Both the Brokered Authentication pattern and the Direct Authentication pattern advocate the use of a central identity store.
Answer : B
The use of XML-Encryption supports the application of the Service Abstraction principle because the actual message remains hidden from the attacker.
Answer : B
With SAML, the _____________ element is used by the relying party to confirm that a given message came from the subject specified in the assertion.
Answer : A
Service A hashes a message, resulting in message digest X. Service A encrypts message digest X with its private key, resulting in cipher text X1. Service A sends the message and X1 to Service B. Service B hashes the message, resulting in message digest Y. Service B decrypts X1 with Service A's public key, recovering message digest X1. Service B compares X and Y and finds them not to be equal. This proves that;
Answer : D
SAML can be used for the application of the Brokered Authentication pattern.
Answer : A
Using message-layer security, if a service agent takes possession of a message, it can forward the message to another service.
Answer : A
Which of the following are valid security considerations specific to the application of the Service Autonomy principle?
Answer : D