Wiki source code of Securing your SOAP Webservice

Last modified by Eva Torken on 2023/06/27 10:43

Show last authors
1 {{container}}{{container layoutStyle="columns"}}(((
2 When setting up a point at which your customers can talk to you eMagiz offers various methods of creating such a point. One of those options is by hosting a SOAP Webservice in eMagiz that handles XML messages asynchronously or synchronously. In this microlearning, we will zoom in on the part that security plays on a client level when hosting a SOAP web service.
3
4 Should you have any questions, please contact academy@emagiz.com.
5
6 == 1. Prerequisites ==
7 * Basic knowledge of the eMagiz platform
8
9 == 2. Key concepts ==
10 This microlearning centers around configuring your SOAP web service.
11
12 By configuring, we mean: Designing and determining the characteristics of the SOAP web service
13
14 Crucial parts in the configuration are:
15 * Operation Name
16 * SOAP Webservice Namespace
17 * Validation
18 * Authentication
19
20 Of these four points, we will zoom in on the authentication part of our SOAP Webservice in this microlearning.
21
22 == 3. Securing your SOAP Webservice ==
23
24 When setting up a point at which your customers can talk to you eMagiz offers various methods of creating such a point. One of those options is by hosting a SOAP Webservice in eMagiz that handles XML messages asynchronously or synchronously. In this microlearning, we will zoom in on the part that security plays on a client level when hosting a SOAP web service.
25
26 Crucial parts in the configuration are:
27 * Operation Name
28 * SOAP Webservice Namespace
29 * Validation
30 * Authentication
31
32 Of these four points, we will zoom in on the authentication part of our SOAP Webservice in this microlearning. When hosting your SOAP web service in the eMagiz Cloud the endpoint will be HTTPS secured on default. If you want to mimic the same result for an on-premise environment you should define the valid SSL settings, as explained in this [[Q&A>>https://my.emagiz.com/p/question/172825635700357186||target="blank"]].
33
34 Apart from that aspect of security, we should also consider how clients that call the SOAP Web service will authenticate themselves upon entry. Within eMagiz, we advise a two-step approach. Each client that wants to call your SOAP Webservice should:
35
36 * Send along a client certificate
37 * Send along an API key in a SOAP Header that references to the word apiKey (i.e. apiKey)
38
39 To verify both parts some configuration is needed. The first aspect, checking for a valid client certificate is done on cloud level. For more information on how to exactly configure this please take a look at the microlearning [Securing a hosted web service with certificates in the eMagiz Cloud](intermediate-securing-your-data-traffic-securing-a-hosted-webservice-with-certificates-in-the-emagiz-cloud.md).
40
41 In this microlearning, we will focus on the second part of the configuration.
42
43 === 3.1 API Key verification ===
44
45 To verify whether the client has sent a valid API Key we need to change the configuration within the entry flow in the Create phase of eMagiz. The configuration consists of three steps:
46
47 * Get value from SOAP Header
48 * Check value against a list
49 * Respond based on results
50
51 ==== 3.1.1 Get value from SOAP Header ====
52
53 Let us move to the entry flow by going to the Create phase of eMagiz, opening the correct flow, and entering "Start Editing" mode. After you have done so we need to add a support object to the flow. The support we need is called 'Complex SOAP header mapper'. In this component, we need the bottom section.
54
55 [[image:Main.Images.Microlearning.WebHome@novice-soap-webservice-connectivity-securing-your-soap-webservice--complex-soap-header-mapper.png]]
56
57 Here we define a new header by entering a name and a valid XPath expression.
58
59 [[image:Main.Images.Microlearning.WebHome@novice-soap-webservice-connectivity-securing-your-soap-webservice--complex-soap-header-mapper-config.png]]
60
61 When you are satisfied you can press Save twice to store the support object. After we have configured the support object we need to link it to our web service inbound gateway. To do so open the component, navigate to the advanced tab and select the Header mapper you have just created.
62
63 [[image:Main.Images.Microlearning.WebHome@novice-soap-webservice-connectivity-securing-your-soap-webservice--link-complex-soap-header-mapper.png]]
64
65 ==== 3.1.2 Check value against list ====
66
67 Now that we placed the value the client has entered in the apiKey SOAP header on our message we can check whether the value exists in a list of predefined valid values. To do add two headers to the standard header enricher component in your flow. The first one ensures that the apiKey is removed from the header (to prevent the API key from being publicly seen by others). The second one searches for the client name that corresponds with the apiKey and returns the name of the client in the header. This search action is done with the help of a SpEL expression, more on that later on. In this case the SpEL expression we use is set up as follows:
68
69 {{code}}headers['spwbsrv_apiKey'] != null and {${authentication.api-keys}}.contains(headers.spwbsrv_apiKey) ? {${authentication.tenant-ids}}[{${authentication.api-keys}}.indexOf(headers.spwbsrv_apiKey)] : null{{/code}}
70
71 With this SpEL expression, we check whether there is an API key and whether that apiKey can be found in a predefined list. If so we search for the corresponding name based on the index of where a certain apiKey is within the list. If not the header is not created. Combining this logic in one component should look similar to the following.
72
73 [[image:Main.Images.Microlearning.WebHome@novice-soap-webservice-connectivity-securing-your-soap-webservice--check-headers.png]]
74
75 ==== 3.1.3 Respond based on results ====
76
77 After we have searched for the API key in the list and we have defined the client that is sending the information (or not) we can respond to the client whether or not the client is authorized to call our SOAP web service. To execute this check we first need a standard filter component. In this component, we will check whether the spwbsrv_client header we have just created is not null.
78
79 [[image:Main.Images.Microlearning.WebHome@novice-soap-webservice-connectivity-securing-your-soap-webservice--standard-filter.png]]
80
81 If it is indeed not null we can pass the empty message back to the client telling the client that the message was delivered successfully. If the header is null we need to tell the client that he/she is unauthorized to call the operation. To do so we need to add a component called 'custom error message activator'. In this component, we define the message we want to give back to the client in case of an error. In this case, we simply give back 'Unauthorized'.
82
83 [[image:Main.Images.Microlearning.WebHome@novice-soap-webservice-connectivity-securing-your-soap-webservice--custom-error-message.png]]
84
85 With all this done we have successfully secured our SOAP web service according to the best practices.
86
87 == 4. Key takeaways ==
88
89 * Crucial parts in the configuration are:
90 ** Operation Name
91 ** SOAP Webservice Namespace
92 ** Validation
93 ** Authentication
94 * Hosting your SOAP web service in the eMagiz cloud results in standard HTTPS
95 * Use a combination of client certificate + API key for authentication
96
97 == 5. Suggested Additional Readings ==
98
99 If you are interested in this topic and want more information on it please read the help text provided by eMagiz.
100
101 )))((({{toc/}}))){{/container}}{{/container}}