Figure 9.1: IBM and Microsoft Web Services security specifications
Chapter 10: .NET and Passport
Figure 10-1: Kerberos ticket distribution
Figure 10-2: Secret key exchange occurs out of band
Figure 10-3: User authentication to a Passport partner server
Figure 10-4: Viewing assemblies with the .NET Framework Configuration console
Figure 10-5: Creating a new permission set with the .NET MMC
Figure 10-6: Assigning security permissions to an assembly
Figure 10-7: Remove every unused ISAPI filter
Chapter 11: The Liberty Alliance Project
Figure 11-1: Joan (the Principal) is authenticated by IDP1 (her identity provider) when she browses to her personalized BigWebRetailer (her service provider) Web page
Chapter 12: UDDI and Security
Figure 12-1: UDDI data structures and service types
Figure 12-2: Inserting a new businessEntity record into the IBM test registry
Figure 12-3: Inserting a new tModel record into the IBM test registry
Chapter 14: Legal Considerations
Figure 14-1: Security in the message
Figure 14-2: SAML assertions in action
Appendix: Case Studies
Figure A-1: The Security Management Wizard in VordelSecure
Figure A-2: Loading a Web Service description in VordelSecure
Figure A-3: Basing a security policy on a preexisting policy