<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://wiki.hl7.de/index.php?action=history&amp;feed=atom&amp;title=cdaefa%3AEFA_XDS_SecurityConsiderations</id>
	<title>cdaefa:EFA XDS SecurityConsiderations - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.hl7.de/index.php?action=history&amp;feed=atom&amp;title=cdaefa%3AEFA_XDS_SecurityConsiderations"/>
	<link rel="alternate" type="text/html" href="https://wiki.hl7.de/index.php?title=cdaefa:EFA_XDS_SecurityConsiderations&amp;action=history"/>
	<updated>2026-05-04T05:48:01Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in Hl7wiki</subtitle>
	<generator>MediaWiki 1.31.0</generator>
	<entry>
		<id>https://wiki.hl7.de/index.php?title=cdaefa:EFA_XDS_SecurityConsiderations&amp;diff=20401&amp;oldid=prev</id>
		<title>Jcaumanns: Security Considerations für ITI-Bindings auf eigene Wiki-Seite ausgelagert.</title>
		<link rel="alternate" type="text/html" href="https://wiki.hl7.de/index.php?title=cdaefa:EFA_XDS_SecurityConsiderations&amp;diff=20401&amp;oldid=prev"/>
		<updated>2014-09-16T17:59:05Z</updated>

		<summary type="html">&lt;p&gt;Security Considerations für ITI-Bindings auf eigene Wiki-Seite ausgelagert.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{DocumentPart}}&lt;br /&gt;
&lt;br /&gt;
== Security Considerations ==&lt;br /&gt;
&amp;lt;tt&amp;gt;Bitte markieren Sie [[cdaefa:Kommentierung_EFAv2.0|Kommentare]] zu diesem Abschnitt mit dem Code {EDesa.02.05}&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Message Protection ===&lt;br /&gt;
&amp;lt;tt&amp;gt;Bitte markieren Sie [[cdaefa:Kommentierung_EFAv2.0|Kommentare]] zu diesem Abschnitt mit dem Code {EDesa.02.05.01}&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The ECR requester MUST apply means to achieve message authenticity, message integrity and message confidentiality. The EFA Resource Manager MUST approve at least one of the following mechanisms.&lt;br /&gt;
&lt;br /&gt;
==== Transport Layer Security with SAML Issued Endorsing Token ====&lt;br /&gt;
The request message and the response message are sent over an EFA Resource Manager authenticated TLS-channel. In the SOAP Security Header the EFA client provides an EFA Identity Assertion and a wsu:timestamp element. If the SAML subject confirmation method is set to holder-of-key the wsu:timestamp element MUST be signed with the Subject-Confirmation-Key. If the SAML subject confirmation method is set to bearer the TLS-channel MUST be mutually authenticated.&lt;br /&gt;
&lt;br /&gt;
[[Datei:EFA_XDS_RM_SC_TLS.png|250px]]&lt;br /&gt;
&lt;br /&gt;
===== WS-Security-Policy Example =====&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;xml&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;wsp:Policy wsu:Id=&amp;quot;ServicePortBindingPolicy&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;sp:TransportBinding&amp;gt;&lt;br /&gt;
        &amp;lt;wsp:Policy&amp;gt;&lt;br /&gt;
            &amp;lt;sp:TransportToken&amp;gt;&lt;br /&gt;
                &amp;lt;wsp:Policy&amp;gt;&lt;br /&gt;
                    &amp;lt;sp:HttpsToken RequireClientCertificate=&amp;quot;false&amp;quot; /&amp;gt;&lt;br /&gt;
                &amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
            &amp;lt;/sp:TransportToken&amp;gt;&lt;br /&gt;
            &amp;lt;sp:AlgorithmSuite&amp;gt;&lt;br /&gt;
                &amp;lt;wsp:Policy&amp;gt;&lt;br /&gt;
                    &amp;lt;sp:Basic256Sha256 /&amp;gt;&lt;br /&gt;
                &amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
            &amp;lt;/sp:AlgorithmSuite&amp;gt;&lt;br /&gt;
            &amp;lt;sp:IncludeTimestamp /&amp;gt;&lt;br /&gt;
            &amp;lt;sp:Layout&amp;gt;&lt;br /&gt;
                &amp;lt;wsp:Policy&amp;gt;&lt;br /&gt;
                    &amp;lt;sp:Strict /&amp;gt;&lt;br /&gt;
                &amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
            &amp;lt;/sp:Layout&amp;gt;&lt;br /&gt;
        &amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
    &amp;lt;/sp:TransportBinding&amp;gt;&lt;br /&gt;
    &amp;lt;sp:Wss11&amp;gt;&lt;br /&gt;
        &amp;lt;wsp:Policy /&amp;gt;&lt;br /&gt;
    &amp;lt;/sp:Wss11&amp;gt;&lt;br /&gt;
    &amp;lt;wsam:Addressing /&amp;gt;&lt;br /&gt;
&amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
&amp;lt;wsp:Policy wsu:Id=&amp;quot;Input_Policy&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;sp:EndorsingSupportingTokens&amp;gt;&lt;br /&gt;
        &amp;lt;wsp:Policy&amp;gt;&lt;br /&gt;
            &amp;lt;sp:IssuedToken&lt;br /&gt;
                sp:IncludeToken=&amp;quot;http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeTokenAlwaysToRecipient&amp;quot;&amp;gt;&lt;br /&gt;
                &amp;lt;sp:RequestSecurityTokenTemplate&amp;gt;&lt;br /&gt;
                    &amp;lt;wst:TokenType&amp;gt;http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0&amp;lt;/wst:TokenType&amp;gt;&lt;br /&gt;
                    &amp;lt;wst:KeySize&amp;gt;2048&amp;lt;/wst:KeySize&amp;gt;&lt;br /&gt;
                &amp;lt;/sp:RequestSecurityTokenTemplate&amp;gt;&lt;br /&gt;
                &amp;lt;wsp:Policy&amp;gt;&amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
            &amp;lt;/sp:IssuedToken&amp;gt;&lt;br /&gt;
        &amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
    &amp;lt;/sp:EndorsingSupportingTokens&amp;gt;&lt;br /&gt;
&amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Asymmetric Message Protection ====&lt;br /&gt;
The request message and the response message are signed and encrypted. The ECR requester uses the key material corresponding with the Subject-Confirmation-Key provided with the issued EFA Identity Assertion. The EFA Provider uses its service certificate and key. The wsu:timestamp element, all WS-Addressing elements and the SOAP-Body element MUST be signed. The SOAP-Body element MUST be encrypted.&lt;br /&gt;
&lt;br /&gt;
===== WS-Security-Policy Example =====&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;xml&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;wsp:Policy wsu:Id=&amp;quot;ServicePortBindingPolicy&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;sp:AsymmetricBinding&amp;gt;&lt;br /&gt;
        &amp;lt;wsp:Policy&amp;gt;&lt;br /&gt;
            &amp;lt;sp:InitiatorToken&amp;gt;&lt;br /&gt;
                &amp;lt;wsp:Policy&amp;gt;&lt;br /&gt;
                    &amp;lt;sp:IssuedToken sp:IncludeToken=&amp;quot;http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/AlwaysToRecipient&amp;quot;&amp;gt;&lt;br /&gt;
                        &amp;lt;sp:RequestSecurityTokenTemplate&amp;gt;&lt;br /&gt;
                            &amp;lt;wst:TokenType&amp;gt;http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0&amp;lt;/wst:TokenType&amp;gt;&lt;br /&gt;
                            &amp;lt;wst:KeySize&amp;gt;2048&amp;lt;/wst:KeySize&amp;gt;&lt;br /&gt;
                        &amp;lt;/sp:RequestSecurityTokenTemplate&amp;gt;&lt;br /&gt;
                        &amp;lt;wsp:Policy&amp;gt;&amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
                    &amp;lt;/sp:IssuedToken&amp;gt;&lt;br /&gt;
                &amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
            &amp;lt;/sp:InitiatorToken&amp;gt;&lt;br /&gt;
            &amp;lt;sp:RecipientToken&amp;gt;&lt;br /&gt;
                &amp;lt;wsp:Policy&amp;gt;&lt;br /&gt;
                    &amp;lt;sp:X509Token sp:IncludeToken=&amp;quot;http://schemas.xmlsoap.org/ws/2005/07/securitypolicy/IncludeToken/AlwaysToInitiator&amp;quot;&amp;gt;&lt;br /&gt;
                        &amp;lt;wsp:Policy&amp;gt;&amp;lt;sp:WssX509V3Token10 /&amp;gt;&amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
                    &amp;lt;/sp:X509Token&amp;gt;&lt;br /&gt;
                &amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
            &amp;lt;/sp:RecipientToken&amp;gt;&lt;br /&gt;
            &amp;lt;sp:AlgorithmSuite&amp;gt;&amp;lt;wsp:Policy&amp;gt;&amp;lt;sp:Basic256 /&amp;gt;&amp;lt;/wsp:Policy&amp;gt;&amp;lt;/sp:AlgorithmSuite&amp;gt;&lt;br /&gt;
            &amp;lt;sp:Layout&amp;gt;&amp;lt;wsp:Policy&amp;gt;&amp;lt;sp:Strict /&amp;gt;&amp;lt;/wsp:Policy&amp;gt;&amp;lt;/sp:Layout&amp;gt;&lt;br /&gt;
            &amp;lt;sp:IncludeTimestamp /&amp;gt;&lt;br /&gt;
            &amp;lt;sp:OnlySignEntireHeadersAndBody /&amp;gt;&lt;br /&gt;
        &amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
    &amp;lt;/sp:AsymmetricBinding&amp;gt;&lt;br /&gt;
    &amp;lt;sp:Wss11&amp;gt;&amp;lt;wsp:Policy&amp;gt;&amp;lt;/wsp:Policy&amp;gt;&amp;lt;/sp:Wss11&amp;gt;&lt;br /&gt;
    &amp;lt;sp:Trust10&amp;gt;&lt;br /&gt;
        &amp;lt;wsp:Policy&amp;gt;&amp;lt;sp:MustSupportIssuedTokens /&amp;gt;&amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
    &amp;lt;/sp:Trust10&amp;gt;&lt;br /&gt;
    &amp;lt;wsap10:UsingAddressing /&amp;gt;&lt;br /&gt;
&amp;lt;/wsp:Policy&amp;gt;&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== WS-SecureConversation bootstrapped with SAML Issued Token ====&lt;br /&gt;
The request message and the response message are signed and encrypted. Both the ECR requester and the EFA Provider use a symmetric Secure-Conversation-Token key. The Secure-Conversation-Token MUST reference the issued EFA Identity Assertion. The wsu:timestamp element, all WS-Addressing elements and the SOAP-Body element MUST be signed. The SOAP-Body element MUST be encrypted.&lt;br /&gt;
&lt;br /&gt;
=== Audit Trail ===&lt;br /&gt;
&amp;lt;tt&amp;gt;Bitte markieren Sie [[cdaefa:Kommentierung_EFAv2.0|Kommentare]] zu diesem Abschnitt mit dem Code {EDesa.02.05.02}&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Service consumer and service provider actors SHALL write an audit trail according to the [[cdaefa:EFA_Audit_Trail_Binding|EFAv2 Audit Trail Binding]].&lt;/div&gt;</summary>
		<author><name>Jcaumanns</name></author>
		
	</entry>
</feed>