Security specialists are planning to implement public key cryptography in order to encrypt messages exchanged between Service A and Service B. Which of the following options fulfills this requirement?
Answer : D
When establishing a single sign-on mechanism, the application of the Standardized Service Contract principle requires the use of SAML because it is an industry standard understood by multiple service consumers.
Answer : B
As part of Service Composition A, a service consumer needs to authenticate itself to four different services. The Direct Authentication pattern was applied to each of these four services, all of which share the same identity store. This identity store is also shared by a number of additional services. As a result of increased usage, the identity store has become a performance bottleneck. The resulting performance degradation is impacting Service Composition A to the extent that it is causing problems. The security architecture for Service Composition A needs to be improved in order to avoid further performance degradation. However, any changes to the service composition architecture cannot break any dependencies with the existing service consumer. Which of the following approaches fulfills these requirements?
Answer : B
A set of services within a service inventory were originally each designed with a dedicated identity store. To reduce the need for service consumers to repeatedly authenticate themselves when having to access multiple services, a new ___________ has been added along with a____________.
Answer : B
With SAML, the _____________ element is used by the relying party to confirm that a given message came from the subject specified in the assertion.
Answer : A
Service A sends a message to Service B which reads the values in the message header to determine whether to forward the message to Service C or Service D. Because of recent attacks on Services C and D, it has been decided to protect the body content of messages using some form of encryption. However, certain restrictions within the design of Service B will not permit it to be changed to support the encryption and decryption of messages. Only Services A, C and D can support message encryption and decryption. Which of the following approaches fulfill these security requirements without changing the role of Service B?
Answer : B
Service A carries out XML canonicalization and creates a message digest. It then encrypts the message digest using asymmetric encryption. Service B. upon receiving the message, decrypts the message hash and calculates the hash of the original message. However, upon comparison, the received message digest and the calculated message digest do not match. How can this problem be avoided?
Answer : B