The presentation of this document has been augmented to identify changes from a previous version. Three kinds of changes are highlighted: new, added text, changed text, and deleted text.
Copyright © @@@@ W3C® (MIT, ERCIM, Keio), All Rights Reserved. W3C liability, trademark and document use rules apply.
The Web Services Policy 1.5 - Framework provides a general purpose model and corresponding syntax to describe the policies of entities in a Web services-based system.
Web Services Policy Framework defines a base set of constructs that can be used and extended by other Web services specifications to describe a broad range of service requirements and capabilities.
This document is an editors' copy that has no official standing.
1. Introduction
1.1 Example
2. Notations and Terminology
2.1 Notational Conventions
2.2 Extensibility
2.3 XML Namespaces
2.4 Terminology
3. Policy Model
3.1 Policy Assertion
3.2 Policy Alternative
3.3 Policy
3.4 Policies of Entities in a Web Services Based Systemservices
4. Policy Expression
4.1 Normal Form Policy Expression
4.2 Policy Identification
4.3 Compact Policy Expression
4.3.1 Optional Policy Assertions
4.3.2 Policy Assertion Nesting
4.3.3 Policy Operators
4.3.4 Policy References
4.3.5 Policy Inclusion
4.4 Policy Intersection
5. Security Considerations
5.1 Information Disclosure Threats
5.2 Spoofing and Tampering Threats
5.3 Downgrade Threats
5.4 Repudiation Threats
5.5 Denial of Service Threats
5.6 General XML Considerations
6. Conformance
A. References
A.1 Normative References
A.2 Other References
B. Acknowledgements (Non-Normative)
C. Changes in this Version of the Document (Non-Normative)
D. Web Services Policy 1.5 - Framework Change Log (Non-Normative)
Web Services Policy 1.5 - Framework defines a framework and a model for expressing policies that refer to domain-specific capabilities, requirements, and general characteristics of entities in a Web services-based system.
A policy is a collection of policy policyalternatives, alternatives, where a policy alternative is a collection of policy assertions.assertions. A policy assertion represents an individual requirement, capability, or other property of a behavior. A policy expression is an XML Infoset representation of a policy,policy, either in a normal form or in an equivalent compact form. Some policy assertions specify traditional requirements and capabilities that will ultimately manifest on the wire (e.g., authentication scheme, transport protocol selection). Other policy assertions have no wire manifestation yet are critical to proper service selection and usage (e.g., privacy policy, QoS characteristics). Web Services Policy 1.5 - Framework provides a single policy language to allow both kinds of assertions to be expressed and evaluated in a consistent manner.
Web Services Policy 1.5 - Framework does not specify policy discovery or policy attachments. attachment. A policy attachment is a mechanism for associating policy with one or more policy scopes,scopes. A where a policy scope is a collection of policy subjects to which a policy may apply. A policy subject is an entity (e.g., an endpoint, message, resource, interaction) with which a policy can be associated. Other specifications are free to define technology-specific mechanisms for associating policy with various entities and resources. Web Services Policy 1.5 - Attachment [[Web Services Policy Attachment]] defines such mechanisms, especially for associating policy with arbitrary XML elements [[XML 1.0]], WSDL artifacts [[WSDL 1.1], [WSDL 2.0 Core Language]], and UDDI elements [[UDDI API 2.0], [UDDI Data Structure 2.0], [UDDI 3.0]].
Example 1-1The following example illustrates a security policy expression using assertions defined in WS-SecurityPolicy [[WS-SecurityPolicy]]:
Example 1-1. Use of Web Services Policy with security policy assertions.
(01) <wsp:Policy xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy" xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" > (02) <wsp:ExactlyOne> (03) <sp:wsp:All> (04) <sp:SignedParts/> (05) <sp:Body/> (06) </sp:SignedParts/> (07) </wsp:All> (08) <sp:wsp:All> (09) <sp:EncryptedParts/> (10) <sp:Body/> (11) </sp:EncryptedParts/> (12) </wsp:All> (13) </wsp:ExactlyOne> (14) </wsp:Policy>
Lines (03-06) represent one policy alternative for signing a message body.
Linesrequired (08-11) representsperforming cryptographic a second policy alternative forasymmetric key-based encrypting a message body. tokens.
Lines (02-13) illustrates the ExactlyOne
policy
operator. Policy operators group policy assertions into
policy alternatives. A valid interpretation of the policy
above would be that an invocation of a Web service willuses
one either sign or encrypt the message body.03-04)
specified.
This section specifies the notations, namespaces, and terminology used in this specification.
This specification uses the following syntax within normative outlines:
The syntax appears as an XML instance, but values in italics indicate data types instead of literal values.
Characters are appended to elements and attributes to indicate cardinality:
"?" (0 or 1)
"*" (0 or more)
"+" (1 or more)
The character "|" is used to indicate a choice between alternatives.
The characters "(" and ")" are used to indicate that contained items are to be treated as a group with respect to cardinality or choice.
This document relies on the XML Information Set [[XML Information Set]]. Information items properties are indicated by the style infoset property.
XML namespace prefixes (see Table 2-1) are used to indicate the namespace of the element or attribute being defined.
The ellipses characters "…" are used to indicate a point of extensibility that allows other Element or Attribute Information Items.
Elements and Attributes defined by this specification are referred to in the text of this document using XPath 1.0 [XPATH 1.0] expressions. Extensibility points are referred to using an extended version of this syntax:
An element extensibility point is referred to using {any} in place of the element name. This indicates that any element name can be used, from any namespace other than the http://www.w3.org/2006/07/ws-policy namespace.
An attribute extensibility point is referred to using @{any} in place of the attribute name. This indicates that any attribute name can be used, from any namespace.
Normative text within this specification takes precedence over normative outlines, which in turn take precedence over the XML Schema [[XML Schema Structures]] descriptions.
Within normative outlines, ellipses (i.e., "…") indicate a point of extensibility that allows other Element or Attribute Information Items. Information Items MAY be added at the indicated extension points but MUST NOT contradict the semantics of the element information item indicated by the parent or owner property of the extension. If an Attribute Information Item is not recognized, it SHOULD be ignored; if an Element Information Item is not recognized, it MUST be treated as an assertion.
This specification uses a number of namespace prefixes throughout; they are listed in Table 2-1. Note that the choice of any namespace prefix is arbitrary and not semantically significant (see [[XML Namespaces]]).
Prefix | Namespace | Specification |
---|---|---|
sp |
http://schemas.xmlsoap.org/ws/2005/07/securitypolicy |
[[WS-SecurityPolicy]] |
wsp |
http://www.w3.org/@@@@/@@/ws-policy |
This specification |
wsu |
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd |
[[WS-Security 2004]] |
xs |
http://www.w3.org/2001/XMLSchema |
[[XML Schema Structures]] |
All information items defined by this specification
are identified by the XML namespace URI [[XML Namespaces]] http://www.w3.org/@@@@/@@/ws-policy
. A normative XML Schema [[XML Schema Structures], [XML Schema Datatypes]] document can be obtained by
dereferencing the XML namespace URI.
It is the intent of the W3C Web Services Policy Working Group that the Web Services Policy 1.5 - Framework and Web Services Policy 1.5 - Attachment XML namespace URI will not change arbitrarily with each subsequent revision of the corresponding XML Schema documents but rather change only when a subsequent revision, published as a WD, CR or PR draft results in non-backwardly compatible changes from a previously published WD, CR or PR draft of the specification.
Under this policy, the following are examples of backwards compatible changes that would not result in assignment of a new XML namespace URI:
Addition of new global element, attribute, complexType and simpleType definitions.
Addition of new elements or attributes in locations covered by a previously specified wildcard.
Modifications to the pattern facet of a type definition for which the value-space of the previous definition remains valid or for which the value-space of the vast majority of instances would remain valid.
Modifications to the cardinality of elements (i.e. modifications to minOccurs or maxOccurs attribute value of an element declaration) for which the value-space of possible instance documents conformant to the previous revision of the schema would still be valid with regards to the revised cardinality rule.
The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [[IETF RFC 2119]].
We introduce the following terms that are used throughout this document:
A nested policy expression is a policy expression that is an Element Information Item in the children property of a policy assertion.
A policy is a collection of policy alternatives,
a policy alternative is a collection of policy assertions.
A policy assertion represents an individual requirement, capability, or other property of a behavior.
A policy assertion parameter qualifies the behavior indicated by a policy assertion.
A policy assertion type represents a class of policy assertions and implies a schema for the assertion and assertion-specific semantics.
A policy attachment is a mechanism for associating policy with one or more policy scopes.
A policy expression is an XML Infoset representation of a policy, either in a normal form or in an equivalent compact form.
A policy scope is a collection of policy subjects to which a policy may apply.
A policy subject is an entity (e.g., an endpoint, message, resource, interaction) with which a policy can be associated.
A policy vocabulary is the set of all policy assertion types used in a policy.
This section defines an abstract model for policies and for operations upon policies.
The descriptions below use XML Infoset terminology for convenience of description. However, this abstract model itself is independent of how it is represented as an XML Infoset.
[Definition: A policy assertion represents an individual requirement, capability, or other property of a behavior.] A policy assertion identifies a behavior that is a requirement or capability of a policy subject. Assertions indicate domain-specific (e.g., security, transactions) semantics and are expected to be defined in separate, domain-specific specifications.
Assertions are strongly typed by the domain authors that define them. [Definition: A policy assertion type represents a class of policy assertions and implies a schema for the assertion and assertion-specific semantics.] The policy assertion type is identified only by the XML Infoset namespace name and local name properties (that is, the qualified name or QName) of the root Element Information Item representing the assertion. A policy assertion type represents a class of policy assertions and implies a schema for the assertion and assertion-specific semantics. Assertions of a given type MUST be consistently interpreted independent of their policy subjects.
AuthorsDomain authors MAY define that an assertion contains a policy expression (as defined in 4. Policy Expression) as one of its children. Nested policyPolicy expression expression(s)nesting are used by domain authors to further qualify one or more specific aspects of the original assertion. For example, security policy domain authors may define an assertion describing a set of security algorithms to qualify the specific behavior of a security binding assertion.
The XML Infoset of a policy assertion MAY contain a non-empty attributes property and/or a non-empty children property. Such properties are policy assertion parameters andcontent MAY be used to parameterize the behavior indicated by the assertion. [Definition: A policy assertion parameter qualifies the behavior indicated by a policy assertion.] For example, an assertion identifying support for a specific reliable messaging mechanism might include an attribute information item to indicate how long an endpoint will wait before sending an acknowledgement.
AuthorsDomain authors should be cognizant of the processing requirements when defining complex assertions containing policyadditional assertion parameterscontent or nested policy expressions.expressions. Specifically, domain authors are encouraged to consider when the identity of the root Element Information Item alone is enough to convey the requirement or capability.
[Definition: A policy alternative alternative is a logical construct which represents a potentially empty collection of policy assertions.] An alternative with zero assertions indicates no behaviors. An alternative with one or more assertions indicates behaviors implied by those, and only those assertions. [Definition: A The vocabulary of a policy vocabularyalternative is the set of all all policy assertion types used in a policy.] [Definition: alternative. A policy alternative vocabulary is the set of all policy assertion types withinused in the policypolicy. alternative.] When anAn assertion whose type is part of the policy's vocabulary but is not included in in a policy alternative, the policyan alternative without the assertion type indicatesby that the assertion will not be applied in the context of the attached policy subject. See the example in Section 4.3.1 Optional Policy Assertionsalternative.
Assertions within an alternative are not ordered, and thus aspects such as the order in which behaviors (indicated by assertions) are applied to a subject are beyond the scope of this specification. However, authors can write assertions that control the order in which behaviours are applied.
A policy alternative MAY contain multiple assertions of the same type. Mechanisms for determining the aggregate behavior indicated by the assertions (and their Post-Schema-Validation Infoset (PSVI) (See XML Schema Part 1 [[XML Schema Structures]]) content, if any) are specific to the assertion type and are outside the scope of this document.
[Definition: AAt the abstract level a policy is a potentially empty collection of policy alternatives. ] A policy with zero alternatives contains no choices; a policy with one or more alternatives indicates choice in requirements or capabilities within the policy.
Alternatives are not ordered, and thus aspects such as preferences between alternatives in a given context are beyond the scope of this specification.
Alternatives within a policy may differ significantly in terms of the behaviors they indicate. Conversely, alternatives within a policy may be very similar. In either case, the value or suitability of an alternative is generally a function of the semantics of assertions within the alternative and is therefore beyond the scope of this specification.
Applied in the Web services based system,model, policy is used to convey conditions on an interaction between entities (requester application, provider service, Web infrastructure component, etc). [Definition: A policy subject is an entity (e.g., anand endpoint, message, resource, interaction) with which a policy can be associated. ] Any entity in a Web services based systemprovider. may expose a policy to convey conditions under which it functions. Satisfying assertions in the policy usually results results in behavior that reflects these conditions. Typically, conditions. For example, if two entities -exposes a policy to requester and provider - exposeit provides their policies, a requester might use the policy of the provider to decide whether or not to use the service. A requester may choose any alternative since each is a valid configuration configuration for interaction with the service, but a requester MUST choose only a single alternative for an interaction with a service since each represents an alternative configuration.
A policy assertion is supported by an entity ina requester the web services based system if and only if the entity satisfies the requirement requirement (or accommodates the capability) corresponding to the assertion. A policy alternative is is supported by an entity if and only if the requester entity supports all the assertions in the alternative. And, a policy is supported by an entity if and only if the entity supports at least one of the alternatives in the policy. Note that although policy alternatives are meant to be mutually exclusive, it cannot be decided in general whether or not more than one alternative can be supported at the same time.
Note that an entity may be able to support a policy even if the entity does not understand the type of each assertion in the vocabulary of the policy; the entity only has to understand the type of each assertion in the vocabulary of a policy alternative the entity supports. This characteristic is crucial to versioning and incremental deployment of new assertions because this allows a provider's policy to include new assertions in new alternatives while allowing entities to continue to use old alternatives in a backward-compatible manner.
This section describes how to convey policy in an interoperable form, using the XML Infoset representation of a policy. [Definition: A policy expression expression is an XML Infoset representation of a policy, eitherpolicy. in a normal form or in an equivalent compact form.] Other subsections below describe several important aspects related to policy expression, namely (i) Normal form of a policy expression (ii) Compact form of a policy expression (iii) Identification of policy expressions and (iv) Policy intersection.
The
The normal form of a policy expression is the most straightforward Infoset represenattion; equivalent, alternative Infosets allow compactly expressing a policy through a number of constructs.
This specification does not define processing for arbitrary wsp:Policy
Element Information Items in any context other than as an Element Information Item
in the children property of an Element
Information Item that is in the children
property of an element Information Item defined in section 4.1 below.
To facilitate interoperability, this specification defines a normal form for policy expressions that is a straightforward XML Infoset representation of a policy, enumerating each of its alternatives that in turn enumerate each of their assertions. The schema outline for the normal form of a policy expression is as follows:
<wsp:Policy … > <wsp:ExactlyOne> ( <wsp:All> ( <Assertion …> … </Assertion> )* </wsp:All> )* </wsp:ExactlyOne> </wsp:Policy>
The following describes the Element Information Items defined in the schema outline above:
/wsp:Policy
A policy expression.
/wsp:Policy/wsp:ExactlyOne
A collection of policy alternatives. If there are no Element Information Items in the children property, there are no admissible policy alternatives, i.e., no behavior is admissible.
/wsp:Policy/wsp:ExactlyOne/wsp:All
A policy alternative; a collection of policy assertions. If there are no Element Information Items in the children property, this is an admissible policy alternative that is empty, i.e., no behavior is specified.
/wsp:Policy/wsp:ExactlyOne/wsp:All/*
XML Infoset representation of a policy assertion.
/wsp:Policy/@{any}
Additional attributes MAY be specified but MUST NOT contradict the semantics of the owner element; element; if an attribute is not recognized, it SHOULD be ignored.
If an assertion in the normal form of a policy expression contains a nested policy expression,expression, the nested policy expression MUST contain at most one policy alternative (see 4.3.2 Policy Assertion Nesting).alternative.
To simplify processing and improve interoperability, the normal form of a policy expression SHOULDshould be used where practical.
For example, the following is the normal form of a policy expression.expression example introduced earlier.
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <wsp:ExactlyOne>
(03) <sp:wsp:All>
(04) <sp:SignedParts/>
(05) <sp:Body/>
(06) </sp:SignedParts/>
(07) </wsp:All>
(08) <sp:wsp:All>
(09) <sp:EncryptedParts/>
(10) <sp:Body/>
(11) </sp:EncryptedParts/>
(12) </wsp:All>
(13) </wsp:ExactlyOne>
(14) </wsp:Policy>
Lines (03-07) and Lines (08-11) express the two alternatives in the policy. If the first alternative is selected, only the message bodyBasic needs toRSA 15 be signed [[WS-SecurityPolicy]] is supported; conversely, if the second alternative is selected, only the message bodyRSA 15 needs to be encrypted.
A policy expression MAY be associated with an IRI [[IETF RFC 3987]]. The schema outline for attributes to associate an IRI is as follows:
<wsp:Policy ( Name="xs:anyURI" )? ( wsu:Id="xs:ID" | xml:id="xs:ID" )? … > … </wsp:Policy>
The following describes the Attribute Information Items listed and defined in the schema outline above:
/wsp:Policy/@Name
The identity of the policy expression as an absolute IRI [[IETF RFC 3987]]. If omitted, there is no implied value. This IRI MAY be used to refer to a policy from other XML documents using a policy attachment mechanism such as those defined in WS-PolicyAttachment [[Web Services Policy Attachment]]. [Definition: A policy attachment is a mechanism for associating policy with one or more policy scopes.] [Definition: A policy scope is a collection of policy subjects to which a policy may apply.]
/wsp:Policy/(@wsu:Id | @xml:id)
The identity of the policy expression as an ID
within the
enclosing XML document. If omitted, there is no implied value.
The constraints of the XML 1.0 [[XML 1.0]] ID type MUST be met.To
To refer to this policy expression, an IRI-reference
MAY be formed using this value per Section 4.2 of
WS-Security [[WS-Security 2004]] when @wsu:Id is used.
The use of xml:id
attribute in conjunction with Canonical XML 1.0 is
inappropriate as described in Appendix C of xml:id Version 1.0 [[XML ID]]
and thus this combination must be avoided (see [[C14N 1.0 Note]]). For example,
a policy expression identified using xml:id
attribute should not be signed
using XML Digital Signature when Canonical XML 1.0 is being used as
the canonicalization method.
The following example illustrates how to associate a policy
expression with the absolute IRI
"http://www.example.com/policies/P1"
:
(01) <wsp:Policy
Name="http://www.example.com/policies/P1"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <!-- Details omitted for readability -->
(03) </wsp:Policy>
The following example illustrates how to associate a policy expression with the IRI-reference "#P1"
:
(01) <wsp:Policy
wsu:Id="P1"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy"
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" >
(02) <!-- Details omitted for readability -->
(03) </wsp:Policy>
To express a policy in a more compact form while still using the XML Infoset, this specification defines three constructs: an attribute to decorate an assertion, semantics for recursively nested policy operators, and a policy reference/inclusion mechanism. Each is described in the subsections below.
To interpret a compact policy expression in an interoperable form, a compact expression may be converted to the corresponding normal form expression by the following procedure:
Start with the document
element property D of the Document Information Item of the
policy expression. The namespace
name of D is always "http://www.w3.org/@@@@/@@/ws-policy"
. In the base case,
the local name property of D is
"Policy"
; in the recursive case, the local name property of D is
"Policy"
, "ExactlyOne"
, or
"All"
.
Expand Element Information Items in the children property of D that are policy references per Section 4.3.5 Policy Inclusion.
Convert each Element Information Item C in the children property of D into normal form.
If the namespace name
property of C is "http://www.w3.org/@@@@/@@/ws-policy"
and the local
name property of C is "Policy"
,
"ExactlyOne"
, or "All"
, C is an expression
of a policy operator; normalize C by recursively applying this
procedure.
Otherwise the Element Information Item C is an assertion; normalize C per Sections 4.3.1 Optional Policy Assertions and 4.3.2 Policy Assertion Nesting.
Apply the policy operator indicated by D to the normalized Element Information Items in its children property and construct a normal form per Section 4.3.3 Policy Operators.
Note that an implementation may use a more efficient procedure and is not required to explicitly convert a compact expression into the normal form as long as the processing results are indistinguishable from doing so.
To indicate that a policy assertion is optional, this specification defines an attribute attribute that is a compact authoringsyntactic style for expressing a pair of policy alternatives, one alternatives with and one without that assertion. The schema outline for this attribute is as follows:
<Assertion ( wsp:Optional="xs:boolean" )? …> … </Assertion>
The following describes the Attribute Information Item defined in the schema outline above:
/Assertion/@wsp:Optional
If the actual value (See XML Schema Part 1 [[XML Schema Structures]]) is true, the expression of the assertion is semantically equivalent to the following:
<wsp:ExactlyOne> <wsp:All> <Assertion …> … </Assertion> </wsp:All> <wsp:All /> </wsp:ExactlyOne>
If the actual value (See XML Schema Part 1 [[XML Schema Structures]]) is false, the expression of the assertion is semantically equivalent to the following:
<wsp:ExactlyOne> <wsp:All> <Assertion …> … </Assertion> </wsp:All> </wsp:ExactlyOne>
Omitting this attribute is semantically equivalent to including it with a value of false. Policy expressions should not include this attribute with a value of false, but policy parsers must accept this attribute with a value of false.
For example, the following compact policy expression:
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <sp:IncludeTimestamp wsp:Optional="true" />
(03) </wsp:Policy>
is equivalent to the following normal form policy expression:
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <wsp:ExactlyOne>
(03) <wsp:All>
(04) <sp:IncludeTimestamp />
(05) </wsp:All>
(06) <wsp:All />
(07) </wsp:ExactlyOne>
(08) </wsp:Policy>
The @wsp:Optional
attribute in Line (02) of the first
policy expression indicates that the assertion in Line (02) is to be
included in a policy alternative whilst excluded from another; it is
included in Lines (03-05) and excluded in Line (06). Note that
@wsp:Optional
does not appear in the normal form of a
policy expression.
Any policy assertion MAY contain a policy expression. [Definition: A nested policy expression is a policy expression that. is an Element Information Item in the children property of a policy assertion.] The schema outline for a nested policy expression is:
<Assertion …> … ( <wsp:Policy …> … </wsp:Policy> )? … </Assertion>
The following describes additional processing constraints on the outline listed above:
/Assertion/wsp:Policy
This indicates that the assertion contains a nested policy
expression. If there is no wsp:Policy
Element Information
Item in the children property,
the assertion has no nested policy expression.
Note: if the schema outline for an assertion type requires a nested
policy expression but the assertion does not further qualify one or
more aspects of the behavior indicated by the assertion type (i.e., no
assertions are needed in the nested policy expression), the assertion
MUST include an empty
<wsp:Policy/>
Element Information Item in its children property; as explained in
Section 4.3.3 Policy Operators, this is equivalent to a
nested policy expression with a single alternative that has zero
assertions. The reason for requring least an empty <wsp:Policy/>
Element above is to ensure that two assertions of the same type will always be
compatible and an intersection would not fail
(see Section 4.4 Policy Intersection).
Note: This specification does not define processing for arbitrary
wsp:Policy
Element Information Items in the descendants
of an assertion parameter,assertion, e.g., in the children property of one of the children as in
<Lorem><Ipsum><wsp:Policy> …
</wsp:Policy></Ipsum></Lorem>
.
Policy assertions containing a nested policy expression are
normalized recursively. The nesting of a policy expression (and a
wsp:Policy
child) is retained in the normal form, but in
the normal form, each nested policy expression contains at most one
policy alternative. If an assertion A contains a nested policy
expression E, and if E contains more than one policy alternative,
A is duplicated such that there are as many instances of A as choices in E,
and the nested policy expression of a duplicate A contains a single
choice. This process is applied recursively to the assertions within
those choices and to their nested policy expression, if
any. Intuitively, if a compact policy is thought of as a tree whose
branches have branches etc, in the normal form, a policy is a stump
with straight vines.
For example, consider the following policy expressioncompact with nested policy expressions in a compact form:expression:
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <sp:TransportBinding>
(03) <wsp:Policy>
(04) <sp:AlgorithmSuite>
(05) <wsp:Policy>
(06) <wsp:ExactlyOne>
(07) <sp:Basic256Rsa15 />
(08) <sp:TripleDesRsa15 />
(09) </wsp:ExactlyOne>
(10) </wsp:Policy>
(11) </sp:AlgorithmSuite>
(12) <sp:TransportToken>
(13) <wsp:Policy>
(14) <sp:HttpsToken RequireClientCertificate="false" />
(15) </wsp:Policy>
(16) </sp:TransportToken>
<!-- Details omitted for readability -->
(17) </wsp:Policy>
(18) </sp:TransportBinding>
(19) </wsp:Policy>
Lines (02-18) in this policy expression contain a single transport binding security policy assertion; within its nested policy expression (Lines 03-17), is an algorithm suite assertion (Lines 04-11) whose nested policy expression (Lines 05-10) contains two policy alternatives (Lines 07-08). Generally, a nested policy expression implies recursive processing; in the example above, the behavior indicated by the transport binding assertion requires the behavior indicated by one of the assertions within the algorithm suite assertion.
The normalized form of the example abovepolicy is equivalent to the following:
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <wsp:ExactlyOne>
(03) <wsp:All>
(04) <sp:TransportBinding>
(05) <wsp:Policy>
(06) <sp:AlgorithmSuite>
(07) <wsp:Policy>
(08) <sp:Basic256Rsa15 />
(09) </wsp:Policy>
(10) </sp:AlgorithmSuite>
(11) <sp:TransportToken>
(12) <wsp:Policy>
(13) <sp:HttpsToken RequireClientCertificate="false" />
(14) </wsp:Policy>
(15) </sp:TransportToken>
<!-- Details omitted for readability -->
(16) </wsp:Policy>
(17) </sp:TransportBinding>
(18) </wsp:All>
(19) <wsp:All>
(20) <sp:TransportBinding>
(21) <wsp:Policy>
(22) <sp:AlgorithmSuite>
(23) <wsp:Policy>
(24) <sp:TripleDesRsa15 />
(25) </wsp:Policy>
(26) </sp:AlgorithmSuite>
(27) <sp:TransportToken>
(28) <wsp:Policy>
(29) <sp:HttpsToken RequireClientCertificate="false" />
(30) </wsp:Policy>
(31) </sp:TransportToken>
<!-- Details omitted for readability -->
(32) </wsp:Policy>
(33) </sp:TransportBinding>
(34) </wsp:All>
(35) </wsp:ExactlyOne>
(36) </wsp:Policy>
In the listing above, the transport binding and its nested policy expression have been duplicated once for each of the nested alternatives in Lines (07-08) of the compact policy. The first alternative (Lines 03-18) contains a single nested algorithm suite alternative (Line 08) as does the second alternative (Lines 19-34 and 24).
Policies are used to convey a set of capabilities, requirements, and general characteristics of entities (see 1. Introduction).
These are generally expressible as a set of policy alternatives.
Policy operators (wsp:Policy
, wsp:All
and wsp:ExactlyOne
)
are used to group policy assertions
into policy alternatives.
In some instances, complex policies expressed in normal form can get relatively large and hard to manage.
To compactly express complex policies, policy operators
MAY be recursively nested; that is, one or more
instances of wsp:Policy
, wsp:All
, and/or
wsp:ExactlyOne
MAY be nested within
wsp:Policy
, wsp:All
, and/or
wsp:ExactlyOne
.
The following rules are used to transform a compact policy expression into a normal form policy expression:
Use of wsp:Policy
as an operator within a policy expressionis is
equivalent to wsp:All
.
<wsp:All />
expresses a policy with zero policy assertions. Note that since wsp:Policy
is equivalent to wsp:All
, <wsp:Policy />
is therefore equivalent to <wsp:All />
, i.e., a policy alternative with zero assertions.
<wsp:ExactlyOne />
expresses a policy with zero policy alternatives.
In line with the previous statements that policy assertions within
a policy alternative and policy alternatives within a policy are not
ordered (see 3.2 Policy Alternative and 3.3 Policy, respectively), wsp:All
and
wsp:ExactlyOne
are commutative. For example,
<wsp:All> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:All>
is equivalent to:
<wsp:All> <!-- assertion 2 --> <!-- assertion 1 --> </wsp:All>
and:
<wsp:ExactlyOne> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:ExactlyOne>
is equivalent to:
<wsp:ExactlyOne> <!-- assertion 2 --> <!-- assertion 1 --> </wsp:ExactlyOne>
wsp:All
and wsp:ExactlyOne
are associative. For example,
<wsp:All> <!-- assertion 1 --> <wsp:All> <!-- assertion 2 --> </wsp:All> </wsp:All>
is equivalent to:
<wsp:All> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:All>
and:
<wsp:ExactlyOne> <!-- assertion 1 --> <wsp:ExactlyOne> <!-- assertion 2 --> </wsp:ExactlyOne> </wsp:ExactlyOne>
is equivalent to:
<wsp:ExactlyOne> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:ExactlyOne>
wsp:All
and wsp:ExactlyOne
are idempotent. For example,
<wsp:All> <wsp:All> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:All> </wsp:All>
is equivalent to:
<wsp:All> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:All>
and:
<wsp:ExactlyOne> <wsp:ExactlyOne> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:ExactlyOne> </wsp:ExactlyOne>
is equivalent to:
<wsp:ExactlyOne> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:ExactlyOne>
wsp:All
distributes over wsp:ExactlyOne
. For example,
<wsp:All> <wsp:ExactlyOne> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:ExactlyOne> </wsp:All>
is equivalent to:
<wsp:ExactlyOne> <wsp:All> <!-- assertion 1 --> </wsp:All> <wsp:All> <!-- assertion 2 --> </wsp:All> </wsp:ExactlyOne>
Similarly by repeatedly distributing wsp:All over wsp:ExactlyOne,Similarly,
<wsp:All> <wsp:ExactlyOne> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:ExactlyOne> <wsp:ExactlyOne> <!-- assertion 3 --> <!-- assertion 4 --> </wsp:ExactlyOne> </wsp:All>
is equivalent to:
<wsp:ExactlyOne> <wsp:All><!-- assertion 1 --><!-- assertion 3 --></wsp:All> <wsp:All><!-- assertion 1 --><!-- assertion 4 --></wsp:All> <wsp:All><!-- assertion 2 --><!-- assertion 3 --></wsp:All> <wsp:All><!-- assertion 2 --><!-- assertion 4 --></wsp:All> </wsp:ExactlyOne>
Distributing wsp:All
over an empty wsp:ExactlyOne
is equivalent to no alternatives. For example,
<wsp:All> <wsp:ExactlyOne> <!-- assertion 1 --> <!-- assertion 2 --> </wsp:ExactlyOne> <wsp:ExactlyOne /> </wsp:All>
is equivalent to:
<wsp:ExactlyOne />
For example, given the following compact policy expression:
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <sp:RequireDerivedKeys wsp:Optional="true" />
(03) <wsp:ExactlyOne>
(04) <sp:WssUsernameToken10 />
(05) <sp:WssUsernameToken11 />
(06) </wsp:ExactlyOne>
(07) </wsp:Policy>
Applying Section 4.3.1 Optional Policy Assertions to @wsp:Optional
in Line
(02), and distributing wsp:All
over
wsp:ExactlyOne
per Section 4.3.3 Policy Operators for the assertions
in Lines (04-05) yields:
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <wsp:ExactlyOne>
(03) <wsp:All> <!-- @wsp:Optional alternative with assertion -->
(04) <sp:RequireDerivedKeys />
(05) </wsp:All>
(06) <wsp:All /> <!-- @wsp:Optional alternative without -->
(07) </wsp:ExactlyOne>
(08) <wsp:ExactlyOne>
(09) <wsp:All>
(10) <sp:WssUsernameToken10 />
(11) </wsp:All>
(12) <wsp:All>
(13) <sp:WssUsernameToken11 />
(14) </wsp:All>
(15) </wsp:ExactlyOne>
(16) </wsp:Policy>
Note that the assertion listed in Line (02) in the first listing expands into the two alternatives in Lines (03-06) in the second listing.
Finally, noting that wsp:Policy
is equivalent to wsp:All
, and distributing wsp:All
over wsp:ExactlyOne
yields the following normal form policy expression:
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <wsp:ExactlyOne>
(03) <wsp:All>
(04) <sp:RequireDerivedKeys />
(05) <sp:WssUsernameToken10 />
(06) </wsp:All>
(07) <wsp:All>
(08) <sp:RequireDerivedKeys />
(09) <sp:WssUsernameToken11 />
(10) </wsp:All>
(11) <wsp:All>
(12) <sp:WssUsernameToken10 />
(13) </wsp:All>
(14) <wsp:All>
(15) <sp:WssUsernameToken11 />
(16) </wsp:All>
(17) </wsp:ExactlyOne>
(18) </wsp:Policy>
Note that the two alternatives listed in Lines (03-06) in the second listing are combined with the two alternatives listed in Lines (09-14) in the second listing to create four alternatives in the normalized policy, Lines (03-06), (07-10), (11-13), and (14-16).
TheIn order to share assertions across policy expressions, the wsp:PolicyReference
element MAY be present anywhere a policy assertion is allowed inside a policy expression. This element is used to referenceinclude the content of one policy expression in another policy expressions. Theexpression.
When a wsp:PolicyReference element references a wsp:Policy element, then the semantics of inclusion are simply to replace the wsp:PolicyReference element with a wsp:All element whose children property is the same as the children property of the referenced wsp:Policy element. That is, the contents of the referenced policy conceptually replace the wsp:PolicyReference
element and are determinedwrapped in a wsp:All operator. by the contextwsp:PolicyReference element, a policy expression MUST NOT reference itself either directly or indirectly. (Note: References that in which it@Digest is usedSHOULD (for an example, see 4.3.5 Policy Inclusion).included.)
The schema outline for the wsp:PolicyReference
element is as follows:
<wsp:PolicyReference URI="xs:anyURI" ( Digest="xs:base64Binary" ( DigestAlgorithm="xs:anyURI" )? )? … > … </wsp:PolicyReference>
The following describes the Attribute and Element Information Items defined in the schema outline above:
/wsp:PolicyReference
This element references a policy expression that is being referenced.
/wsp:PolicyReference/@URI
This attribute references a policy expression by an IRI. For a policy
expression within the same XML Document, the reference SHOULD be an
IRI-reference to a policy expression identified by an ID
.
For an external policy expression, there is no requirement that the IRI
be resolvable; retrieval mechanisms are beyond the scope of this specification.
After retrieval, there is no requirement to check that the retrieved policy
expression is associated (Section 4.2 Policy Identification) with this IRI.
The IRI included in the retrieved policy expression, if any, MAY be
different than the IRI used to retrieve the policy expression.
/wsp:PolicyReference/@Digest
This optional attribute specifies the digest of the referenced policy expression. This is used to ensure the included policy is the expected policy. If omitted, there is no implied value.
/wsp:PolicyReference/@DigestAlgorithm
This optional URI attribute specifies the digest algorithms being used. This specification predefines the default algorithm below, although additional algorithms can be expressed.
URI | Description |
---|---|
http://www.w3.org/@@@@/@@/ws-policy/Sha1Exc (implied) |
The digest is a SHA1 hash over the octet stream resulting from using the Exclusive XML canonicalization defined for XML Signature [[XML-Signature]]. |
/wsp:PolicyReference/@{any}
Additional attributes MAY be specified but MUST NOT contradict the semantics of the owner element; element; if an attribute is not recognized, it SHOULD be ignored.
/wsp:PolicyReference/{any}
Additional elements MAY be specified but MUST NOT contradict the semantics of the parent element; if an element is not recognized, it SHOULD be ignored.
In order to share assertions across policy expressions, the wsp:PolicyReference
element MAY be present anywhere a policy assertion is allowed inside a policy expression. This element is used to include the content of one policy expression in another policy expression.
When a wsp:PolicyReference
element references a wsp:Policy
element, then the semantics of inclusion are simply to replace the wsp:PolicyReference
element with a wsp:All
element whose children property is the same as the children property of the referenced wsp:Policy
element. That is, the contents of the referenced policy conceptually replace the wsp:PolicyReference
element and are wrapped in a wsp:All
operator. Using the wsp:PolicyReference
element, a policy expression MUST NOT reference itself either directly or indirectly. (Note: References that have a @Digest
attribute SHOULD be validated before being included.)
In the example below two policies include and extend a common policy. In the first example there is a single policy document containing two policy assertions. The expression is given an identifier but not a fully qualified location. The second and third expressions reference the first expression by URI indicating the referenced expression is within the document.
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy"
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
wsu:Id="Protection" >
(02) <sp:EncryptSignature wsp:Optional="true" />
(03) <sp:ProtectTokens wsp:Optional="true" />
(04) </wsp:Policy>
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <wsp:PolicyReference URI="#Protection" />
(03) <sp:OnlySignEntireHeadersAndBody />
(04) </wsp:Policy>
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
(02) <sp:IncludeTimestamp />
(03) <wsp:PolicyReference URI="#Protection" />
(04) <sp:OnlySignEntireHeadersAndBody />
(05) </wsp:Policy>
There are times when it is desirable to "re-use" a portion of a policy expression. Generally, this can be accomplished by placing the common assertions in a separate policy expression and referencing it.
Policy intersection is useful when two or more parties express policy and want to limit the policy alternatives to those that are mutually compatible. For example, when a requester and a provider express requirements on a message exchange, intersection identifies compatible policy alternatives (if any) included in both requester and provider policies. Intersection is a commutative, associative function that takes two policies and returns a policy.
Because the set of behaviors indicated by a policy alternative depends on the domain-specific semantics of the collected assertions, determining whether two policy alternatives are compatible generally involves domain-specific processing. If a domain-specific intersection processing algorithm is required will be known from the QNames of the specific assertion types involved in the policy alternatives. As a first approximation, an algorithm is defined herein that approximates compatibility in a domain-independent manner; specifically, for two policy alternatives to be compatible, they must at least have the same policy alternative vocabulary (see Section 3.2 Policy Alternative).
Two policy assertions are compatible if they have the same type and
If either assertion contains a nested policy expression, the two assertions are compatible if they both have a nested policy expression and the alternative in the nested policy expression of one is compatible with the alternative in the nested policy expression of the other.
Assertion parameters are not part of the compatibility determination defined herein but may be part of other, domain-specific compatibility processing.
Two policy alternatives are compatible if each assertion in one is compatible with an assertion in the other, and vice-versa. If two alternatives are compatible, their intersection is an alternative containing all of the assertions in both alternatives.
Two policies are compatible if an alternative in one is compatible with an alternative in the other. If two policies are compatible, their intersection is the set of the intersections between all pairs of compatible alternatives, choosing one alternative from each policy. If two policies are not compatible, their intersection has no policy alternatives.
As an example of intersection, consider two input policies in normal form:
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
<!-- Policy P1 -->
(02) <wsp:ExactlyOne>
(03) <wsp:All> <!-- Alternative A1 -->
(04) <sp:SignedElements>
(05) <sp:XPath>/S:Envelope/S:Body</sp:XPath>
(06) </sp:SignedElements>
(07) <sp:EncryptedElements>
(08) <sp:XPath>/S:Envelope/S:Body</sp:XPath>
(09) </sp:EncryptedElements>
(10) </wsp:All>
(11) <wsp:All> <!-- Alternative A2 -->
(12) <sp:SignedParts>
(13) <sp:Body />
(14) <sp:Header
Namespace="http://www.w3.org/2005/08/addressing" />
(15) </sp:SignedParts>
(16) <sp:EncryptedParts>
(17) <sp:Body />
(18) </sp:EncryptedParts>
(19) </wsp:All>
(20) </wsp:ExactlyOne>
(21) </wsp:Policy>
The listing above contains two policy alternatives. The first alternative, (Lines 03-10) contains two policy assertions. One indicates which elements should be signed (Lines 04-06); its type is sp:SignedElements
(Line 04), and its parameters include an XPath expression for the content to be signed (Line 05). The other assertion (Lines 07-09) has a similar structure: type (Line 07) and parameters (Line 08).
The second alternative (Lines 11-19) also contains two assertions, each with type (Line 12 and Line 16) and parameters (Lines 13-14 and Line 17).
As this example illustrates, compatibility between two policy assertions is based on assertion type and delegates parameter processing to domain-specific processing.
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
<!-- Policy P2 -->
(02) <wsp:ExactlyOne>
(03) <wsp:All> <!-- Alternative A3 -->
(04) <sp:SignedParts />
(05) <sp:EncryptedParts>
(06) <sp:Body />
(07) </sp:EncryptedParts>
(08) </wsp:All>
(09) <wsp:All> <!-- Alternative A4 -->
(10) <sp:SignedElements>
(11) <sp:XPath>/S:Envelope/S:Body</sp:XPath>
(12) </sp:SignedElements>
(13) </wsp:All>
(14) </wsp:ExactlyOne>
(15) </wsp:Policy>
Because there is only one alternative (A2) in policy P1 with the same vocabulary — the assertions have the same type — as another alternative (A3) in policy P2, the intersection is a policy with a single alternative that contains all of the assertions in A2 and in A3.
(01) <wsp:Policy
xmlns:sp="http://schemas.xmlsoap.org/ws/2005/07/securitypolicy"
xmlns:wsp="http://www.w3.org/@@@@/@@/ws-policy" >
<!-- Intersection of P1 and P2 -->
(02) <wsp:ExactlyOne>
(03) <wsp:All>
(04) <sp:SignedParts >
(05) <sp:Body />
(06) <sp:Header
Namespace="http://www.w3.org/2005/08/addressing" />
(07) </sp:SignedParts>
(08) <sp:EncryptedParts>
(09) <sp:Body />
(10) </sp:EncryptedParts>
(11) <sp:SignedParts />
(12) <sp:EncryptedParts>
(13) <sp:Body />
(14) </sp:EncryptedParts>
(15) </wsp:All>
(16) </wsp:ExactlyOne>
(17) </wsp:Policy>
Note that there are > 1 assertions of the type
sp:SignedParts
; when the behavior associated with
sp:SignedParts
is invoked, the contents of both
assertions are used to indicate the correct behavior. Whether these
two assertions are compatible depends on the domain-specific semantics
of the sp:SignedParts
assertion. To leverage
intersection, assertion authors are encouraged to factor assertions
such that two assertions of the same assertion type are always (or at
least typically) compatible.
It is RECOMMENDED that policies and assertions be signed to prevent tampering.
Policies SHOULD NOT be accepted unless they are signed and have an associated security token to specify the signer has the right to "speak for" the scope containing the policy. That is, a relying party shouldn't rely on a policy unless the policy is signed and presented with sufficient credentials to pass the relying parties' acceptance criteria.
It should be noted that the mechanisms described in this document could be secured as part of a SOAP message [[SOAP 1.1], [SOAP 1.2 Messaging Framework]] using WS-Security [[WS-Security 2004]] or embedded within other objects using object-specific security mechanisms.
This section describes the security considerations that service providers, requestors, policy authors, policy assertion authors, and policy implementers need to consider when exposing, consuming and designing policy expressions, authoring policy assertions or implementing policy.
A policy is used to represent the capabilities and requirements of a Web Service. Policies may include sensitive information. Malicious consumers may acquire sensitive information, fingerprint the service and infer service vulnerabilities. These threats can be mitigated by requiring authentication for sensitive information, by omitting sensitive information from the policy or by securing access to the policy. For securing access to policy metadata, policy providers can use mechanisms from other Web Services specifications such as WS-Security and WS-MetadataExchange.
If a policy expression is unsigned it could be easily tampered with or replaced. To prevent tampering or spoofing of policy, requestors should discard a policy unless it is signed by the provider and presented with sufficient credentials. Requestors should also check that the signer is actually authorized to express policies for the given policy subject.
A policy may offer several alternatives that vary from weak to strong set of requirements. An adversary may interfere and remove all the alternatives except the weakest one (say no security requirements). Or, an adversary may interfere and discard this policy and insert a weaker policy previously issued by the same provider. Policy authors or providers can mitigate these threats by sun-setting older or weaker policy alternatives. Requestors can mitigate these threats by discarding policies unless they are signed by the provider.
Malicious providers may include policy assertions in its policy whose behavior cannot be verified by examining the wire message from the provider to requestor. In general, requestors have no guarantee that a provider will behave as described in the provider’s policy expression. The provider may not and perform a malicious activity. For example, say the policy assertion is privacy notice information and the provider violates the semantics by disclosing private information. Requestors can mitigate this threat by discarding policy alternatives which include assertions whose behavior cannot be verified by examining the wire message from the provider to requestor. Assertion authors can mitigate this threat by not designing assertions whose behavior cannot be verified using wire messages.
Malicious providers may provide a policy expression with a large number of alternatives, a large number of assertions in alternatives, deeply nested policy expressions or chains of PolicyReference elements that expand exponentially (see the chained sample below; this is similar to the well-known DTD entity expansion attack). Policy implementers need to anticipate these rogue providers and use a configurable bound with defaults on number of policy alternatives, number of assertions in an alternative, depth of nested policy expressions, etc.
Example 5-1. Chained Policy Reference Elements
<Policy wsu:Id="p1"> <PolicyReference URI="#p2"/ > <PolicyReference URI="#p2"/> </Policy> <Policy wsu:Id="p2" > <PolicyReference URI="#p3"/> <PolicyReference URI="#p3"/> </Policy> <Policy wsu:Id="p3" > <PolicyReference URI="#p4"/> <PolicyReference URI="#p4"/> </Policy> <!-- Policy/@wsu:Id p4 through p99 --> <Policy wsu:Id="p100" > <PolicyReference URI="#p101"/> <PolicyReference URI="#p101"/> </Policy> <Policy wsu:Id="p101" > <mtom:OptimizedMimeSerialization /> </Policy>
Malicious providers may provide a policy expression that includes multiple PolicyReference elements that use a large number of different internet addresses. These may require the consumers to establish a large number of TCP connections. Policy implementers need to anticipate such rogue providers and use a configurable bound with defaults on number of PolicyReference elements per policy expression.
An element information item whose namespace name is "http://www.w3.org/@@@@/@@/policy" and whose local part is Policy or PolicyReference conforms to this specification if it is valid according to the XML Schema [[XML Schema Structures]] for that element as defined by this specification (http://www.w3.org/@@@@/@@/policy/ws-policy.xsd) and additionally adheres to all the constraints contained in this specification. Such a conformant element information item constitutes a policy expression.
This document is the work of the W3C Web Services Policy Working Group.
Members of the Working Group are (at the time of writing, and by alphabetical order): Dimitar Angelov (SAP AG), Abbie Barbir (Nortel Networks), Charlton Barreto (Adobe Systems Inc.), Sergey Beryozkin (IONA Technologies, Inc.), Vladislav Bezrukov (SAP AG), Toufic Boubez (Layer 7 Technologies), Paul Cotton (Microsoft Corporation), Jeffrey Crump (Sonic Software), Glen Daniels (Sonic Software), Ruchith Fernando (WSO2), Christopher Ferris (IBM Corporation), William Henry (IONA Technologies, Inc.), Frederick Hirsch (Nokia), Maryann Hondo (IBM Corporation), Tom Jordahl (Adobe Systems Inc.), Philippe Le Hégaret (W3C/MIT), Jong Lee (BEA Systems, Inc.), Mark Little (JBoss Inc.), Ashok Malhotra (Oracle Corporation), Monica Martin (Sun Microsystems, Inc.), Jeff Mischkinsky (Oracle Corporation), Dale Moberg (Cyclone Commerce, Inc.), Anthony Nadalin (IBM Corporation), David Orchard (BEA Systems, Inc.), Bijan Parsia (University of Manchester), Fabian Ritzmann (Sun Microsystems, Inc.), Daniel Roth (Microsoft Corporation), Sanka Samaranayake (WSO2), Felix Sasaki (W3C/Keio), Skip Snow (Citigroup), Yakov Sverdlov (Computer Associates), Mark Temple-Raston (Citigroup), Asir Vedamuthu (Microsoft Corporation), Sanjiva Weerawarana (WSO2), Ümit Yalçinalp (SAP AG), Prasad Yendluri (webMethods, Inc.).
Previous members of the Working Group were: Bijan Parsia (University of Manchester), Seumas Soltysik (IONA Technologies, Inc.)
The people who have contributed to discussions on public-ws-policy@w3.org are also gratefully acknowledged.
A list of substantive changes since the Working Draft dated 27 September, 2006 is below:
Enhanced Conformance section.
Enhanced Security Considerations section.
Clarified WS-Policy 1.5 Framework and Attachment XML Namespace URI versioningfor Policy.
Clarified the policy model forxml:id Web Services.attribute.
Clarified thatAdded an Element (EII) within a policy expression MUST be an assertion.section.
Clarified that policy assertion parameters are opaque to framework processing.IRI.
Added PolicyReference extensibility via {Any}
Clarified constraints on @xml:id type usage for Policy Identification.
Clarified that a wsp:PolicyReference can be used any place where a wsp:Policy element can be used
Date | Author | Description |
---|---|---|
20060712 | ASV | Updated the list of editors. Completed action items 12, 16 and 20 from the Austin F2F. |
20060718 | DBO | Completed action items: RFC2606 for domain names 09 (note: PLH had already done but it didn't show up in the change log) |
20060726 | ASV | Incorporated the XML namespace URI versioning policy adopted by the WG. |
20060803 | PY | Completed Issue: 3551 Misc updates throughout. |
20060808 | PY | Completed action item: 20 to highlight infoset terms uniformly. |
20060808 | DBO | Completed action items: 15 as early as possible in the doc, use the definition that are defined in the doc. |
20060808 | ASV | Implemented the resolution for issue 3543 and the resolution for issue 'Modify wording in Abstract for Framework'. Restored Section 2.2 Extensibility (that was accidentally dropped). Completed action item 17 from the Austin F2F. |
20060809 | ASV | Implemented the resolution for issue 3563. |
20060811 | DBO | Completed action items: 15 remove use if emph/ital terms. Framework: removed emph on conceptually replace and support; attachment: make merge a termdef |
20060813 | ASV | Added a new Section C. Changes in this Version of the Document (that provides a list of substantive chanages since the previous publication). |
20060818 | ASV | Implemented the resolution for issue 3560. |
20060822 | TIB | Completed action item: resolution for issue 3565. |
20060824 | PY | Completed action item: resolution for issue 3552. |
20060827 | TIB | Completed action item: resolution for adding Conformance section. |
20060828 | DBO | Completed action item: Partial resolution for issue 3590. for adding document attribute extensbility of wsp:Policy/@{any} and wsp:Policy/.../wsp:PolicyReference/@{any} |
20060829 | ASV | Implemented the resolution for issue 3561: replaced URI with IRI. |
20060830 | DBO | Completed action item: resolution for issue 3604. Removing Goals section, resulted in moving Policy expression definition to 2nd para of intro. |
20060906 | DBO | Completed partial resolution for issue 3590. for adding document attribute extensbility of wsp:Policy/@{any} and wsp:Policy/.../wsp:PolicyReference/@{any}, specifically making attribute extensibility for any namespace. |
20060906 | TIB | Completed action item: resolution for issue 3607. Better describe policy language capabilities in the Introduction. |
20060912 | DBO | Completed action item: 6. |
20060913 | TIB | Completed action item: 8. |
20060913 | TIB | Completed action item: 31. |
20060913 | TIB | Completed action item: 11. |
20060918 | PY | Completed action item: 16. |
20060918 | PY | Completed action item: 17. |
20060918 | PY | |
20060918 | PY | |
20060918 | PY | |
20060920 | DBO | |
20060921 | PY | |
20060924 | TIB | Implemented the editorial action 35 to include the Security Considerations section from the Primer document. |
20060927 | MH | |
20060927 | PY | |
20061002 | DBO | Completed action item: 7. |
20061002 | DBO | Implemented the for issue 3559: Conformance Section. |
20061002 | DBO | Implemented the resolution for issue 3712:wsp:PolicyReference can be used in any place where you can use wsp:Policy |
20061004 | PY | Completed action item: 10 Recast text at the beg of section to describe what's upcoming in the subsections. |
20061007 | TIB | Completed action item: 47 Issue 3602 Resolution - The absence of an assertion should not mean that the behavior is "explicitly prohibited". |
20061007 | TIB | Completed action item: 19 Add an intro paragraph that introduces the material in section 4.3.3. |
20061008 | MH | Completed action item: 45 Replace security policy example 1.1. as per issue 3753. |
20061011 | PY | Updated "Changes in this Version" section (Appendix C) |