This site uses cookies for analytics, personalized content and ads. By continuing to browse this site, you agree to this use.
Learn more
Developer Network
Developer Network
Developer
Sign in
Subscriber portal
Get tools
Downloads
Visual Studio
SDKs
Trial software
Free downloads
Office resources
SharePoint Server 2013 resources
SQL Server 2014 Express resources
Windows Server 2012 resources
Programs
Subscriptions
Overview
Administrators
Students
Microsoft Imagine
Microsoft Student Partners
ISV
Startups
Events
Community
Magazine
Forums
Blogs
Channel 9
Documentation
APIs and reference
Dev centers
Samples
Retired content
We’re sorry. The content you requested has been removed. You’ll be auto redirected in 1 second.
patterns & practices
Services Development
Improving Web Services Security: Scenarios and Implementation Guidance for WCF
Improving Web Services Security: Scenarios and Implementation Guidance for WCF
PART I: Security Fundamentals for Web Services
PART I: Security Fundamentals for Web Services
PART I: Security Fundamentals for Web Services
Foreword by Nicholas Allen
Foreword by Rockford Lhotka
Introduction
Solutions at a Glance
Fast Track: A Guide for Getting Started and Applying the Guidance
PART I: Security Fundamentals for Web Services
Chapter 1: Security Fundamentals for Web Services
Chapter 2: Threats and Countermeasures for Web Services
Chapter 3: Security Design Guidelines for Web Services
PART II: WCF Security Fundamentals
PART III: Intranet Application Scenarios
PART IV: Internet Application Scenarios
WCF Security Checklist
WCF Security Guidelines
Practices at a Glance: WCF Security
WCF Security Questions and Answers (Q&A)
How-to Articles
WCF Security Resources
TOC
Collapse the table of content
Expand the table of content
This documentation is archived and is not being maintained.
This documentation is archived and is not being maintained.
PART I: Security Fundamentals for Web Services
In This Part:
Chapter 1: Security Fundamentals for Web Services
Chapter 2: Threats and Countermeasures for Web Services
Chapter 3: Security Design Guidelines for Web Services
Show:
Inherited
Protected
Print
Export (
0
)
Print
Share
IN THIS ARTICLE