Learn More about Secure JAX-RS
Originally published on 09 Oct 2018
Last updated on 20 Nov 2019
Introduction
With the rise of the micro-service architecture, we have seen also a shift from SOAP to REST as the means of exchanging data between parties. REST and JAX-RS are gaining a lot of popularity outside the micro-service world, also.
And if you compare the effort to use them, it is no surprise to see such a shift.
At EclipseCon in the Cloud-Native Java track, to I showed you how to use JWT tokens and HTTPS Signatures to securely replace your SOAP usage by JAX-RS. You can find the video at the bottom of this post.
Security
We can’t just replace all our SOAP endpoint with JAX-RS endpoints. From a technical point of view, there are some differences between the technologies (which are most of the time quite manageable) but there is one aspect which is missing in JAX-RS - and that is security.
Within the SOAP framework, we have a variety of tools for security, including the WS-Security extension. It gives you encryption, process to process integrity, certificates, etc - but JAX-RS only offers the capabilities of the underlying protocol.
Secure JAX-RS
We can use the default SSL functionality to add security within JAX-RS, and although SSL provides some very good functionality, there are a few attention points and limitations.
How do you track your ‘sender’ and what is the impact of SSL interruption on the integrity guarantee that you should provide?
For identifying the other endpoint of your JAX-RS connection, Client Certificates can only be used when the number of clients is stable and doesn’t change much.
And to overcome SSL interruption, we need something on the process level to guarantee integrity and prevent the server from handling this.
Secure JAX-RS Presentation at EclipseCon
The ‘Secure JAX-RS’ presentation goes deeper into these topics and shows how you can use JWT tokens and HTTPS Signatures to securely replace your SOAP usage by JAX-RS.
Related Posts
Celebrating 25 Years of the CVE Program
Published on 22 Oct 2024
by Chiara Civardi
0 Comments
The Common Vulnerabilities and Exposures (CVE®) Program is celebrating its 25th anniversary today! This marks a major milestone in global cybersecurity. Since 1999, the CVE Program has been critical in helping organizations identify, manage and ...
Eclipse Foundation’s New Open Regulatory Compliance Working Group Launch
Published on 01 Oct 2024
by Dawn Baird
0 Comments