The Xentara Web Service v2.0
User Manual
|
The Xentara Web Service only supports encrypted communication using HTTPs. Plain-text HTTP is not supported for security reasons.
The Xentara Web service only supports TLS versions 1.2 and 1.3. It does not support TLS 1.1, TLS 1.0, SSL 3.0, SSL 2.0, or SSL 1.0, as these versions are no longer considered secure. (See also RFC 8996, RFC 7568, and RFC 6176.)
When accepting TLS connections from remote clients, The Xentara web service needs to present a valid certificate to the client. Normally, the Xentara web service uses the global Xentara server certificate. You can specify an alternate certificate path in the configuration of the individual server elements, however.
The Xentara web service requires authentication for all HTTP requests. The Xentara web service supports two HTTP authentication schemes:
The authentication parameters, like allowed token issuers and usernames and passwords, are taken from the global Xentara authentication configuration described under Authentication in the Xentara user manual.
The Xentara web service uses the built-in Xentara access control list (ACL) functionality to determine whether a client is allowed to connect to the web service, and whether a client is allowed to read and/or write a specific data point.
To control whether a client is allowed to connect, the Xentara web service defines a special entitlement named WebService.connect.
Access control is checked as followed:
The custom entitlement WebService.connect is included in the “allow” list of the default ACL, as described under Inheritance for the global ACL in the Xentara user manual. This essentially means that connecting to the Xentara web service is allowed for everyone unless it has been explicitly denied in an ACL.