Questions tagged [wcf-security]

Questions related to the authentication and authorization services for Windows Communication Foundation (WCF) applications

Windows Communication Foundation is Microsoft's implementation of the WS-* web service specifications. Its security functionality mainly deals with authentication, authorization and secure over-the-wire transmission of user credentials.

When setting up WCF Security for an application, the following parameters need to be configured:

  • The type of credential required, e.g. NTLM, plaintext, or certificate authentication
  • The security mode: transport mode (e.g. SSL), message mode (SOAP message security), or a combination of both
  • Which endpoint(s) are protected

Once a client successfully connects to an endpoint protected with WCF Security, the server application can examine the security context to determine the identity of the client and to determine its authorizations (which need to be configured separately).

1285 questions
0
votes
1 answer

how to get current windows user in wcf

I already tried link from stackoverflow I have a silverlight client and wcf service. The application has 3 authentication modes Active Directory Windows Pass Through Proprietary - I don't have a problem with this one obviously. (I really don't know…
coder
  • 4,121
  • 14
  • 53
  • 88
0
votes
1 answer

WCF: Cache SSL data

I want to create WCF service and client. I want to add 2 way SSL between these 2 services. I was wondering, if there is a way that these services will cache the negotiation data of the first connection, and use it in the following connections in…
Matan
  • 680
  • 2
  • 14
  • 24
0
votes
2 answers

Use SSL for authentication only

I want to create new WCF service and client. The 2 parties will communicate using 2-way SSL. I want to use the SSL only for the authentication phase. After this authentication, the encryption is not necessary. Can I configure my service (and client)…
Matan
  • 680
  • 2
  • 14
  • 24
0
votes
0 answers

Unable to get HTTPS MEX endpoint to work

I have been trying to configure WCF to work with Azure ACS. This WCF configuration has 2 bugs: It does not publish MEX end point. It does not invoke custom behaviour extension. (It just stopped doing that after I made some changes which I can't…
Rahul
  • 400
  • 1
  • 3
  • 15
0
votes
1 answer

WCF Service secured by STS IssuedToken - configuration issue

I am attempting to create a WCF dotnet service secured using a STS IssuedToken. STS is secured by X509. Following is the configuration of relying party and I am using custom binding. Do I need to add identity within the issuer in custombinding? Is…
Joseph
  • 877
  • 8
  • 20
0
votes
1 answer

How to consume or use the HTTPS contained URL of a webservices from different server location to aspx page ??

I had created a web service with https secured . Buts i cant consume the service inside my aspx page. If i use http is is responding and working normally . When i use https secure web service it throws exception like this , mentioned below "The HTTP…
Muru Sk
  • 1
  • 1
0
votes
0 answers

Wcf security token (TimeBoundedCache+ExpirableItem)

I face a problem on my wcf service running under IIS with object called TimeBoundedCache+ExpirableItem under System.ServiceModel.Security. I investigate these object and see its they exsists on the Gen2 for long time and my wcf memory is growing up…
Wasim
  • 1,915
  • 5
  • 24
  • 39
0
votes
1 answer

How to make my HttpModule invoked only for Rest Service calls

I have a WCF Service application, in which I have some Rest Services and some conventional WCF services. I have added a HttpModule to intercept the service calls to the Rest service and verify the token in the request header and allow access to the…
KhanS
  • 1,167
  • 2
  • 12
  • 27
0
votes
1 answer

What is message wrapping in WCF

In WCF Messsage contract we have IsWrapped atribute and wrappername, wrappernamespace attribute Question? What is Message wrapping What are the advantages of wrapping messages Is it secure to wrap the messages.
web dunia
  • 9,381
  • 18
  • 52
  • 64
0
votes
1 answer

Checking clients and the methods they are allowed to access outside of the method?

Here's a link to my previous related question. -------------- | ServiceA.svc | ------------> Test Client 1 | -GetData() | ------------> Test Client 2 | -SaveData() | -------------- So far, so good. By checking…
kei
  • 20,157
  • 2
  • 35
  • 62
0
votes
2 answers

WCF custom authentication - Token

I'm trying to find a standard solution in WCF for the following scenario: I have 2 services. Service1 wants to send a request to service2. I want that service1 will send credentials in order to authenticate before service2 response to his request. I…
fransua
  • 1
  • 1
  • 1
0
votes
0 answers

intermediate service implementation with security

I have a simple WCF Client -> Server structure, where the client references the server's WCF service. Authentication is done using X509 certificates. I want to add a simple form of redundancy to my service. Meaning- to have several servers running,…
J. Ed
  • 6,692
  • 4
  • 39
  • 55
0
votes
1 answer

WCF Service in multiple applications with customization

I have created a WCF Service for my web application. I am able to access all the functions & methods declared inside the interface. Now, I want to create a new web application with the same WCF Service but i dont want this web app should access all…
Ulhas Tuscano
  • 5,502
  • 14
  • 58
  • 89
0
votes
2 answers

SOAP message encryption in silverlight

how to encrypt soap message in silverlight.. i am currently looking for ideas... as silverlight doesn't support WCF Message Security.. i have gone through a post by Peter Bromberg but it is also not discussing the idea about when how to exchange…
Usman Masood
  • 1,937
  • 2
  • 17
  • 33
-1
votes
1 answer

Microsoft Threat modeling tool element properties document or resource

I started using the Microsoft Threat Modeling tool. Is there a document or resource that explains in detail what each element and element properties mean and purpose?
Vaish
  • 1
1 2 3
85
86