Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] SAAJ API for Web services in case study in Message Inspector pattern Safeguards Rule SAML (Security Assertion Markup Language) 2nd 3rd architecture 2nd assertions 2nd 3rd 4th attribute authentication 2nd authorization domain model for access control Identity management patterns in XACML 2nd 3rd J2EE-based applications and web services Java System Access Manager with migration in motivation Policy Administration Point Policy Enforcement Point profiles 2nd 3rd request-reply model SAML 1.0 2nd SAML 1.1 SAML 2.0 2nd 3rd SSO in 2nd usage scenarios DOS attacks global logout man-in-the-middle attacks message replay and message modification third-party authentication and authorization XML signatures in SAML Token profile Sample code for security patterns Assertion Builder Audit Interceptor Authentication Enforcer Container Managed Security Credential Tokenizer pattern Dynamic Service Management Intercepting Web Agent Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator SampleAuthorizationEnforcer.java file Sarbanes-Oxley Act (SOX) identity protection in 2nd in security provisioning patterns SASL (Simple Authentication and Security Layer) API clients 2nd installing servers SATAN (Security Administrator Tool for Analyzing Networks) tool SBU (Sensitive But Unclassified) information Scalability in security patterns Intercepting Web Agent Secure Message Router Secure Service Proxy security provisioning Single Sign-on Delegator J2EE network topology horizontal vertical sCallerInRole method Scanners fingerprint in biometrics Scanning data protection. [See Intercepting Validator pattern] Scope Liberty Alliance service provisioning Screen display messages Scripting, cross-site seal method Sealed objects SealedObject class Search operations in SPML SearchRequest message Secret data Secret keys in assessment checklists SecretKeyFactory class Secure Association patterns Secure Base Action pattern 2nd and Policy Delegate pattern consequences forces in case study 2nd 3rd 4th participants and responsibilities 2nd problem reality checks related patterns sample code security factors and risk solution strategies structure Secure Communication patterns Secure data logger strategy Secure log store strategy Secure Logger pattern 2nd consequences 2nd forces in case study 2nd 3rd participants and responsibilities problem reality check related patterns Message Inspector Secure Base Action sample code security factors and risks solution strategies structure Secure Message Interceptor pattern Secure Message Router pattern consequences forces in case study 2nd 3rd 4th participants and responsibilities problem reality check related patterns Message Interceptor Gateway Secure Service Proxy security factors and risks solution strategies structure Secure Pipe pattern 2nd 3rd consequences forces in case study 2nd 3rd 4th in secure log store strategy 2nd participants and responsibilities problem reality check related patterns Authentication Enforcer Credential Tokenizer Dynamic Service Management Secure Logger sample code security factors and risks solution strategies structure Secure Service Facade pattern 2nd 3rd consequences forces in case study participants and responsibilities 2nd problem reality check related patterns sample code security factors and risks solution strategies structure Secure Service Proxy pattern consequences forces participants and responsibilities problem reality check related patterns Container Managed Security Intercepting Web Agent Secure Service Facade sample code security factors and risks solution strategies structure Secure service proxy single service strategy Secure Session Facade pattern 2nd Secure Session Manager 2nd Secure Session Object pattern consequences forces participants and responsibilities problem reality check related patterns sample code security factors and risks solution strategies structure Secure Session pattern Secure Socket Layer. [See SSL (Secure Socket Layer)] Secure UP artifacts in risk analysis trade-off analysis SecureBaseAction class Authentication Enforcer pattern Authorization Enforcer pattern 2nd Intercepting Validator pattern JAAS Login Module strategy with Apache Struts SecureClassLoader class SecureID SecureRandom class SecureServiceFacade class SecureSessionFacadeSessionBean.java file Security Administrator Tool for Analyzing Networks (SATAN) tool Security Assertion Markup Language. [See SAML (Security Assertion Markup Language)] Security by default 2nd application security business challenges compliance. [See Compliance] flaws and exploits four W's identity management Java technology justifications personal identification proactive and reactive references strategies summary weakest links Security class Security Context pattern Security Event Logging pattern Security factors in security patterns Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator Security levels in J2EE network topology Security patterns application security assessment model applying Business tier 2nd Audit Interceptor best practices Container Managed Security Dynamic Service Management factor analysis Obfuscated Transfer Object overview 2nd pitfalls Policy Delegate references Secure Service Facade Secure Session Object classification existing factor analysis Identity management 2nd 3rd Assertion Builder best practices Credential Tokenizer pattern pitfalls references Single Sign-on Delegator pattern in case study 2nd in patterns-driven security design infrastructure and quality of services Integration tier labeling in policy design in references relationships security provisioning best practices and pitfalls Password Synchronizer threat profiling tier analysis trust model Web services 2nd best practices Message Inspector Message Interceptor Gateway pitfalls references Secure Message Router Web tier 2nd 3rd Authentication Enforcer Authorization Enforcer best practices Intercepting Validator Intercepting Web Agent references Secure Base Action Secure Logger Secure Pipe Secure Service Proxy Security principles, references for Security Provider patterns Security provisioning references security patterns best practices and pitfalls Password Synchronizer summary Security realms for smart cards J2EE 2nd JAAS Security requirements and goals authentication authorization confidentiality integrity non-repudiation Security Services Security tokens. [See Tokens] Security Wheel hub spokes wheel edge SecurityException class SecurityManager class SecurityProtocolHandler class SecurityToken class 2nd Self-healing in Web services patterns Sensitive But Unclassified (SBU) information Sensitive information in case study Secure Logger pattern Secure Session Object pattern Web tier patterns Separation of responsibility Sequence diagrams identity provider agent strategy in security patterns 2nd Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator 2nd Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator JAAS Login Module strategy Sequence numbers for deletion detection 2nd Server Gated Cryptography (SGC) Server mutual authentication Server-side communication Server-side SSL example Server-to-server connections in case study in use cases Web tier patterns ServerHello messages Servers DMZ for biometrics for smart cards in provisioning 2nd in use cases Password Synchronizer pattern SASL Secure Pipe pattern sizing Service Locator pattern and Secure Service Facade pattern and Single Sign-on Delegator pattern related Service provider interfaces (SPIs) in Credential Tokenizer patterns in PAMs Service providers for Web services in Liberty specifications 2nd Single Sign-on Delegator pattern 2nd Service provisioning business challenges identity management relationship in Security Services scope security patterns for 2nd user account. [See User account provisioning] Service Provisioning Markup Language (SPML) 2nd 3rd features implementation operations Service registry Service requesters 2nd 3rd Service-level agreements (SLAs) 2nd Service-Oriented Architecture (SOA) 2nd 3rd ServiceConfig class 2nd ServiceConfigContext class ServiceEndpoint class Message Inspector pattern Message Interceptor Gateway pattern Secure Message Router pattern serviceLocator method ServiceLocator service ServiceManager class 2nd ServiceProvider class 2nd Services aggregation of as weakest links continuity and recovery in use cases in Web services strategies directory 2nd in case study catalog order fulfillment order management user login penetration tests Web. [See Web services tier] Servlets Session Authority entity Session Facade pattern and Secure Service Facade pattern and Secure Session Object pattern Session facade strategy Session pattern Sessions MIDlet states Liberty Alliance SSL theft Single Sign-on Delegator pattern Web services timeouts in tracking cookies and URL rewriting in Web tier patterns weak identifiers setActionList method setAssertionType method 2nd setAuthenticationMethod method 2nd setComponentsConfig method setConfigProperties method setConfRef method setData method setLoginContext method setMaxInactiveInterval method setMessageDrivenContext method setProtocolBinding method AssertionContextImpl PasswordSyncRequest SSOContextImpl setRegistryFileName method setSecureTransferObject method setSecurityManager method setServiceName method setSessionInfo method 2nd setSSOTokenMap method setStatus method setTokenType method Setup IDS setupDefaultUserProfile method SGC (Server Gated Cryptography) SHA-1 cryptography for JCA message digests in Cryptographic Service Providers SHA1 encryption SHA256 encryption SHA512 encryption sign method Signature Signer Sign-ons EIS tier multiple 2nd single. [See Single sign-on (SSO) mechanisms] Signature class JCA Secure Logger pattern Signatures Assertion Builder pattern for JAD files in Java System Access Manager JCA verification 2nd Web services patterns WS-Security 2nd XML. [See XML (Extensible Markup Language)] Signed applets Signed MIDlets Signed security tokens Signer class Signing jar files in Web tier patterns jarsigner for Simple Authentication and Security Layer (SASL) clients 2nd installing servers Simple Object Access Protocol. [See SOAP (Simple Object Access Protocol) and SOAP messages] SimpleFormAction class Single Access Point patterns Single Logout Profile Single Loss Expectancy (SLE) Single service secure service proxy strategy Single sign-on (SSO) mechanisms 2nd 3rd Assertion Builder pattern biometrics Credential Tokenizer patterns cross-domain 2nd federated identity management in case study in use cases J2EE authentication JAAS authorization JGSS Liberty Alliance 2nd 3rd 4th Password Synchronizer pattern SAML in through portals user account provisioning 2nd Web services Single Sign-on Delegator pattern 2nd 3rd consequences forces participants and responsibilities problem reality check related patterns Assertion Builder Password Synchronizer sample code security factors and risks solution strategies structure SLAs (service-level agreements) 2nd SLE (Single Loss Expectancy) Smart cards 2nd 3rd architecture and implementation model as Java key stores best practices components for physical access control in Java security in JCE in multi-factor authentication Java Card technology logical architecture operational model snoop method SOA (Service-Oriented Architecture) 2nd 3rd SOAP (Simple Object Access Protocol) and SOAP messages in security patterns 2nd Message Inspector 2nd 3rd Password Synchronizer Secure Message Router Secure Service Proxy SAML SPML WS-Policy WS-Security 2nd Socket factories SocketFactory class Solution in security patterns Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator SOP (Standard Operating Procedure) documents Source code scanners SourceBaseAction class SourceSite class 2nd SOX (Sarbanes-Oxley Act) identity protection in 2nd in security provisioning patterns SPIs (service provider interfaces) in Credential Tokenizer patterns in PAMs SPKI SPML (Service Provisioning Markup Language) 2nd 3rd features implementation operations Spokes in Security Wheel Spoofing and client-side validations in Web services SQL embedded commands injection vulnerability SQLValidator SSL (Secure Socket Layer) accelerators 2nd for RMI socket factories in case study issues J2EE 2nd 3rd JSSE for secure socket connections HTTP over SSL role of vs. TLS Web services 2nd Web-server-based WS-Security XML encryption SSL_NULL_WITH_NULL_NULL SSLEngine class SSLxxx classes SSO. [See Single sign-on (SSO) mechanisms] SSOContext class 2nd SSOContextImpl class SSODelegator class 2nd 3rd SSODelegatorException class SSODelegatorFactory class 2nd 3rd SSOServiceProvider class 2nd Standard Operating Procedure (SOP) documents Standards Authentication Enforcer pattern smart cards Web services 2nd 3rd start method PasswordSyncLedger PasswordSyncRequest State maintenance in Liberty Alliance sessions Stateful firewalls Stateful transactions Stateless transactions Stateless/stateful Policy Delegate Static conformance requirements Static mappings Stolen smart cards Storage, insecure Strategies in security patterns 2nd Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator Stream ciphers Stress testing String encryption Strong cryptography Structural transformations Structure in security patterns Assertion Builder Audit Interceptor Authentication Enforcer Authorization Enforcer Container Managed Security Credential Tokenizer Dynamic Service Management Intercepting Validator Intercepting Web Agent Message Inspector Message Interceptor Gateway Obfuscated Transfer Object Password Synchronizer Policy Delegate Secure Base Action Secure Logger Secure Message Router Secure Pipe Secure Service Facade Secure Service Proxy Secure Session Object Single Sign-on Delegator Subject class Authentication Enforcer pattern Authorization Enforcer pattern JAAS authorization 2nd Subject Descriptor pattern Subjects in JAAS authorization 2nd Login Module strategy Sufficient flag Summaries of security factors SunJCE provider SunJSSE provider SunPKS11 provider Super encryption Support strategy in security provisioning patterns Symmetric ciphers Symmetric keys Obfuscated Transfer Object pattern Secure Logger pattern XML Synchronization identity management passwords Password Synchronizer pattern. [See Password Synchronizer pattern] user account provisioning 2nd System constraints System Entry Point System environment in use cases |