RE: ServiceMix and security

2006-04-25 Thread Hossam Karim
Please find my comments inline. -Original Message- From: Guillaume Nodet [mailto:[EMAIL PROTECTED] Sent: Tuesday, April 25, 2006 10:45 AM To: servicemix-dev@geronimo.apache.org Subject: Re: ServiceMix and security The main problem of using a JBI component to provide security is that

Re: ServiceMix and security

2006-04-25 Thread Guillaume Nodet
The main problem of using a JBI component to provide security is that when you use a clustered ServiceMix, JBI exchanges may go to the security component using a clustered flow. In such a case, the exchange will be sent on the wire in an unsecured / unauthenticated way. I have always thought that

Re: ServiceMix and security

2006-04-19 Thread Bruce Snyder
On 4/19/06, Dain Sundstrom <[EMAIL PROTECTED]> wrote: > On Apr 19, 2006, at 10:40 AM, Bruce Snyder wrote: > > > On 4/18/06, Hossam Karim <[EMAIL PROTECTED]> wrote: > >> Just thinking: > >> - Security is a service > >> - A component installed inside SM can support a SM specific security > >> contrac

Re: ServiceMix and security

2006-04-18 Thread Rafael Marins
I believe that the Subject should be used in some way to carry the WS-Security envelope information. Then, some authentication mechanism is responsible to check each message/invocation against the destination endpoint policy. Each JBI component that has security requirements must declare the polic

RE: ServiceMix and security

2006-04-18 Thread Hossam Karim
Just thinking: - Security is a service - A component installed inside SM can support a SM specific security contract, in which a security provider implementing this contract can be bound to one or more installed components. This provider can provide authentication, digital signature verification, X

Re: ServiceMix and security

2006-04-18 Thread Aaron Mulder
I think we need to separate security into a number of categories: 1) protecting the content (confidentiality and integrity) 2) authentication 3) authorization 4) auditing 5) single sign-on So these can be applied at several levels -- the transport from outside to binding component, the invocation