<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6194775689881201187</id><updated>2024-11-01T03:45:52.529-07:00</updated><category term="owsm 10.1.3.1"/><category term="howto"/><category term="news"/><category term="faq"/><category term="Oracle"/><category term="ws-security"/><category term="cloud"/><category term="owsm 11gR1"/><category term="security"/><category term="conference"/><category term="owsm 11g"/><category term="innovation"/><category term="standards"/><category term="SSO"/><category term="identity management"/><category term="javaone"/><category term="logging"/><category term="owsm"/><category term="patch"/><category term="saml"/><category term="weblogic"/><category term="EM"/><category term="award"/><category term="best practice"/><category term="book"/><category term="career"/><category term="certificates"/><category term="custom"/><category term="federation"/><category term="google"/><category term="governance"/><category term="java"/><category term="oauth"/><category term="oow"/><category term="soa mgt"/><category term="sts"/><category term="whitepaper"/><category term="youtube"/><title type='text'>Vikas Jain&#39;s Web Services Security (ws-security) Blog</title><subtitle type='html'>A blog of SOA and web services security technology I&#39;m working on ...</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>108</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-6969908125958299242</id><published>2011-11-07T14:11:00.000-08:00</published><updated>2011-11-07T14:15:42.119-08:00</updated><title type='text'>Moved to a new blog</title><content type='html'>I&#39;ve moved to a new blogging platform provided by my employer Intel at &lt;a href=&quot;http://blogs.intel.com/cloud-access-security/&quot;&gt;http://blogs.intel.com/cloud-access-security/&lt;/a&gt;&lt;div&gt;Hope, you will  follow my posts there.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/6969908125958299242/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/6969908125958299242' title='49 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/6969908125958299242'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/6969908125958299242'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2011/11/moved-to-new-blog.html' title='Moved to a new blog'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>49</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-1644574732037005355</id><published>2010-10-14T13:51:00.001-07:00</published><updated>2010-10-14T13:51:12.205-07:00</updated><title type='text'>Netflix in the Cloud</title><content type='html'>Netflix is adopting (public) cloud with full force. Check out these few slides around the drivers and their roadmap for such move. Does it mean in the future IaaS providers will start to provision nVidia/ATI GPU based machines for faster video codec processing?&lt;br /&gt;&lt;div style=&quot;width:425px&quot; id=&quot;__ss_5388672&quot;&gt;&lt;strong style=&quot;display:block;margin:12px 0 4px&quot;&gt;&lt;a href=&quot;http://www.slideshare.net/adrianco/netflix-oncloudteaser&quot; title=&quot;Netflix in the Cloud&quot;&gt;Netflix in the Cloud&lt;/a&gt;&lt;/strong&gt;&lt;object id=&quot;__sse5388672&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=netflixoncloud-teaser-101007192308-phpapp02&amp;stripped_title=netflix-oncloudteaser&amp;userName=adrianco&quot; /&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;/&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;/&gt;&lt;embed name=&quot;__sse5388672&quot; src=&quot;http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=netflixoncloud-teaser-101007192308-phpapp02&amp;stripped_title=netflix-oncloudteaser&amp;userName=adrianco&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;div style=&quot;padding:5px 0 12px&quot;&gt;View more &lt;a href=&quot;http://www.slideshare.net/&quot;&gt;presentations&lt;/a&gt; from &lt;a href=&quot;http://www.slideshare.net/adrianco&quot;&gt;Adrian Cockcroft&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/1644574732037005355/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/1644574732037005355' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/1644574732037005355'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/1644574732037005355'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/10/netflix-in-cloud.html' title='Netflix in the Cloud'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-3567332126573924908</id><published>2010-10-07T16:40:00.001-07:00</published><updated>2010-10-07T16:40:50.344-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="SSO"/><title type='text'>Cloud SSO heating up</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;In the early part of this decade, SSO vendors (Oblix, Netegrity, Tivoli, etc.) provided solution that made life simple and brought efficiencies for both employees and IT by eliminating the need to remember and maintain/reset tens if not hundreds of username/password combinations that allowed employees to access internal applications needed for their job.&lt;br/&gt;&lt;br/&gt;In the next wave, these SSO solutions moved into partner and consumer facing applications where federation was brought in to mediate between different security systems leading to popularization of SAML standard.&lt;br/&gt;&lt;br/&gt;Fast forward to now - As new set of applications get delivered as SaaS, SSO had to catch-up with this new deployment model, and new products/solutions are emerging to solve these challenges.&lt;br/&gt;&lt;br/&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#39;http://www.myonelogin.com/?ref=tricipher_home&#39;&gt;TriCipher&lt;/a&gt; (acquired by VmWare) - VmWare saw this need early on as it tries to deliver the vCloud platform. This piece may also become the security mediator between vCloud deployments and external SaaS/cloud offerings. Will have to watch what VmWare does with it.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#39;http://www.pingidentity.com/&#39;&gt;PingIdentity&lt;/a&gt; - The PingFederate solution addresses this need. PingIdentity has been a pioneer in the SAML federation space.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#39;http://www.symplified.com/&#39;&gt;Symplified&lt;/a&gt; - Started by ex-PingIdentity folks, it has quickly earned a name for itself in this space.&lt;/li&gt;&lt;li&gt;&lt;a href=&#39;http://www.vordel.com/&#39;&gt;Vordel&lt;/a&gt; - It&#39;s Cloud Service Broker provides solution in this space.&lt;br/&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#39;http://feeds.citrix.com/blogs/tag/opencloud_access&#39;&gt;Citrix OpenCloud Access&lt;/a&gt; - This is the latest addition to this space, available as an optional module for Citrix Netscaler. &lt;a href=&#39;http://www.citrix.com/English/NE/news/news.asp?newsID=2304356&#39;&gt;Announced yesterday&lt;/a&gt; at Citrix Synergy (Citrix&#39;s annual user conference), this should also help Citrix implicitly sell more of it&#39;s GoToMeeting product line.&lt;/li&gt;&lt;/ul&gt;As you can see the market for Cloud SSO is heating up ...&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/3567332126573924908/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/3567332126573924908' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/3567332126573924908'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/3567332126573924908'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/10/cloud-sso-heating-up.html' title='Cloud SSO heating up'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-7106016209273467927</id><published>2010-10-07T15:44:00.000-07:00</published><updated>2010-10-07T15:45:01.200-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="google"/><title type='text'>Access Google address book via LDAP using OVD</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;My colleague Mark Wilcox who also runs a &lt;a href=&#39;http://blogs.oracle.com/mwilcox/&#39;&gt;blog&lt;/a&gt; created an integration between Oracle Virtual Directory (OVD) and Google address book.&lt;br/&gt;This solves use cases for customers who use Google Apps for business, and would also like to use Google as their source of identity instead of maintaining user profiles in their own LDAP stores. OVD provides a nice virtual LDAP interface on top of this Google identity store. Customers can leverage it for SSO of their enterprise apps using Google identities. Where there&#39;s a need to add custom attributes to the user&#39;s Google profile, OVD has a provision to allow addition of such attributes without modifying the schema of Google identity store (which anyways is inaccessible).&lt;br/&gt;&lt;br/&gt;Note that this is different from the SAML federation that Google supports for access to &quot;Google Apps&quot; using enterprise identities that come from enterprise LDAP.&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/7106016209273467927/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/7106016209273467927' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/7106016209273467927'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/7106016209273467927'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/10/access-google-address-book-via-ldap.html' title='Access Google address book via LDAP using OVD'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-4319443173475675979</id><published>2010-09-20T23:27:00.000-07:00</published><updated>2010-09-21T00:20:38.943-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Oracle"/><category scheme="http://www.blogger.com/atom/ns#" term="owsm"/><title type='text'>OWSM optimized for Oracle SPARC T3 server</title><content type='html'>Oracle&#39;s Executive VP John Fowler in his &lt;a href=&quot;http://www.marketwatch.com/story/oracle-executive-vice-president-john-fowler-outlines-core-sparc-solaris-and-zfs-innovations-2010-09-20?reflink=MW_news_stmp&quot;&gt;keynote&lt;/a&gt; at Oracle OpenWorld conference,  &lt;a href=&quot;http://www.oracle.com/us/corporate/features/sparc-t3-feature-173454.html&quot;&gt;announced release of Oracle SPARC T3 server&lt;/a&gt;.&lt;br /&gt;The SPARC T3 processors pack 16 cores and 16 on-chip CMT crypto accelerators in a single socket.&lt;br /&gt;&lt;br /&gt;OWSM has been optimized to take full advantage of such hardware acceleration by integrating with Solaris Cryptographic Framework that provides crypto acceleration passthrough into the hardware for both SPARC and Intel processors.&lt;br /&gt;&lt;br /&gt;See integration whitepaper: &lt;a href=&quot;http://www.oracle.com/technetwork/articles/systems-hardware-architecture/hi-perf-soa-xml-svcs-172821.pdf&quot;&gt;High Performance Security for SOA and XML Web Services using Oracle Web Services Manager and Oracle SPARC Enterprise T-Series Servers&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;OWSM indeed is delivering the promise of Hardware and software engineered to work together.</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/4319443173475675979/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/4319443173475675979' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/4319443173475675979'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/4319443173475675979'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/09/owsm-optimized-for-oracle-sparc-t3.html' title='OWSM optimized for Oracle SPARC T3 server'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-2186473579649549738</id><published>2010-09-14T23:39:00.000-07:00</published><updated>2010-09-15T00:08:53.710-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="javaone"/><category scheme="http://www.blogger.com/atom/ns#" term="oow"/><category scheme="http://www.blogger.com/atom/ns#" term="owsm"/><title type='text'>OWSM at Oracle OpenWorld and JavaOne 2010</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.oracle.com/dm/oow2010/10040370_oow_imspeaking_125x125.gif&quot;&gt;&lt;img style=&quot;float: right; margin: 0pt 0pt 10px 10px; cursor: pointer; width: 125px; height: 125px;&quot; src=&quot;http://www.oracle.com/dm/oow2010/10040370_oow_imspeaking_125x125.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://www.oracle.com/us/openworld/index.htm&quot;&gt;Oracle OpenWorld and JavaOne 2010&lt;/a&gt; is coming up next week.&lt;br /&gt;Listed below is OWSM&#39;s presence at the conference.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;Demo Pod:&lt;/span&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;Title: SOA Security&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:red;&quot;   &gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Demo Area: &lt;span class=&quot;967585213-24082010&quot;&gt;Middleware&lt;/span&gt;&lt;br /&gt;Pod #:   W-177&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;Sessions:&lt;/span&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;&lt;br /&gt;ID#:  S317146&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;div&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;Title:  &lt;a title=&quot;https://www28.cplan.com/pls/cb_oracle/CB_Sessions.search_session_form#nogo&quot; href=&quot;https://www28.cplan.com/pls/cb_oracle/CB_Sessions.search_session_form#nogo&quot;&gt;Securing  Web Services: Solutions, Best Practices, and More&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;Track: &lt;span class=&quot;967585213-24082010&quot;&gt;OpenWorld: Middleware: Identity  Management&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;Date: Tue,  21-Sep-10 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;Time:  12:30-13:30 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;Venue:  Moscone South, Room:  309&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;&lt;o:p&gt;&lt;br /&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;ID#:S314100&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Title:  &lt;a title=&quot;https://www28.cplan.com/pls/cb_oracle/CB_Sessions.search_session_form#nogo&quot; href=&quot;https://www28.cplan.com/pls/cb_oracle/CB_Sessions.search_session_form#nogo&quot;&gt;Security  Threats and Countermeasures for REST and Cloud  Services&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Track:  JavaOne&lt;span class=&quot;967585213-24082010&quot;&gt;: Enterprise Service Architectures and the  Cloud&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Date: Wed,  22-Sep-10 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Time:  10:00-11:00 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Venue:  Parc 55 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Room:  Cyril Magnin II&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt; &lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;br /&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;ID#: S316710&lt;br /&gt;Title: Analysis of  Security &amp;amp; Compliance on Sun SPARC Enterprise T-Series Servers&lt;br /&gt;Track:   Sun SPARC Servers&lt;br /&gt;Date: Thu, 23-SEP-10&lt;br /&gt;Time: 12:00 - 13:00&lt;br /&gt;Venue:  Moscone  South, Room: 252 &lt;/p&gt;&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:red;&quot;  &gt;&lt;o:p&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;967585213-24082010&quot;&gt;Hands-on-Lab:&lt;/span&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:red;&quot;  &gt;&lt;o:p&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;ID#  S314098&lt;br /&gt;&lt;/span&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;/span&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Title:  &lt;a title=&quot;https://www28.cplan.com/pls/cb_oracle/CB_Sessions.search_session_form#nogo&quot; href=&quot;https://www28.cplan.com/pls/cb_oracle/CB_Sessions.search_session_form#nogo&quot;&gt;Securing  Web Services&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Track:  Java One&lt;span class=&quot;967585213-24082010&quot;&gt;: Java EE Web Profile and Platform  Technologies&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Date:  Wed, 22-Sep-10 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Time:  12:30-14:30 &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;span style=&quot;;font-family:Arial;color:black;&quot;  &gt;Venue:  Hilton &lt;st1:city st=&quot;on&quot;&gt;&lt;st1:place st=&quot;on&quot;&gt;San  Francisco, &lt;/st1:place&gt;&lt;/st1:city&gt;Room:  Plaza A&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt; font-weight: bold;&quot;&gt;Focus On documents:&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;Highly recommended to navigate through the maze &lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://www.oracle.com/us/openworld/oow10-focuson-idm-166165.pdf&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;a href=&quot;http://www.oracle.com/us/openworld/oow10-focuson-idm-166165.pdf&quot;&gt;Identity Management&lt;/a&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.oracle.com/us/openworld/oow10-focuson-security-165794.pdf&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.oracle.com/us/openworld/oow10-focuson-security-165794.pdf&quot;&gt;Security&lt;/a&gt;&lt;/p&gt;&lt;/span&gt;&lt;a target=&quot;_blank&quot; href=&quot;http://www.oracle.com/us/openworld/oow10-focuson-soa-167755.pdf&quot;&gt;Service  Oriented Architecture&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.oracle.com/us/openworld/focus-on-151938.html&quot;&gt;Central link to all focus on documents&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;;font-family:Arial;font-size:100%;color:black;&quot;   &gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;Hope to see you there.&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin: 0in 0in 0pt;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/2186473579649549738/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/2186473579649549738' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/2186473579649549738'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/2186473579649549738'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/09/owsm-at-oracle-openworld-and-javaone.html' title='OWSM at Oracle OpenWorld and JavaOne 2010'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-8297291943769290793</id><published>2010-09-14T23:16:00.000-07:00</published><updated>2010-09-14T23:39:02.259-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="identity management"/><category scheme="http://www.blogger.com/atom/ns#" term="Oracle"/><title type='text'>Oracle Identity Management (IdM) 11g learn more resources</title><content type='html'>Returning back to blogging from hiatus. Have been super busy lately. Fist post after this gap has to be on Oracle IdM 11g which was released 2 months back. Note that OWSM 11g was released earlier with SOA 11g last year.&lt;br /&gt;If you haven&#39;t had a chance to view details on Oracle IdM 11g, here&#39;s a quick list that can get you started.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a title=&quot;http://www.oracle.com/us/corporate/press/154293&quot; href=&quot;http://www.oracle.com/us/corporate/press/154293&quot;&gt;Press release&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title=&quot;http://w.on24.com/r.htm?e=150299&amp;amp;s=1&amp;amp;k=409AAB2E4D0C341FD02DC012B04173EB&amp;amp;userreg=n&amp;amp;param2=products-identity-management.html&amp;amp;partnerref=idm16&quot; href=&quot;http://w.on24.com/r.htm?e=150299&amp;amp;s=1&amp;amp;k=409AAB2E4D0C341FD02DC012B04173EB&amp;amp;userreg=n&amp;amp;param2=products-identity-management.html&amp;amp;partnerref=idm16&quot;&gt;Launch webcast&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a title=&quot;http://www.oracle.com/us/products/middleware/identity-management/identity-management-11g-151984.html&quot; href=&quot;http://www.oracle.com/us/products/middleware/identity-management/identity-management-11g-151984.html&quot;&gt;What’s  new in IDM11g&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.oracle.com/technetwork/middleware/id-mgmt/overview/idm-tech-wp-11g-r1-128261.pdf&quot;&gt;Technical Whitepaper&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title=&quot;http://www.oracle.com/goto/idmdemos&quot; href=&quot;http://www.oracle.com/goto/idmdemos&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;titleorimageid2siteid0&quot; title=&quot;http://www.oracle.com/goto/idmdemos&quot;&gt;Flash Demos &lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/8297291943769290793/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/8297291943769290793' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/8297291943769290793'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/8297291943769290793'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/09/oracle-identity-management-idm-11g.html' title='Oracle Identity Management (IdM) 11g learn more resources'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-3098870997766297573</id><published>2010-07-15T00:00:00.001-07:00</published><updated>2010-07-15T00:00:35.237-07:00</updated><title type='text'>OWSM 11g self paced online course</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Oracle University (OU) has published an online course on OWSM 11g on iLearning.&lt;br/&gt;&lt;ul&gt;&lt;li&gt;&lt;font face=&#39;Andalus&#39;&gt;Oracle Web Services Manager 11g: Essentials - &lt;a href=&#39;http://ilearning.oracle.com/ilearn/en/learner/jsp/rco_details_find.jsp?srchfor=1&amp;amp;rcoid=857919045&#39; title=&#39;http://ilearning.oracle.com/ilearn/en/learner/jsp/rco_details_find.jsp?srchfor=1&amp;amp;rcoid=857919045&#39;&gt;D67432GC10&lt;/a&gt; &lt;br /&gt;&lt;/font&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;font face=&#39;Andalus&#39;&gt;Oracle Web Services Manager 11g: Securing SOA Components - &lt;a href=&#39;http://ilearning.oracle.com/ilearn/en/learner/jsp/rco_details_find.jsp?srchfor=1&amp;amp;rcoid=862958198&#39; title=&#39;http://ilearning.oracle.com/ilearn/en/learner/jsp/rco_details_find.jsp?srchfor=1&amp;amp;rcoid=862958198&#39;&gt;D67433GC10&lt;/a&gt;&lt;/font&gt; &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;These are self paced online courses that provide a quick way to get started on OWSM.&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/3098870997766297573/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/3098870997766297573' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/3098870997766297573'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/3098870997766297573'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/07/owsm-11g-self-paced-online-course.html' title='OWSM 11g self paced online course'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-167065655473186141</id><published>2010-06-30T12:50:00.001-07:00</published><updated>2010-06-30T12:56:16.333-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="howto"/><category scheme="http://www.blogger.com/atom/ns#" term="owsm 11gR1"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="weblogic"/><title type='text'>HowTo - OWSM 11g: Install OWSM on base Weblogic</title><content type='html'>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;If you have a vanilla Weblogic (WLS) environment with no Fusion Middleware components deployed such as SOA Suite, Webcenter, etc., and you have JAX-WS clients and web services deployed in such an enviornment, you can secure these clients and services using OWSM by following this guide for step-by-step instructions on how to set it up. These instructions will be included into official documentation in the near future.&lt;br /&gt;&lt;br /&gt;Note that these are just install instructions, with no change or bearance to the licensing model. As of Jun 2010, OWSM is licensed only through SOA Suite, and doesn&#39;t come with a standalone license. In short, to secure your clients &amp;amp; services using OWSM on base Weblogic, you would need to acquire SOA Suite license on top of Weblogic license.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;youtube-video&quot;&gt;&lt;object data=&quot;http://viewer.docstoc.com/&quot; type=&quot;application/x-shockwave-flash&quot; name=&quot;_ds_45646770&quot; id=&quot;_ds_45646770&quot; height=&quot;550&quot; width=&quot;670&quot;&gt; &lt;param value=&quot;doc_id=45646770&amp;amp;mem_id=4877889&amp;amp;doc_type=pdf&amp;amp;fullscreen=0&amp;amp;showrelated=0&amp;amp;showotherdocs=0&amp;amp;showstats=0 &quot; name=&quot;FlashVars&quot;&gt;  &lt;param value=&quot;http://viewer.docstoc.com/&quot; name=&quot;movie&quot;&gt;  &lt;param value=&quot;always&quot; name=&quot;allowScriptAccess&quot;&gt;  &lt;param value=&quot;true&quot; name=&quot;allowFullScreen&quot;&gt;  &lt;/object&gt;&lt;/div&gt;&lt;br /&gt;&lt;script type=&quot;text/javascript&quot;&gt;var docstoc_docid=&quot;45646770&quot;;var docstoc_title=&quot;How To install OWSM 11gR1 on base Weblogic&quot;;var docstoc_urltitle=&quot;How To install OWSM 11gR1 on base Weblogic&quot;;&lt;/script&gt;&lt;script src=&quot;http://i.docstoccdn.com/js/check-flash.js&quot; type=&quot;text/javascript&quot;&gt;&lt;span style=&quot;font-size:&#39;1&#39;;&quot;&gt;&lt;a href=&quot;&#39;http://www.docstoc.com/docs/45646770/How%20To%20install%20OWSM%2011gR1%20on%20base%20Weblogic&#39;&quot;&gt; How To install OWSM 11gR1 on base Weblogic&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/script&gt;&lt;/div&gt;Thanks to Amit Gokhru for validating and documenting these instructions.</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/167065655473186141/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/167065655473186141' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/167065655473186141'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/167065655473186141'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/06/howto-owsm-11g-install-owsm-on-base.html' title='HowTo - OWSM 11g: Install OWSM on base Weblogic'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-7772142139799959244</id><published>2010-06-30T11:38:00.001-07:00</published><updated>2010-06-30T11:42:47.422-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="faq"/><category scheme="http://www.blogger.com/atom/ns#" term="howto"/><category scheme="http://www.blogger.com/atom/ns#" term="owsm 11gR1"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>FAQ - Using HTTP token policies with OWSM</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;When using HTTP token policies with OWSM 11g, you may want to review the following to understand their implementation behavior.&lt;br/&gt;&lt;br/&gt;&lt;b&gt;What types of HTTP token policies are available?&lt;/b&gt;&lt;br/&gt;Following pre-defined OWSM policies are available out-of-the-box.&lt;br/&gt;&lt;b&gt;Client policies: &lt;/b&gt;oracle/wss_http_token_client_policy, oracle/wss_http_token_over_ssl_client_policy &lt;br/&gt;&lt;b&gt;Service policies: &lt;/b&gt;oracle/wss_http_token_service_policy, oracle/wss_http_token_over_ssl_service_policy &lt;br/&gt;&lt;br/&gt;&lt;b&gt;What does HTTP token policies do?&lt;/b&gt;&lt;br/&gt;On the client side, it adds base64 encoded username/password per the Basic Authentication scheme to the HTTP Authorization header according to &lt;a href=&#39;http://www.w3.org/Protocols/HTTP/HTRQ_Headers.html#z9&#39;&gt;RFC822&lt;/a&gt; and &lt;a href=&#39;http://www.faqs.org/rfcs/rfc2617.html&#39;&gt;RFC2617&lt;/a&gt;&lt;br/&gt;For example, Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==&lt;br/&gt;On the service side, OWSM agent gets hold of this HTTP header, decodes the username/password, and uses it to authenticate against the configured identity store through OPSS login module and WLS authenticator. Additionally, if oracle/wss_http_token_over_ssl_service_policy is used, it checks if SSL connection was indeed used to connect to the service.&lt;br/&gt;&lt;br/&gt;&lt;b&gt;Is the HTTP Authorization header sent with every message? If not, how can I enable it to be sent with every message?&lt;/b&gt;&lt;br/&gt;No. Oracle web services stack follows the challenge-response authentication mechanism wherein client doesn&#39;t send an authorization header in the initial request to which service responds back with a 401 (Unauthorized) HTTP message. Client then stuffs the Authorization header into the second request which is then processed by the service.&lt;br/&gt;This default behavior can be altered such that the Authorization header is always sent by setting a property on the client side.&lt;br/&gt;In the request  context, set the property ClientConstants.PREEMPTIVE_BASIC_AUTH to true &lt;br/&gt;&lt;br/&gt;&lt;b&gt;How can I disable SOAP security header inclusion when using HTTP token with SSL client policy?&lt;/b&gt;&lt;br/&gt;The out-of-box oracle/wss_http_token_over_ssl_client_policy policy is configured to include a timestamp element in the SOAP security header similar to below.&lt;br/&gt;&lt;pre style=&#39;border: 1px dashed rgb(204, 204, 204); padding: 0px; background: rgb(240, 240, 240) url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5w13ssc75RuO8ujnrJs7Qy-hlFpeexphE6bGBknrtmhmbnVNYh0ksnDyN4OTC8HArwL1o0dgeZmmYsbjB8aTGqJf68dtq7nfosBb8krTHpR0cMW27oUow6Q8SXWEs5Ybmt7iXmkhG-cRo/s320/codebg.gif) repeat scroll 0% 0%; overflow: auto; font-family: arial; font-size: 12px; width: 99%; height: auto; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: rgb(0, 0, 0); text-align: left; line-height: 20px;&#39;&gt;&amp;lt;code style=&quot;color:#000000;word-wrap:normal;&quot;&amp;gt; &amp;lt;wsse:Security xmlns:wsse=&quot;&amp;lt;a href=&quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd&quot;&amp;gt;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd&amp;lt;/a&amp;gt;&quot; env:mustUnderstand=&quot;1&quot;&amp;gt;  &amp;lt;br /&amp;gt;      &amp;lt;wsu:Timestamp xmlns:wsu=&quot;&amp;lt;a href=&quot;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd&quot;&amp;gt;http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd&amp;lt;/a&amp;gt;&quot; wsu:Id=&quot;Timestamp-oq2ulH1wHpSwkqAlKMaf5Q22&quot;&amp;gt;  &amp;lt;br /&amp;gt;           &amp;lt;wsu:Created&amp;gt;2010-06-21T15:28:02Z&amp;lt;/wsu:Created&amp;gt;  &amp;lt;br /&amp;gt;           &amp;lt;wsu:Expires&amp;gt;2010-06-21T15:33:02Z&amp;lt;/wsu:Expires&amp;gt;  &amp;lt;br /&amp;gt;      &amp;lt;/wsu:Timestamp&amp;gt;  &amp;lt;br /&amp;gt; &amp;lt;/wsse:Security  &amp;lt;br /&amp;gt;&amp;lt;/code&amp;gt;&lt;/pre&gt;&lt;br/&gt;This can be disabled by modifying the client policy with timestamp attribute value set to false.&lt;br/&gt;Note that oracle/wss_http_token_client_policy doesn&#39;t include the SOAP header.&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/7772142139799959244/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/7772142139799959244' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/7772142139799959244'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/7772142139799959244'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/06/faq-using-http-token-policies-with-owsm.html' title='FAQ - Using HTTP token policies with OWSM'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-6240058322662647155</id><published>2010-06-23T15:07:00.001-07:00</published><updated>2010-06-23T15:07:09.403-07:00</updated><title type='text'>HowTo - OWSM 11g: Prevent PII data leakage in Oracle SOA composites</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;When SOA endpoint is protected using OWSM service policy, then message can be decrypted, but after that if the message contain PII attributes, they can end up in clear in logs and instance viewer in the console. &lt;br/&gt;To provide security for prevention of such PII data leakage, there is an OWSM custom policy assertion available written by Robin Zimmermann and Rakesh Saha that allows selective attribute encryption within the application, and then decrypt it on the way out before it&#39;s re-encrypted using the OWSM client side policy.&lt;br/&gt;See &lt;a href=&#39;https://owsm-11g-custom-assertions.samplecode.oracle.com/&#39;&gt;https://owsm-11g-custom-assertions.samplecode.oracle.com/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;btw, Oracle BPEL 10g provided a feature for obfuscating attribute data. This solution is better than that approach as it uses digital encryption instead of obfuscation technique, and is policy based.&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/6240058322662647155/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/6240058322662647155' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/6240058322662647155'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/6240058322662647155'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/06/howto-owsm-11g-prevent-pii-data-leakage.html' title='HowTo - OWSM 11g: Prevent PII data leakage in Oracle SOA composites'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-9068564242844103124</id><published>2010-06-02T22:07:00.000-07:00</published><updated>2010-06-02T22:08:07.055-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>vmForce - adding new age features to the application platform</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;As VmWare and Force.com joined hands to create the vmForce platform for cloud applications it&#39;s interesting to note how some of the new age features are becoming part and parcel of the application infrastructure.&lt;br/&gt;&lt;br/&gt;Few years back, an application server with servlet, EJB containers, connection pooling and other services was considered to be an application platform. Then with the SOA wave, features like orchestration (BPEL), service bus (for routing, transformation), adapters (for connecting apps), and governance tools became part of the platform leading to development of composite applications.&lt;br/&gt;Now, vmForce is taking it another step ahead including features such as social apps like collaboration, google like search for any data, mobile access, BPM and reporting dashboards to be part of the platform, relieving application developers and administrators from integration pains with external tools providing these features.&lt;br/&gt;&lt;br/&gt;Following vmForce feature list is extracted from &lt;a href=&#39;http://blog.sforce.com/sforce/2010/04/vmforce.html&#39;&gt;Anshu&#39;s blogpost&lt;/a&gt; on this topic.&lt;br/&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;Social Profiles: &lt;/strong&gt;Who are the users in this application so I can work with them?&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;Status Updates:&lt;/strong&gt; What are these users doing? How can I help them and how can they help me?&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;Feeds: &lt;/strong&gt;Beyond&lt;br /&gt;user status updates, how can I find the data that I need? How can this&lt;br /&gt;data come to me via Push? How can I be alerted if an expense report is&lt;br /&gt;approved or a physician is needed in a different room?&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;Content Sharing: &lt;/strong&gt;How&lt;br /&gt;can I upload a presentation or a document and instantly share it in a&lt;br /&gt;secure and managed manner with the right set of co-workers? &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;Search&lt;/strong&gt;: Ability to search any and all data in your enterprise apps&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;Reporting&lt;/strong&gt;: Ability to create dashboards and run reports, including the ability to modify these reports&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;Mobile&lt;/strong&gt;: Ability to access business data from mobile devices ranging from BlackBerry phones to iPhones&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;Integration&lt;/strong&gt;: Ability to integrate new applications via standard web services with existing applications&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;Business Process Management&lt;/strong&gt;: Ability to visually define business processes and modify them as business needs evolve&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;User and Identity Management&lt;/strong&gt;:&lt;br /&gt;Real-world applications have users! You need the capability to add,&lt;br /&gt;remove, and manage not just the users but what data and applications&lt;br /&gt;they can have access to&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;div&gt;&lt;span style=&#39;font-size: 12pt;&#39;&gt;&lt;strong&gt;Application Administration&lt;/strong&gt;: Usually an afterthought, administration is a critical piece once the application is deployed&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/9068564242844103124/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/9068564242844103124' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/9068564242844103124'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/9068564242844103124'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/06/vmforce-adding-new-age-features-to.html' title='vmForce - adding new age features to the application platform'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-1792956965918327701</id><published>2010-06-02T21:47:00.001-07:00</published><updated>2010-06-02T21:47:54.530-07:00</updated><title type='text'>Connecting Salesforce.com from Google AppEngine using OAuth</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Here&#39;s a blogpost on how to connect and authenticate salesforce.com from an application deployed on Google AppEngine using OAuth protocol.&lt;br/&gt;&lt;a href=&#39;http://blog.sforce.com/sforce/2010/04/connecting-google-app-engine-and-salesforcecom-with-oauth.html&#39;&gt;http://blog.sforce.com/sforce/2010/04/connecting-google-app-engine-and-salesforcecom-with-oauth.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;See how the complexity of the OAuth protocol has been hidden by the helper APIs of &lt;a href=&#39;http://code.google.com/p/oauth/source/browse/code/java/core/src/main/java/net/oauth/OAuthAccessor.java?spec=svn836&amp;amp;r=836&#39;&gt;&lt;b&gt;OAuthAccessor&lt;/b&gt;&lt;/a&gt; and &lt;a href=&#39;http://code.google.com/p/sfdc-oauth-demo/source/browse/trunk/demo/src/com/jeffdouglas/oauth/utils/OauthHelperUtils.java?spec=svn3&amp;amp;r=3&#39;&gt;&lt;b&gt;OauthHelperUtils&lt;/b&gt;&lt;/a&gt;.&lt;br/&gt;Refer to this &lt;a href=&#39;http://code.google.com/p/sfdc-oauth-demo/&#39;&gt;demo project&lt;/a&gt; written by Jeff Douglas.&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/1792956965918327701/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/1792956965918327701' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/1792956965918327701'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/1792956965918327701'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/06/connecting-salesforcecom-from-google.html' title='Connecting Salesforce.com from Google AppEngine using OAuth'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-6220153303285776294</id><published>2010-06-02T21:36:00.000-07:00</published><updated>2010-06-02T21:37:02.169-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Force.com security</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;You can find resources and links to Force.com platform security for secure cloud development here.&lt;br/&gt;&lt;a href=&#39;http://blog.sforce.com/sforce/2010/04/introducing-forcecom-secure-cloud-development.html&#39;&gt;http://blog.sforce.com/sforce/2010/04/introducing-forcecom-secure-cloud-development.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;What I like is how it&#39;s organized - complete with education material, security design principles, secure coding guidelines, security testing tools, and how to perform security review - providing end to end guidance on how to implement security for apps deployed on Force.com.&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/6220153303285776294/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/6220153303285776294' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/6220153303285776294'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/6220153303285776294'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/06/forcecom-security.html' title='Force.com security'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-315178846867268306</id><published>2010-05-19T16:12:00.000-07:00</published><updated>2010-05-19T16:51:02.514-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="news"/><title type='text'>Tech M&amp;A deals of 2010</title><content type='html'>Here&#39;s some notable tech M&amp;amp;A activity happened till May, 2010.&lt;br /&gt;&lt;br /&gt;In Security space,&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Oracle IdM adding &lt;a href=&quot;http://www.oracle.com/us/products/middleware/identity-management/oracle-identity-analytics/index.html&quot;&gt;identity analytics (OIA)&lt;/a&gt; to it&#39;s portfolio through the broader Sun acquisition&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Symantec enhancing encryption portfolio with PGP, GuardianEdge, and vulnerability assessment offering through Gideon Technologies&lt;br /&gt;&lt;/li&gt;&lt;li&gt;EMC&#39;s RSA Security Division acquired Archer Technologies for GRC across physical+virtual infrastructures&lt;/li&gt;&lt;li&gt;Trustwave acquired Intellitactics for SIEM to enhance PCI compliance offering, and BitArmor to enhance endpoint security offering&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;In Cloud computing space,&lt;br /&gt;&lt;ul&gt;&lt;li&gt;VmWare seems to be building up Cloud PaaS platform acquiring Spring Source (in 2009) , and now Zimbra, and Rabbit Technologies&lt;/li&gt;&lt;li&gt;CA acquired Nimsoft and 3Tera to manage cloud environments&lt;/li&gt;&lt;li&gt;Cisco acquired Rohati Systems for cloud security in Cisco&#39;s Nexus switch line &lt;/li&gt;&lt;/ul&gt; In Mobile space,&lt;br /&gt;&lt;ul&gt;&lt;li&gt;SAP planning to buy Sybase for it&#39;s mobile middleware&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Apple getting Siri, HP getting Palm, RIM getting Viigo&lt;/li&gt;&lt;/ul&gt;References:&lt;br /&gt;&lt;a href=&quot;http://www.networkworld.com/slideshows/2010/mergers-and-acquisitions.html&quot;&gt;Network World slideshow on Tech acquisitions of 2010&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.pwc.com/us/en/transaction-services/publications/assets/PwC-US-technology-MA-insights-2010.pdf&quot;&gt;PWC report on Tech M&amp;amp;A insights for 2010&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/315178846867268306/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/315178846867268306' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/315178846867268306'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/315178846867268306'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/05/tech-m-deals-of-2010.html' title='Tech M&amp;A deals of 2010'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-1408159395544405995</id><published>2010-04-28T01:17:00.001-07:00</published><updated>2010-04-28T01:21:14.194-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="faq"/><category scheme="http://www.blogger.com/atom/ns#" term="news"/><category scheme="http://www.blogger.com/atom/ns#" term="owsm 11gR1"/><title type='text'>What&amp;#39;s new in OWSM 11gR1 PS2 (11.1.1.3.0) ?</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;a target=&#39;_blank&#39; href=&#39;http://www.oracle.com/technology/software/products/middleware/index.html&#39;&gt;Oracle Fusion Middleware 11gR1 PS2&lt;/a&gt; (Patchset 2) aka 11.1.1.3.0 is released and generally available now.&lt;br/&gt;&lt;br/&gt;&lt;b&gt;What&#39;s new in OWSM 11gR1 PS2 (11.1.1.3.0)?&lt;/b&gt;&lt;br/&gt;&lt;ul&gt;&lt;li&gt;Agent for OSB 11gR1&lt;/li&gt;&lt;li&gt;Enhanced integration for WLS JAX-WS web services (centralized policy mgt, policy attachment through EM, policy advertisement in WSDL, and policy monitoring)&lt;/li&gt;&lt;li&gt;IBM DB2 certification of MDS backed policy store&lt;/li&gt;&lt;li&gt;WS-Security + WS-AT combination support&lt;/li&gt;&lt;li&gt;Enhanced Test-to-Production for policy attachments using deployment plans&lt;/li&gt;&lt;/ul&gt;&lt;b&gt;Also see,&lt;/b&gt;&lt;br/&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E14571_01/relnotes.1111/e10133/owsm.htm#CACHHDIE&#39; target=&#39;_blank&#39;&gt;Known Issues&lt;/a&gt;&lt;br/&gt;&lt;/li&gt;&lt;li&gt;Product documentation - &lt;a href=&#39;http://download.oracle.com/docs/cd/E14571_01/index.htm&#39; target=&#39;_blank&#39;&gt;11gR1 PS2 Library&lt;/a&gt; , &lt;a href=&#39;http://ws-security.blogspot.com/2010/03/faq-owsm-11g-documentation-links.html&#39; target=&#39;_blank&#39;&gt;OWSM documentation links&lt;/a&gt;&lt;/li&gt;&lt;li&gt;What&#39;s new in OWSM &lt;a href=&#39;http://ws-security.blogspot.com/2009/07/oracle-fusion-middleware-11g-launched.html&#39; target=&#39;_blank&#39;&gt;11gR1&lt;/a&gt;, and &lt;a href=&#39;http://ws-security.blogspot.com/2009/11/oracle-fusion-middleware-11gr1-ps1.html&#39;&gt;11gR1 PS1&lt;/a&gt; releases?&lt;/li&gt;&lt;li&gt;&lt;a href=&#39;http://www.oracle.com/technology/products/webservices_manager/index.html&#39;&gt;OWSM page on OTN&lt;/a&gt;&lt;br/&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/1408159395544405995/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/1408159395544405995' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/1408159395544405995'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/1408159395544405995'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/04/what-new-in-owsm-11gr1-ps2-111130.html' title='What&amp;#39;s new in OWSM 11gR1 PS2 (11.1.1.3.0) ?'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-7831685294616144693</id><published>2010-03-12T01:21:00.000-08:00</published><updated>2010-03-12T01:22:09.438-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="faq"/><category scheme="http://www.blogger.com/atom/ns#" term="owsm 11gR1"/><title type='text'>FAQ - OWSM 11g documentation links</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Listing all OWSM 11gR1 related documentation at one place from the latest patchset.&lt;br/&gt;&lt;br/&gt;&lt;table cellspacing=&#39;2&#39; cellpadding=&#39;2&#39; border=&#39;1&#39; style=&#39;text-align: left; width: 100%;&#39;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&#39;background-color: rgb(204, 204, 204);&#39;&gt;Guide&lt;/td&gt;&lt;td style=&#39;background-color: rgb(204, 204, 204);&#39;&gt;Release&lt;/td&gt;&lt;td style=&#39;background-color: rgb(204, 204, 204);&#39;&gt;Part Number&lt;/td&gt;&lt;td style=&#39;background-color: rgb(204, 204, 204);&#39;&gt;Comments&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/index.htm&#39;&gt;Documentation Library Portal&lt;/a&gt;&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt;E15523_01&lt;/td&gt;&lt;td&gt;Main site with links to all guides&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/doc.1111/e13925/toc.htm&#39;&gt;Installation Guide for Oracle SOA Suite&lt;/a&gt;&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt; E13925-02&lt;/td&gt;&lt;td&gt;Installing SOA Suite&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E12839_01/upgrade.1111/e10127/upgrade_soa_apps.htm#FUPSS1210&#39;&gt;OWSM Upgrade Guide - 10gR3 to 11gR1&lt;/a&gt;&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt;E10127-01&lt;/td&gt;&lt;td&gt;Migrating OWSM policies from 10g3 to 11gR1 release&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/web.1111/b32511/toc.htm&#39;&gt;OWSM Admin Guide&lt;/a&gt; (Security and Administrator&#39;s Guide for Web Services)&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt;B32511-02&lt;/td&gt;&lt;td&gt;Main OWSM guide covering concepts &amp;amp; management interfaces&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/web.1111/e13713/owsm_appendix.htm#CHDBHECC&#39;&gt;OWSM Developer&#39;s Guide&lt;/a&gt; (Securing WebLogic Web Services)&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt; E13713-02&lt;/td&gt;&lt;td&gt;Covers how to attach policies at design time through JDeveloper&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/apirefs.1111/e10689/toc.htm&#39;&gt;OWSM Java API Reference&lt;/a&gt;&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt;&lt;font&gt;&lt;span class=&#39;384051522-09032010&#39;&gt;E10689-02&lt;/span&gt;&lt;/font&gt;&lt;/td&gt;&lt;td&gt;For writing custom policy assertions&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/core.1111/e10043/audintro.htm&#39;&gt;Fusion Middleware Audit Framework&lt;/a&gt; (Security Guide)&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt;E10043-04&lt;/td&gt;&lt;td&gt;OWSM leverages FMW audit framework&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/web.1111/e16098/toc.htm&#39;&gt;OWSM Interoperability Guide&lt;/a&gt;&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt;E16098-01&lt;/td&gt;&lt;td&gt;Covers  interoperable policies certified against OWSM 10g, .NET, Axis, OSB 10g, WLS native security, etc.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/core.1111/e10106/ha_soa.htm#CHDDJHGF&#39;&gt;OWSM HA Guide&lt;/a&gt;&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt;E10106-02&lt;/td&gt;&lt;td&gt;Configuring OWSM for High Availability&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/core.1111/e12036/toc.htm&#39;&gt;Enterprise Deployment Guide (EDG) for SOA Suite&lt;/a&gt;&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt; E12036-02&lt;/td&gt;&lt;td&gt;Recommended deployment topology&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;span id=&#39;e15250&#39; class=&#39;bookname&#39;&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/doc.1111/e15250/recommendations.htm#ASDRG216&#39;&gt;OWSM Backup and Recovery&lt;/a&gt; (Disaster Recovery Guide)&lt;/span&gt;&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt;E15250-01&lt;/td&gt;&lt;td&gt;Configuring for disaster recovery&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/core.1111/e10108/platsec.htm#BCGFHIFF&#39;&gt;OWSM Performance and Tuning Guide&lt;/a&gt;&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;/td&gt;&lt;td&gt;E10108-01&lt;/td&gt;&lt;td&gt;Performance/Tuning&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15523_01/doc.1111/e14860/products.htm#BABHCBCG&#39;&gt;OWSM Licensing Information&lt;/a&gt;&lt;/td&gt;&lt;td&gt;&lt;br/&gt;&lt;/td&gt;&lt;td&gt;E14860-07&lt;/td&gt;&lt;td&gt;Licensing terms&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15217_01/index.htm&#39;&gt;Oracle Platform Security Services (OPSS) Guide&lt;br/&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;11gR1 PS1&lt;br/&gt;&lt;/td&gt;&lt;td&gt; E10043-04&lt;/td&gt;&lt;td&gt;OPSS Guide&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&#39;http://download.oracle.com/docs/cd/E15217_01/index.htm&#39;&gt;Oracle Access Manager 10g (10.1.4.3)&lt;/a&gt;&lt;/td&gt;&lt;td&gt;10.1.4.3&lt;/td&gt;&lt;td&gt;&lt;br/&gt;&lt;/td&gt;&lt;td&gt;OAM 10g Guides&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br/&gt;OWSM leverages OPSS internally for authentication, CSF and few other services. So, some of the above guides/sections should be complemented with OPSS guides.&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=5ae220da-b613-8c01-b514-70969ec98e51&#39; alt=&#39;&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/7831685294616144693/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/7831685294616144693' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/7831685294616144693'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/7831685294616144693'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/03/faq-owsm-11g-documentation-links.html' title='FAQ - OWSM 11g documentation links'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-5366897969612314612</id><published>2010-02-21T23:00:00.001-08:00</published><updated>2010-02-21T23:00:19.566-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="news"/><title type='text'>Intel&amp;#39;s cloud chip and physicalization</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Per Intel&#39;s CTO Justin Rattner, Intel is working on a single chip cloud computer&lt;br/&gt;&lt;ul&gt;&lt;li&gt;Parts of the chip will be powered down when not in use&lt;/li&gt;&lt;li&gt;First iteration involves a 48 core processor that consumes 25 - 125 watts&lt;/li&gt;&lt;li&gt;New term invented &quot;physicalization&quot; which means dedicating one or more cores to a specific application or portion of the application. This is completely opposite to &quot;virtualization&quot; which means running applications on whatever processor resources are available&lt;/li&gt;&lt;/ul&gt;For complete story, see this &lt;a href=&#39;http://www.forbes.com/2009/12/07/virtualization-computing-chips-technology-cio-network-intel.html?partner=yahootix&#39; target=&#39;_blank&#39;&gt;Forbes article&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=1f3e5368-a08a-816c-9bef-067117234088&#39; alt=&#39;&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/5366897969612314612/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/5366897969612314612' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/5366897969612314612'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/5366897969612314612'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/02/intel-cloud-chip-and-physicalization.html' title='Intel&amp;#39;s cloud chip and physicalization'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-2734593218766761462</id><published>2010-02-08T10:57:00.000-08:00</published><updated>2010-02-08T11:06:51.829-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="EM"/><category scheme="http://www.blogger.com/atom/ns#" term="news"/><category scheme="http://www.blogger.com/atom/ns#" term="soa mgt"/><title type='text'>Oracle extends BTM and SOA Mgt through Amberpoint acquisition</title><content type='html'>&lt;a href=&quot;http://www.oracle.com/us/corporate/press/048842&quot;&gt;Oracle&#39;s acquisition of Amberpoint&lt;/a&gt; extends it&#39;s capabilities around Business Transaction Monitoring (BTM), SOA Management and SOA Governance into it&#39;s SOA products offering.&lt;br /&gt;&lt;br /&gt;Read the following resources for more info&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://www.oracle.com/amberpoint/customer-letter.html&quot;&gt;Benefits of the combination&lt;/a&gt; from Richard Sarwal, Sr VP, Product Development, Oracle&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.oracle.com/amberpoint/amberpoint-general-presentation.pdf&quot;&gt;General Presentation&lt;/a&gt; on Amberpoint&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.oracle.com/amberpoint/amberpoint-faq.pdf&quot;&gt;FAQ&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;From the FAQ,&lt;br /&gt;The AmberPoint solution will provide several critical capabilities requested by customers.&lt;br /&gt;• Application Discovery – Automatically discovers components and interactions and ensures visibility of the entire heterogeneous SOA environment&lt;br /&gt;• Application Performance Management – Tracks end-to-end performance and availability&lt;br /&gt;• Business Transaction Management – Ensures reliability of individual business transactions and tracks the progress in real time to pinpoint any issues&lt;br /&gt;• SOA Governance – Provides closed-loop governance by reporting run-time results to design-time governance solutions</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/2734593218766761462/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/2734593218766761462' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/2734593218766761462'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/2734593218766761462'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/02/oracle-extends-btm-and-soa-mgt-through.html' title='Oracle extends BTM and SOA Mgt through Amberpoint acquisition'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-3011822818255361302</id><published>2010-02-05T15:37:00.001-08:00</published><updated>2010-02-05T15:37:21.199-08:00</updated><title type='text'>Integrating REST clients with STS for token exchange</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Where REST services demand a particular type of token for access, REST clients can potentially integrate with an STS server to acquire the requisite token, and pass it to the service.&lt;br/&gt;&lt;br/&gt;I haven&#39;t seen customers yet widely asking for such solutions, but need can arise where companies standardize across the applications on tokens such as SAML for access control which carries not only the username information but also attributes associated with user profile.&lt;br/&gt;&lt;br/&gt;In such scenarios, following flow would be applicable&lt;br/&gt;&lt;ol&gt;&lt;li&gt;REST client acquires token from the STS server preferably through REST binding of STS, but any other supported binding should also be okay.&lt;/li&gt;&lt;li&gt;Once it receives the token, it adds it to the &quot;Authorization&quot; HTTP header of the REST request.&lt;/li&gt;&lt;li&gt;REST service receives the request, and a security interceptor(agent) picks up the token to check for access validity. The interceptor can optionally assert the identity into the service for identity propagation needs.&lt;/li&gt;&lt;/ol&gt;I would be interested to know if you run into such scenarios, and looking for products to support it. You can leave blog comments.&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=7ee3dbd1-4c77-81d4-8b7d-afa9504003fd&#39; alt=&#39;&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/3011822818255361302/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/3011822818255361302' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/3011822818255361302'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/3011822818255361302'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/02/integrating-rest-clients-with-sts-for.html' title='Integrating REST clients with STS for token exchange'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-2277805356175774515</id><published>2010-02-03T03:27:00.001-08:00</published><updated>2010-02-03T12:52:50.506-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="sts"/><title type='text'>RESTful STS</title><content type='html'>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;Secure Token Service (STS) typically have a SOAP endpoint with &lt;a href=&quot;http://docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.html&quot; target=&quot;_blank&quot;&gt;WS-Trust&lt;/a&gt; standard profiling the interactions. How about taking the complexity of SOAP away, and adding simplicity of REST interface to the STS? At the end of the day, STS is a token service that applications use to acquire tokens and should be accessible through different types of bindings - SOAP, REST, etc.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What would be the interaction pattern for such RESTful STS?&lt;/b&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Clients access RESTful STS using HTTP GET/POST method sending RequestSecurityToken (RST) as part of HTTP message.&lt;/li&gt;&lt;li&gt;RESTful STS sends back the requested token as RequestSecurityTokenResponse (RSTR) in the HTTP response message.&lt;/li&gt;&lt;li&gt;The STS endpoint could be secured similar to any HTTP resource using web access management products such as Oracle Access Manager (OAM) with username/password or certificate credentials.&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;&lt;b&gt;RESTful STS can lead to wider adoption&lt;/b&gt;&lt;br /&gt;Many languages/frameworks (such as Adobe Flex and Silverlight) doesn&#39;t support full capabilities of a SOAP stack. But, they support the basic HTTP interactions. Such frameworks could easily plug into a RESTful STS for their token needs.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Applicability of RESTful STS in the cloud&lt;/b&gt;&lt;br /&gt;As cloud remains the innovation vehicle for 2010, I try to find applicability of any new concept into the cloud as well.&lt;br /&gt;Today, Google, Amazon, Salesforce of the world provide RESTful APIs for all it&#39;s services. If they decide to broker trust using some sort of STS, then it makes perfect sense for them to provide RESTful STS with API keys and OpenId/OAUTH models to access it.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;zemanta-pixie&quot;&gt;&lt;img src=&quot;http://img.zemanta.com/pixy.gif?x-id=526968da-a734-8413-a511-15e5ca037998&quot; alt=&quot;&quot; class=&quot;zemanta-pixie-img&quot; /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/2277805356175774515/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/2277805356175774515' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/2277805356175774515'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/2277805356175774515'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/02/restful-sts.html' title='RESTful STS'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-622572873609122713</id><published>2010-02-01T00:18:00.001-08:00</published><updated>2010-02-01T00:23:58.444-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="governance"/><category scheme="http://www.blogger.com/atom/ns#" term="news"/><category scheme="http://www.blogger.com/atom/ns#" term="Oracle"/><title type='text'>OER 11g released</title><content type='html'>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;&lt;a href=&quot;http://www.oracle.com/technology/products/soa/repository/index.html&quot; target=&quot;_blank&quot;&gt;Oracle Enterprise Repository (OER)&lt;/a&gt; 11g is released and generally available for download now. OER alongwith OSR (UDDI registry), OWSM and EM SOA Mgt Pack Plus comprise Oracle&#39;s SOA Governance offering. Of all the new features added in this release of OER, there&#39;s one feature around closed loop governance that I would like to discuss in this blog.&lt;br /&gt;&lt;br /&gt;Closed loop governance allows architects to review at a high-level how the system and services they designed are behaving in production, and with this knowledge further enhance the services in their subsequent versions. It provides confidence and production assurance to business people that the investments they have put in SOA is actually being put to use.&lt;br /&gt;&lt;br /&gt;In this release of OER 11g, high-level performance metrics from Enterprise Manager (EM) and 3rd party products such as Amberpoint are rolled up into OER.&lt;br /&gt;&lt;br /&gt;Through the same pattern, do you see a need for rolling up policy attachment info from OWSM into OER?&lt;br /&gt;&lt;br /&gt;See more of &quot;What&#39;s New in OER 11g&quot; &lt;a href=&quot;http://blogs.oracle.com/governance/2010/01/oracle_enterprise_repository_1_1.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;blockquote&gt;&lt;div class=&quot;zemanta-pixie&quot;&gt;&lt;img src=&quot;http://img.zemanta.com/pixy.gif?x-id=2ad28e98-d1f4-8b76-a727-5becc7dd0050&quot; alt=&quot;&quot; class=&quot;zemanta-pixie-img&quot; /&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/622572873609122713/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/622572873609122713' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/622572873609122713'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/622572873609122713'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/02/oer-11g-released.html' title='OER 11g released'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-3840566322160320861</id><published>2010-01-29T13:47:00.001-08:00</published><updated>2010-01-29T13:47:36.703-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="news"/><category scheme="http://www.blogger.com/atom/ns#" term="Oracle"/><title type='text'>Oracle + Sun: Identity Management Strategy webcast</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Watch Oracle + Sun identity management strategy webcast by Oracle executive Hasan Rizvi, Sr. VP&lt;br/&gt;&lt;a href=&#39;http://oracle.com.edgesuite.net/ivt/4000/8104/9236/12628/lobby_external_flash_clean_480x360/default.htm&#39; target=&#39;_blank&#39;&gt;http://oracle.com.edgesuite.net/ivt/4000/8104/9236/12628/lobby_external_flash_clean_480x360/default.htm&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=07c4fbeb-3eed-85e0-a906-4fca35cfbbe9&#39; alt=&#39;&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/3840566322160320861/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/3840566322160320861' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/3840566322160320861'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/3840566322160320861'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/01/oracle-sun-identity-management-strategy.html' title='Oracle + Sun: Identity Management Strategy webcast'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-4244142788331942854</id><published>2010-01-27T16:57:00.001-08:00</published><updated>2010-01-27T16:57:54.185-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="news"/><title type='text'>Oracle + Sun Strategy Webcast</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;a href=&#39;http://www.oracle.com/webapps/events/EventsDetail.jsp?p_eventId=108481&amp;amp;src=6806472&amp;amp;src=6806472&amp;amp;Act=22&#39; target=&#39;_blank&#39;&gt;Oracle + Sun Strategy Webcast&lt;/a&gt; was done by Oracle/Sun executives today.&lt;br/&gt;Hope you got a chance to attend it live. If you missed it, check back the link in couple of days when the recording would be available for on demand viewing.&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=5fee6c11-67d6-8587-8d97-a1cb24aaea80&#39; alt=&#39;&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/4244142788331942854/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/4244142788331942854' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/4244142788331942854'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/4244142788331942854'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/01/oracle-sun-strategy-webcast.html' title='Oracle + Sun Strategy Webcast'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6194775689881201187.post-7237452602545828005</id><published>2010-01-27T16:53:00.001-08:00</published><updated>2010-01-27T16:53:17.256-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="howto"/><category scheme="http://www.blogger.com/atom/ns#" term="owsm 11g"/><title type='text'>HowTo - OWSM 11g: Creating custom policy assertions</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Similar to OWSM 10gR3, you can extend OWSM in 11g using custom policy implementations.&lt;br/&gt;From terminology perspective, OWSM 10g custom policy is similar to OWSM 11g custom policy assertion.&lt;br/&gt;Here are some quick links that may help if you plan to implement custom policies.&lt;br/&gt;&lt;ol&gt;&lt;li&gt;Refer to &lt;a href=&#39;http://download.oracle.com/docs/cd/E12839_01/web.1111/b32511/custom_assertions.htm#CIHFGJAG&#39; target=&#39;_blank&#39;&gt;Creating Custom Assertions&lt;/a&gt; section of OWSM product documentation &lt;/li&gt;&lt;li&gt;Refer to &lt;a href=&#39;http://download.oracle.com/docs/cd/E12839_01/apirefs.1111/e10689/toc.htm&#39; target=&#39;_blank&#39;&gt;Java API reference&lt;/a&gt; for available APIs&lt;/li&gt;&lt;li&gt;&lt;a href=&#39;http://www.scribd.com/doc/25941008&#39; target=&#39;_blank&#39;&gt;Step by step How-To guide&lt;/a&gt; on building a sample custom assertion, deploy, and test it&lt;br/&gt;&lt;/li&gt;&lt;/ol&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=e9acd0e2-6abe-808b-9d02-3e8ed347bf6c&#39; alt=&#39;&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://ws-security.blogspot.com/feeds/7237452602545828005/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6194775689881201187/7237452602545828005' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/7237452602545828005'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6194775689881201187/posts/default/7237452602545828005'/><link rel='alternate' type='text/html' href='http://ws-security.blogspot.com/2010/01/howto-owsm-11g-creating-custom-policy.html' title='HowTo - OWSM 11g: Creating custom policy assertions'/><author><name>Vikas Jain</name><uri>http://www.blogger.com/profile/14997600174472354351</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='23' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL3LlrhqJ2sa8wv-_32CM7O8bAPdG7YVr3QZQ77sKm5wv1YzdWa8L3nFqhx7SMhsKnH33DxawHVeIhozbUH7B0LWERFLCEIHGsJ-QINsUOpJSFzKeXgldMSOaia8LPrg0/s220/final.jpg'/></author><thr:total>0</thr:total></entry></feed>