The four areas of security and their definitions that apply to B2B are:
When organizations focus on combining these areas, security policies can be defined to establish a secure baseline so that they can trade with their partners over the Internetwith greater confidence.
To protect B2B applications from unauthorized access, networking and firewall protection must be established. Firewalls work in conjunction with proxy servers, providing the ability to filter protocols, addresses, communication ports, and IP packets.
The security model that can be used is the establishment of a demilitarized zone (DMZ). The DMZ must be configured to restrict only a minimum set of communication ports for it toprocess requests.
The XB60 is a DMZ-deployable appliance and requires a minimum amount of access through the inner firewall. Any sensitive payload data persisted to the Appliance is not accessible by partners and is encrypted on the hard drive.
A common method of transferring information security on the Internet is using the Secure Sockets Layer (SSL).It uses encryption that is based on the public and private key model, using authentication with basic or extended handshakes. SSL works by creating a secure connection between communicating applications over HTTP.
The SSL protocol addresses the following security issues:
After the symmetric key is established in the initial handshake,the messages areencrypted using this key.
Messages contain a message authentication code (MAC) ensuring the messageintegrity.
During the handshake,the client authenticates the server using an asymmetric orpublic key.
SSL works well when securing browser-based applications, such as the administrativeconsole in WebSphere Business Integration Connect, but it can also be useful to augment B2B document transfer.
The disadvantage of using SSL alone is that it only protects the data during the transfer process and does not continue to protect it after it has reached its destination, nor does SSL provide document integrity and nonrepudiation.These items are critical for secure electronic business transactions.
The SSL handshake
An HTTP-based SSL connection is always initiated by the client using a URL starting with https:// instead of with http://. At the beginning of an SSL session, an SSL handshake is performed.This handshake produces the cryptographic parameters of the session.
A simplified overview of how the SSL handshake.
SSL handshake example
The steps are:
Document security is normally accomplished through digital certificates,which provide anonline identification credential for specific document exchanges,for example, AS1, AS2, AS3, RosettaNet, or custom document-level encryption requirements. As part of document exchange, digital signatures can be calculated on the electronic document using public key cryptography.Through this process,the digital signature is tied to the document being signed, as well as to the signer,and cannot be reproduced.With the passage of the federal digital signature bill,digitally signed electronic transactions have the same legal weight as transactions signed in ink.
Document security provides the following features:
A document is encrypted by the recipient’s public key.Only the recipient has theappropriate private key to decrypt the message.
The recipient can authenticate the sender of a document by verifying a digitalsignature.
A digital signature of the document provides document integrity.
Nonrepudiation is provided using digital signatures and encrypting the hash value with the receiver’s private key then sent back to thesender,which provides a digital receipt to the sending party.
In the XB60, business documents are typically signed and encrypted before leaving the security of the sender’s network.Every partner that is set up in the XB60 can,and typically will, have an X.509 certificate used to encrypt documents and validate signatures on documents received from that trading partner.
The XB60 uses a role-based approach for access control. Users log in by providing their partner name, userid, and password.The login determines individual access privileges. The XB60 browser interface, which is used for administering functions, operates over an SSL connection.
IBM Websphere Related Tutorials
|IBM DB2 Tutorial|
IBM Websphere Related Interview Questions
|IBM DB2 Interview Questions||Weblogic Interview Questions|
|IBM WebSphere Datapower SOA Appliances Interview Questions||IBM WAS Administration Interview Questions|
|IBM Websphere Application Server Interview Questions||IBM WebSphere MQ Interview Questions|
|WebLogic Administration Interview Questions||IBM DataPower Interview Questions|
|Ibm Websphere Message Broker Interview Questions||Ibm Websphere Cast Iron Interview Questions|
|Ibm Websphere Process Server Interview Questions|
Ibm Websphere Tutorial
B2b Technologies And Standards
B2b Deployment Methodology
Aspects Of B2b Security
Websphere Datapower B2b Appliance Xb60
Device Setup And Administrative Tasks
B2b Configuration Options
Troubleshooting The Appliance
Xb60 And Wtx Integration For Hipaa
Xb60 With Transformation
Trading Outbound Binary Documents Using The B2b Gateway Service
Trading Binary Documents Using A Multi-protocol Gateway Service
Handling Soap Messages With Attachments In A B2b Environment
All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd
Wisdomjobs.com is one of the best job search sites in India.