Standard
Track updates
iconCreated with Sketch.

AS 5550-2013

[Current]

E-health web services profiles

Defines profiles of the SOAP Web services specifications; defines a base set of specifications for Web services, so that interoperable Web services can be defined for e-health, and also defines profiles that can be used to secure those Web services.
Published: 17/12/2013
Pages: 59
Table of contents
Cited references
Content history
Table of contents
Header
About this publication
Preface
1 Scope and general
1.1 Scope and intended audience
1.1.1 Scope
1.1.2 Intended audience
1.2 Overview
1.3 Normative references
1.4 Definitions
1.5 Acronyms and abbreviations
1.6 Artefacts
2 Web services base profile
2.1 Introduction
2.2 Conformance
2.2.1 General
2.2.2 Use with other profiles
2.2.2.1 Conformance point on service interface specifications
2.2.2.2 Informative note
2.3 Web services specification
2.3.1 WSDL 1.1
2.3.1.1 Conformance point on service interface specifications
2.3.1.2 Informative notes
2.3.2 Separation of interface and bindings
2.3.2.1 Conformance point on service interface specifications
2.3.2.2 Informative notes
2.3.2.3 Example 1: WSDL containing service interface information
2.3.2.4 Example 2: WSDL containing service instance binding information
2.3.3 Namespace values
2.3.3.1 Conformance points on service interface specifications
2.3.3.2 Informative notes
2.3.3.3 Example
2.4 Web services policies
2.4.1 WS-Policy 1.5—Framework
2.4.1.1 Conformance points on service interface specifications
2.4.1.2 Informative note
2.4.1.3 Example: WSDL containing service instance information
2.4.2 WS-SecurityPolicy 1.2
2.4.2.1 Conformance point on service interface specifications
2.4.2.2 Informative notes
2.4.3 WS-Addressing 1.0—Metadata
2.4.3.1 Conformance point on service interface specifications
2.4.3.2 Informative notes
2.5 Hypertext transport protocol
2.5.1 HTTP 1.1
2.5.1.1 Conformance point on service invokers
2.5.1.2 Conformance point on service providers
2.5.1.3 Informative note
2.5.2 HTTP persistent connections
2.5.2.1 Conformance point on service invokers
2.5.2.2 Conformance point on service providers
2.5.2.3 Informative notes
2.6 SOAP protocol
2.6.1 SOAP 1.2
2.6.1.1 Conformance point on service invokers
2.6.1.2 Conformance point on service providers
2.6.1.3 Informative notes
2.6.2 Document literal encoding
2.6.2.1 Conformance point on service interface specifications
2.6.2.2 Informative notes
2.6.2.3 Example: WSDL definition
2.6.3 SOAP action
2.6.3.1 Conformance point on service interface specifications
2.6.3.2 Conformance point on SOAP message consumers
2.6.3.3 Informative notes
2.6.4 Wrapped convention
2.6.4.1 Conformance point on service interface specifications
2.6.4.2 Informative notes
2.6.4.3 Example: WSDL definition
2.6.5 Request-Response message exchange pattern (MEP)
2.6.5.1 Conformance point on service interface specifications
2.6.5.2 Informative notes
2.6.5.3 Example: WSDL definition
2.6.6 Fault and error behaviour
2.6.6.1 Conformance points on service invokers
2.6.6.2 Conformance points on service providers
2.6.6.3 Informative notes
2.6.6.3.1 How service invokers handle SOAP faults
2.6.6.3.2 How service providers generate SOAP faults
2.6.6.3.3 Confidentiality and privacy
2.7 Metadata
2.7.1 Use of WS-Addressing 1.0
2.7.1.1 Conformance point on service invokers
2.7.1.2 Conformance point on service providers
2.7.1.3 Informative notes
2.7.1.4 Policy example: WSDL containing service instance information
2.7.2 WS-Addressing action
2.7.2.1 Conformance point on service interface specifications
2.7.2.2 Conformance point on SOAP message creators
2.7.2.3 Conformance point on service providers
2.7.2.4 Informative notes
2.7.2.5 Policy example: WSDL definition
2.7.3 WS-Addressing MessageID
2.7.3.1 Conformance points on SOAP message creators
2.7.3.2 Conformance points on SOAP message consumers
2.7.3.3 Conformance point on service providers
2.7.3.4 Informative notes
2.7.3.4.1 MessageID
2.7.3.4.2 UUID URNs
2.7.3.4.3 UUID URI
2.7.3.4.4 Faults
2.7.4 WS-Addressing in SOAP requests
2.7.4.1 Conformance point on service invokers
2.7.4.2 Conformance points on service providers
2.7.4.3 Informative notes
2.7.4.3.1 General
2.7.4.3.2 WS-Addressing to header
2.7.4.3.3 Other WS-Addressing headers
2.7.4.3.4 Digital signing
2.7.4.3.5 Faults
2.7.4.4 Example: SOAP request
2.7.5 WS-Addressing in SOAP responses
2.7.5.1 Conformance point on service providers
2.7.5.2 Informative notes
2.7.5.3 Example: SOAP response
2.7.6 WS-Addressing in SOAP faults
2.7.6.1 Conformance point on service providers
2.7.6.2 Informative notes
3 TLS profile
3.1 Introduction
3.2 Conformance
3.2.1 General
3.2.2 Use with other profiles
3.2.2.1 Conformance point on service interface specifications
3.2.2.2 Informative note
3.3 PKI for TLS
3.3.1 RSA certificates
3.3.1.1 Conformance point on service invokers
3.3.1.2 Conformance point on service providers
3.3.1.3 Informative notes
3.3.2 Key usage
3.3.2.1 Conformance points on service invokers
3.3.2.2 Conformance point on service providers
3.3.2.3 Informative notes
3.4 Transport Layer Security (TLS)
3.4.1 Protocol
3.4.1.1 Conformance point on service invokers
3.4.1.2 Conformance points on service providers
3.4.1.3 Informative notes
3.4.2 Mutual authentication
3.4.2.1 Conformance point on service invokers
3.4.2.2 Conformance points on service providers
3.4.2.3 Informative notes
3.4.3 Cipher suites
3.4.3.1 Conformance points on service providers
3.4.3.2 Informative notes
4 WS-Security profile
4.1 Introduction
4.2 Conformance
4.2.1 General
4.2.2 Use with other profiles
4.2.2.1 Conformance point on service interface specifications
4.2.2.2 Informative notes
4.3 PKI for WS-Security
4.3.1 Use of PKI
4.3.1.1 Conformance point on service interface specifications
4.3.1.2 Informative notes
4.3.1.3 Example: WSDL containing service instance information
4.3.2 Subject Key Identifier of X.509v3 certificates
4.3.2.1 Conformance point on SOAP message creators
4.3.2.2 Conformance point on service providers
4.3.2.3 Informative notes
4.3.2.4 Example: WSDL containing service instance information
4.3.3 Key usage
4.3.3.1 Conformance points on SOAP message creators
4.3.3.2 Conformance point on service providers
4.3.3.3 Informative notes
4.4 WS-Security
4.4.1 WS-Security 1.1
4.4.1.1 Conformance point on service interface specifications
4.4.1.2 Informative notes
4.4.2 WS-Security timestamp
4.4.2.1 Conformance points on service interface specifications
4.4.2.2 Conformance points on SOAP message creators
4.4.2.3 Conformance points on SOAP message consumers
4.4.2.4 Conformance points on service providers
4.4.2.5 Informative notes
4.4.2.5.1 General
4.4.2.5.2 Clock skew
4.4.2.5.3 Security cautions
4.4.2.5.4 WS-Security timestamps
4.4.2.5.5 Maximum transit delay
4.4.2.5.6 Digital signing
4.4.2.5.7 Faults
4.4.2.6 Examples
4.4.2.6.1 Policy example: WSDL containing service instance information
4.4.2.6.2 SOAP message example
4.4.3 Digital signatures
4.4.3.1 Conformance points on SOAP message creators
4.4.3.2 Conformance points on SOAP message consumers
4.4.3.3 Conformance points on service providers
4.4.3.4 Informative notes
4.4.3.4.1 General
4.4.3.4.2 Faults
4.4.3.5 Example: WSDL containing service instance information
4.4.4 Encryption
4.4.4.1 Conformance point on service interface specifications
4.4.4.2 Conformance points on SOAP message creators
4.4.4.3 Conformance points on SOAP message consumers
4.4.4.4 Conformance points on service providers
4.4.4.5 Informative notes
4.4.4.5.1 General
4.4.4.5.2 Faults
4.4.4.6 Example: WSDL containing service instance information
4.4.5 Signing before encryption
4.4.5.1 Conformance point on SOAP message creators
4.4.5.2 Conformance points on SOAP message consumers
4.4.5.3 Conformance point on service providers
4.4.5.4 Informative notes
4.4.5.4.1 General
4.4.5.4.2 Lax order of timestamps
4.4.5.4.3 Faults
4.4.5.5 Example: WSDL containing service instance information
4.4.6 Algorithms
4.4.6.1 Conformance point on SOAP message creators
4.4.6.2 Conformance point on SOAP message consumers
4.4.6.3 Conformance point on service providers
4.4.6.4 Informative notes
4.4.6.4.1 General
4.4.6.4.2 Faults
4.4.6.5 Examples: WSDL containing service instance information
4.4.6.5.1 Policy example
4.4.6.5.2 SOAP message example
4.4.7 Transmission of certificates
4.4.7.1 Conformance points on service invokers
4.4.7.2 Conformance points on service providers
4.4.7.3 Conformance point on service interface specifications
4.4.7.4 Informative notes
4.4.7.4.1 General
4.4.7.4.2 Faults
4.4.7.5 Examples
4.4.7.5.1 Policy example: WSDL containing service instance information
4.4.7.5.2 SOAP message example 1: SOAP request
4.4.7.5.3 SOAP message example 2: SOAP response
Appendix A
A1 Introduction
A2 SOAP faults
A3 Standard error codes
A3.1 Classification
A3.2 Service errors
A3.2.1 General
A3.2.2 servicePermanentUnavailable
A3.2.3 serviceTemporaryUnavailable
A3.3 Certificate-type errors
A3.3.1 General
A3.3.2 certificateSkiMissing
A3.3.3 certificateKeyUsage
A3.4 Security errors
A3.4.1 General
A3.4.2 invalidCredentials
A3.4.3 notAuthenticated
A3.4.4 notAuthorized
A3.5 Bad request errors
A3.5.1 General
A3.5.2 badParam
A3.5.3 badlyFormedMsg
A3.5.4 badTimestamp
A3.5.5 badSignature
A3.5.6 badEncryption
A3.5.7 badSigEncOrder
A3.5.8 badCertificateTransmit
A3.5.9 badWsaAction
A3.5.10 badWsaMessageId
A3.5.11 badWsaTo
A3.5.12 badAlgorithmDataEncryption
A3.5.13 badAlgorithmKeyEncryption
A3.5.14 badAlgorithmC14N
A3.5.15 badAlgorithmDigest
A3.5.16 badAlgorithmSignature
A4 XML Schema
Bibliography
Cited references in this standard
Content history
[Superseded]
DR AS 5550

One-time Purchase

Access via web browser on any device
One-time purchase
Single publication
Offline access via PDF^

$203.34 AUD

Inclusive of GST
Format *
iconCreated with Sketch.
Web Reader
Licenses *
iconCreated with Sketch.
1 user
Total$203.34 AUD
Add to Cart
IMPORTANT