Features
..........................................................................................................................................................................


Composed security policies


Different security policies for each user on the same service.

ITAC WS-Guardian® provides the possibility of applying composed security policies for each one of the services, thus ensuring a granular security that helps to increase the security level according to each service's protection needs; the following are different examples of the composed policies provided by ITAC WS-Guardian®

Security policy with simple policies application on each service according to the security needs for each one of the services:
 



 


Scenario 1

 


Service 1 for User 1:

• IP address security policy


Service 1 for User 2:

• XML signature security policy


Service 2 for User 3:

• Weekdays security policy

 

 


As shown by the picture, the service 1 has different security policies depending on the user. For User 1 it has an IP address security policy, while for the User 2 it has a XML signature security policy. Similarly, the service 2 has a Weekdays security policies for User 3.

..........................................................................................................................................................................



 


Scenario 2

 
Security policy with fine-grained or conditional and composed configurations, for the access to a singular service by two different users:
 


Service 1 for User 1:

• IP address security policy


Service 1 for User 2:

• XML signature security policy


Service 2 for User 3:

• Weekdays security policy

 

 

..........................................................................................................................................................................
 



 


Scenario 3

 
Security policy with composed fine-grained security configurations application to a singular service, for two different users. As shown in the picture, the service 1 has different composed security policies.
 


User 1:

Has XML signature according to IP address security policy.


User 2:

Has content-based according to the IP address security policy
 

 

 

 


Since User 2 does not comply with the first condition, it can not pass to the second policy for using this service.

..........................................................................................................................................................................

 

 

 

 

 

 

© Copyright 2018. ITAC. / Diseño y Producción Sitio Web : ITAC : www.itac.co / Todos los derechos reservados. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.