The Data Origin Authentication pattern is applied to services throughout a service inventory. As a result, if malicious service intermediaries change data within messages exchanged by these services, such changes will be detected.
Correct : A
Start a Discussions
Which of the following industry standards enable non-repudiation?
Correct : B, C
Start a Discussions
A project team is planning to create a secure service composition that consists of services from two different domain service inventories. The security mechanisms for each service inventory are based on different vendor technologies that adhere to the same industry standards and the same design standards. What is wrong with this service composition architecture?
Correct : D
Start a Discussions
Atypical SAML assertion will contain at least one of the following subject statements:
Correct : A, B, C
Start a Discussions
A typical SAML assertion will contain at least one of the following subject statements:
Correct : A, B, C
Start a Discussions