Communication security¶
Note
Communication security is only really essential for the communication
to site-business
as that component should only process requests containing
compound identifiers arriving from the client
component (or any other
suitably secured “client”, e.g. a Perl script) which is expected to have
an appropriate authentication mechanism configured. See
here for further
information on generic client authentication options.
For app-manager
and dose-response-manager
component WS’s, these could
be kept as “open” resources for any potential “client” application, e.g. a
command-line script, as the WS message content will never contain any data
which identifies a compound.
HTTPS¶
All inter-component WS communication uses WSS and so all such communication should be encrypted HTTP, e.g. using X.509 certificates (self-signed or otherwise).
An example configuration of such a setup is available for Tomcat.
WSS¶
All inter-component WS communication uses WSS (description here)
of the User ID/Password
variety. For this to be effective the passwords
used should be :
- Stored in an encrypted format
- Communicated in an encrypted format, i.e. HTTPS.
- In access-controlled files
WS IP access control¶
Access to any component’s WS, e.g. app-manager
, site-business
and
dose-response-manager
, can be restricted to specified IP
origin addresses by, for example, the inclusion of a Remote Address Filter
in Tomcat’s web.xml
configuration file.
WWW/Internet communication¶
Once installed, AP-Portal
’s generic portal components have no need
to access the internet – the portal could operate unhindered within
corporate firewalls. Having said that, ApPredict
on the other hand will
attempt to retrieve variability lookup tables if they cannot be found
locally (see variability configuration).
Having said that, there would be nothing preventing site-specific
component implementations or extensions, e.g. for client
or site-business
,
from communicating through corporate firewalls if requirements necessitate
doing so.