Partial Types
Generics
Nullable Value Types
The Lightweight Transaction Manager
Role Providers
Summary
References
2. The Fundamentals
Background
The Service Model
A Software Resource
Building a Service for Accessing the Resource
Defining the Contract
Hosting the Service
Specifying an Address and a Binding
Deploying the Service
Using the Service
Using the Service with a Windows Communication Foundation Client
Different Ways of Coding Windows Communication Clients
Using the Service with a Java Client
Hosting the Service in IIS
Changing How the Service Communicates
Summary
References
3. Data Representation
Background
The XmlSerializer and the DataContractSerializer
The XML Fetish
Building a Service
Building a Client
Succumbing to the Urge to Look at XML
The Case for the DataContractSerializer
Using the DataContractSerializer
Exception Handling
Summary
References
4. Sessions, Reliable Sessions, Queues, and Transactions
Introduction
Reliable Sessions
Reliable Sessions in Action
Session Management
Queued Delivery
Enhancements in Windows Vista
Dead-Letter Queues
Poison Queues
Transactions
Summary
II. Introducing the Windows Workflow Foundation
5. Fundamentals of the Windows Workflow Foundation
Introduction
What Is Windows Workflow Foundation?
What Windows Workflow Foundation Is Not
Activities
Out of the Box Activities
Creating Custom Activities
Basic
Composition
Custom Composite Activities
Communicating with Activities
Design Behavior
Validation
Transactions and Compensation
Workflow Models
Sequential Workflows
IfElse Activity
Parallel Activity
State Machine Workflows
Custom Root Activities
Workflow Hosting
Hosting the Runtime
Runtime Services
Persistence Services
Tracking Services
Tracking Profiles
Querying the Tracking Store
Scheduler Services
Other Built-in Services
Loader Service
Queue Services
Custom Services
Rules Engine
Rules as Conditions
The ConditionedActivityGroup Activity
Rules as Policy
Forward Chaining
External Policy Execution
Summary
References
6. Using the Windows Communication Foundation and the Windows Workflow Foundation Together
Introduction
Consuming Services
The Simple Case
The General Case
Orchestrating Services
Exposing Workflows as Services
Publishing as a Web Service
Hosting Inside a WCF Service
Message Routing
Runtime Hosting Options
Looking Ahead
References
III. Security
7. Security Basics
Introduction
Basic Tasks in Securing Communications
Transport Security and Message Security
Using Transport Security
Installing Certificates
Identifying the Certificate the Server Is to Provide
Identifying a Certificate for IIS to Use for SSL Exchanges
Identifying a Certificate for HTTP.SYS to Use for SSL Exchanges
Configuring the Identity of the Server
Transport Security in Action
Using Message Security
Impersonation and Authorization
Impersonation
Authorization
Reversing the Changes to Windows
Uninstalling the Certificates
Removing the SSL Configuration from IIS
Removing the SSL Configuration from HTTP.SYS
Restoring the Identity of the Server
Summary
References
8. Windows CardSpace, Information Cards, and the Identity Metasystem
Introduction
The Role of Identity
Microsoft Passport and Other Identity Solutions
The Laws of Identity
The Identity Metasystem
Information Cards and CardSpace
Managing Information Cards
Architecture, Protocols, and Security
CardSpace and the Enterprise
Summary
References
9. Securing Applications with Information Cards
Introduction
Developing for the Identity Metasystem
Simple Demonstration of CardSpace
Prerequisites for the CardSpace Samples
1. Enable Internet Information Services and ASP.NET 2.0
2. Get X.509 Certificates
3. Import the Certificates Into the Certificate Store
4. Update the Hosts File with DNS Entries to Match the Certificates
5. Internet Information Services Setup
6. Certificate Private Key Access
7. HTTP Configuration
Adding Information Cards to a WCF Application
Adding Information Cards
Using a Federation Binding
Catching Exceptions
Processing the Issued Token
Using the Metadata Resolver
Adding Information Cards to Browser Applications
Creating a Managed Card
Building a Simple Security Token Service
Summary
References
10. Advanced Security
Prelude
Introduction
Securing Resources with Claims
Claims-Based Authorization Versus Role-Based Authorization
Claims-Based Authorization Versus Access Control Lists
Adopting Claims-Based Authorization
Leveraging Claims-Based Security Using XSI
Authorizing Access to an Intranet Resource Using Windows Identity
Improving the Initial Solution
Adding STSs as the Foundation for Federation
Certificate Installation
Adding the Fabrikam STS to the Solution
The Authorization Policy of the Fabrikam STS
Adding the Woodgrove STS to the Solution
Reconfiguring the Resource Access Service
Reconfiguring the Client
Experiencing the Power of Federated, Claims-Based Identity with XSI
Claims-Based Security and Federated Security
Summary
References
IV. Integration and Interoperability
11. Legacy Integration
Introduction
COM+ Integration
Supported Interfaces
Selecting the Hosting Mode
COM+ Hosted
Web Hosted
Web Hosted In-Process
Using the COM+ Service Model Configuration Tool
Exposing a COM+ Component as a Windows Communication Foundation Web Service
Referencing in the Client
Calling a Windows Communication Foundation Service from COM
Building the Service
Building the Client
Building the VBScript File
Testing the Solution
Integrating with MSMQ
Creating a Windows Communication Foundation Service That Integrates with MSMQ
Creating the Request
Creating the Service
Creating the Client
Testing
Summary
12. Interoperability
Summary
References
V. Extending the Windows Communication Foundation
13. Custom Behaviors
Introduction
Extending the Windows Communication Foundation
Extending the Service Model with Custom Behaviors
Declare What Sort of Behavior You Are Providing
Attach the Custom Behavior to an Operation or Endpoint
Inform the Windows Communication Foundation of the Custom Behavior
Implementing a Custom Behavior
Declare
Attach
Inform
Informing the Windows Communication Foundation of a Custom Behavior in Code
Informing the Windows Communication Foundation of a Custom Behavior Through Configuration
Implementing Each Type of Custom Behavior
Operation Selector
Client
Service
Parameter Inspector
Client
Service
Message Formatter
Client
Service
Message Inspector
Client
Service
Instance Context Provider
Service
Instance Provider
Service
Operation Invokers
Service
Implementing a WSDL Export Extension
Implementation Steps
Declare That a Type Is a WSDL Export Extension
Specify Whether the WSDL Export Extension Attaches to an Endpoint or to a Contract
Inform the Windows Communication Foundation of the WSDL Export Extension
Custom Behaviors in Action
Summary
References
14. Custom Channels
Introduction
Binding Elements
Outbound Communication
Inbound Communication
Channels Have Shapes
Channels Might Be Required to Support Sessions
Matching Contracts to Channels
Communication State Machines
Building Custom Binding Elements
Understand the Starting Point
Provide a Custom Binding Element That Supports Outbound Communication
Amend the Custom Binding Element to Support Inbound Communication
Applying a Custom Binding Element Through Configuration
Summary
15. Custom Transports
Introduction
Transport Channels
Inbound Communication
Outbound Communication
Message Encoders
Completing the Stack
Implementing a Transport Binding Element and an Encoder Binding Element
The Scenario
The Requirements
The TcpListener and the TcpClient Classes
Implementing Custom Binding Elements to Support an Arbitrary TCP Protocol
The Configuration
The Custom Transport Binding Element
The Channel Listener
The Transport Channel
The Message Encoder
Using the Custom Transport Binding Element
Summary
References
VI. Special Cases
16. Publish/Subscribe Systems
Introduction
Publish/Subscribe Using Callback Contracts
Publish/Subscribe Using MSMQ Pragmatic Multicasting
Publish/Subscribe Using Streaming
The Streamed Transfer Mode
Transmitting a Custom Stream with the Streamed Transfer Mode
Implementing Publish/Subscribe Using the Streamed Transfer Mode and a Custom Stream
Summary
References
17. Peer Communication
Introducing Peer Channel
Using Structured Data in Peer-to-Peer Applications
Leveraging the Windows Peer-to-Peer Networking Development Platform
Understanding Windows Peer-to-Peer Networks
Using Peer Channel
Endpoints
Binding
Address
Contract
Implementation
Peer Channel in Action
Envisaging the Solution
Designing the Data Structures
Defining the Service Contracts
Implementing the Service Contracts
Configuring the Endpoints
Directing Messages to a Specific Peer
Custom Peer Name Resolution
Seeing Peer Channel Work
Peer Channel and People Near Me
Summary
References
18. Representational State Transfer and Plain XML Services
Introduction
Representational State Transfer
REST Services
REST Services and Plain XML
The Virtues and Limitations of REST Services
Building REST POX Services with the Windows Communication Foundation
The Address of a REST POX Service Endpoint
The Binding of a REST POX Service Endpoint
The Contract of a REST POX Service Endpoint
Implementation
A Sample Application
Summary
References
VII. The Lifecycle of Windows Communication Foundation Applications
19. Manageability
Introduction
Instrumentation and Tools
The Configuration System and the Configuration Editor
The Configuration System
The Service Configuration Editor
Configuring the Trade Recording Service with the Configuration Editor
Configuring a Client Application with the Configuration Editor
Configurable Auditing of Security Events
Message Logging, Activity Tracing, and the Service Trace Viewer
Message Logging
Activity Tracing
The Trace Viewer
Incorporating Custom Trace Sources
Performance Counters
WMI Provider
Accessing Data from the WMI Provider via WMI CIM Studio
Accessing Data from the WMI Provider Using Windows PowerShell
Using the WMI Provider to Add Custom Performance Counters
Completing the Management Facilities
Summary
References
20. Versioning
Introduction
Versioning Nomenclature
The Universe of Versioning Problems
Adding a New Operation
Changing an Operation
Changing the Data Contract of a Parameter
Adding Optional Members to Data Contracts
Other Changes to Data Contracts
Other Changes to Operations
Deleting an Operation
Changing a Binding
Deciding to Retire an Endpoint
Changing the Address of a Service Endpoint
Centralized Lifecycle Management
Summary
References
VIII. Guidance
21. Guidance
Introduction
Adopting the Windows Communication Foundation
Working with Windows Communication Foundation Addresses
Working with Windows Communication Foundation Bindings
Working with Windows Communication Foundation Contracts
Working with Structural Contracts
Working with Behavioral Contracts
Working with Windows Communication Foundation Services
Ensuring Manageability
Working with Windows Communication Foundation Clients
Working with Large Amounts of Data
Debugging Windows Communication Foundation Applications
Summary
References
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
6. Using the Windows Communication Foundation and the Windows Workflow Foundation Together
Next
Next Chapter
7. Security Basics
Part III. Security
IN THIS PART
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset