Securing your SOAP Webservice

Last modified by Eva Torken on 2023/06/27 10:43

When setting up a point at which your customers can talk to you eMagiz offers various methods of creating such a point. One of those options is by hosting a SOAP Webservice in eMagiz that handles XML messages asynchronously or synchronously. In this microlearning, we will zoom in on the part that security plays on a client level when hosting a SOAP web service.

Should you have any questions, please contact academy@emagiz.com.

1. Prerequisites

  • Basic knowledge of the eMagiz platform

2. Key concepts

This microlearning centers around configuring your SOAP web service.

By configuring, we mean: Designing and determining the characteristics of the SOAP web service

Crucial parts in the configuration are:

  • Operation Name
  • SOAP Webservice Namespace
  • Validation
  • Authentication

Of these four points, we will zoom in on the authentication part of our SOAP Webservice in this microlearning.

3. Securing your SOAP Webservice

When setting up a point at which your customers can talk to you eMagiz offers various methods of creating such a point. One of those options is by hosting a SOAP Webservice in eMagiz that handles XML messages asynchronously or synchronously. In this microlearning, we will zoom in on the part that security plays on a client level when hosting a SOAP web service.

Crucial parts in the configuration are:

  • Operation Name
  • SOAP Webservice Namespace
  • Validation
  • Authentication

Of these four points, we will zoom in on the authentication part of our SOAP Webservice in this microlearning. When hosting your SOAP web service in the eMagiz Cloud the endpoint will be HTTPS secured on default. If you want to mimic the same result for an on-premise environment you should define the valid SSL settings, as explained in this Q&A.

Apart from that aspect of security, we should also consider how clients that call the SOAP Web service will authenticate themselves upon entry. Within eMagiz, we advise a two-step approach. Each client that wants to call your SOAP Webservice should:

  • Send along a client certificate
  • Send along an API key in a SOAP Header that references to the word apiKey (i.e. apiKey)

To verify both parts some configuration is needed. The first aspect, checking for a valid client certificate is done on cloud level. For more information on how to exactly configure this please take a look at the microlearning [Securing a hosted web service with certificates in the eMagiz Cloud](intermediate-securing-your-data-traffic-securing-a-hosted-webservice-with-certificates-in-the-emagiz-cloud.md).

In this microlearning, we will focus on the second part of the configuration.

3.1 API Key verification

To verify whether the client has sent a valid API Key we need to change the configuration within the entry flow in the Create phase of eMagiz. The configuration consists of three steps:

  • Get value from SOAP Header
  • Check value against a list
  • Respond based on results

3.1.1 Get value from SOAP Header

Let us move to the entry flow by going to the Create phase of eMagiz, opening the correct flow, and entering "Start Editing" mode. After you have done so we need to add a support object to the flow. The support we need is called 'Complex SOAP header mapper'. In this component, we need the bottom section.

novice-soap-webservice-connectivity-securing-your-soap-webservice--complex-soap-header-mapper.png

Here we define a new header by entering a name and a valid XPath expression.

novice-soap-webservice-connectivity-securing-your-soap-webservice--complex-soap-header-mapper-config.png

When you are satisfied you can press Save twice to store the support object. After we have configured the support object we need to link it to our web service inbound gateway. To do so open the component, navigate to the advanced tab and select the Header mapper you have just created.

novice-soap-webservice-connectivity-securing-your-soap-webservice--link-complex-soap-header-mapper.png

3.1.2 Check value against list

Now that we placed the value the client has entered in the apiKey SOAP header on our message we can check whether the value exists in a list of predefined valid values. To do add two headers to the standard header enricher component in your flow. The first one ensures that the apiKey is removed from the header (to prevent the API key from being publicly seen by others). The second one searches for the client name that corresponds with the apiKey and returns the name of the client in the header. This search action is done with the help of a SpEL expression, more on that later on. In this case the SpEL expression we use is set up as follows: 

headers['spwbsrv_apiKey'] != null and {${authentication.api-keys}}.contains(headers.spwbsrv_apiKey) ? {${authentication.tenant-ids}}[{${authentication.api-keys}}.indexOf(headers.spwbsrv_apiKey)] : null

With this SpEL expression, we check whether there is an API key and whether that apiKey can be found in a predefined list. If so we search for the corresponding name based on the index of where a certain apiKey is within the list. If not the header is not created. Combining this logic in one component should look similar to the following.

novice-soap-webservice-connectivity-securing-your-soap-webservice--check-headers.png

3.1.3 Respond based on results

After we have searched for the API key in the list and we have defined the client that is sending the information (or not) we can respond to the client whether or not the client is authorized to call our SOAP web service. To execute this check we first need a standard filter component. In this component, we will check whether the spwbsrv_client header we have just created is not null. 

novice-soap-webservice-connectivity-securing-your-soap-webservice--standard-filter.png

If it is indeed not null we can pass the empty message back to the client telling the client that the message was delivered successfully. If the header is null we need to tell the client that he/she is unauthorized to call the operation. To do so we need to add a component called 'custom error message activator'. In this component, we define the message we want to give back to the client in case of an error. In this case, we simply give back 'Unauthorized'.

novice-soap-webservice-connectivity-securing-your-soap-webservice--custom-error-message.png

With all this done we have successfully secured our SOAP web service according to the best practices.

4. Key takeaways

  • Crucial parts in the configuration are:
    • Operation Name
    • SOAP Webservice Namespace
    • Validation
    • Authentication
  • Hosting your SOAP web service in the eMagiz cloud results in standard HTTPS
  • Use a combination of client certificate + API key for authentication

5. Suggested Additional Readings

If you are interested in this topic and want more information on it please read the help text provided by eMagiz.