• DE
  • Main Menue

Security for Service-Orientated Architectures (SOAs)

SOA and JAVA have become key technologies for cross-platform support of company infrastructures and business processes by means of information technology. The characteristic features of SOA technology, e.g. the systematic search for services and the standardised service interfaces, make it easier to integrate new functionalities and enable high levels of automation and openness. This allows developers to make use of existing services and integrate these into their systems.

The use of open and known standards is a prerequisite for trouble-free SOA operation. As a result of this openness, a SOA and the systems involved are susceptible to unauthorised access. Therefore, it is necessary to take an in-depth look at the issues of confidentiality, integrity, authenticity, traceability, non-contestability and IT security and define these in security policies. These are to be compared against current requirements and adapted as needed at regular intervals.

The enforcement of security policies can occur as part of the infrastructure (Security as an Infrastructure), or by means of a security service which is used by the individual services (Security as a Service). Combinations are also possible.

SOA for secure web applications

secunet developed SOA- and JAVA-based modules which make web applications immune to dangerous phishing attacks with the help of certificate-based authentication. In addition, they enable binding electronic signatures of documents.

At the user end, the modules work with all standard browsers and operating systems. A large number of users can access the web services quickly and reliably via automated registration processes. Our modules support a wide range of tokens for various application scenarios with different security requirements without needing adaptation:

  • Software-based tokens
  • Cryptographic USB flash drives
  • Cards and chip cards for advanced electronic signatures of all renowned German trust centres in compliance with the German Signature Act (SigG)

The central security modules in the backend are accessed via SOA and, working with the corresponding systems at the client’s end, implement the cryptographic functions and the administration of identities as well as their certificates and profile data. On the basis of information registered in advance (e.g. tax number, insurance number), it is possible to completely automatically register new users and issue user-specific certificates.

Contact

Get directly into contact with our specialist division.

Contact form