Panel | ||
---|---|---|
| ||
| ||
Info | ||
| ||
This page concerns v2.0 of the Specification. Supporting material on v1.0 is SWIM-SERV-019 Protocols and data format |
Requirement
Panel | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
|
Guidance
Info | ||
---|---|---|
| ||
The service metadata schema allows flexibility when satisfying this requirement.
|
Verification Support
Completeness | Check that: [ ] The service description includes or refers to information about the service interface protocols (including name and version) for each provider side and consumer side interface. [ ] The service description includes or refers to information about the data format to be used for each provider side and consumer side interface. |
Consistency | Check that: [ ] The protocols are consistent with the selected interface binding. |
Examples
The following example shows the content as a table.
service interface protocols and data format | transport / messaging protocols | HTTP XML 1.1 SOAP1.1, SOAP1.2 Protocol implementation compliant with WSI Basic Profile 2.0 |
---|---|---|
protocol configuration | HTTP Messages will indicate the payload content type using the content-type header HTTP Messages that transport compressed payloads will use deflate/gzip/exi as expressed in the content-encoding header (compression ratio is around 20%) HTTP will use the chunked transfer encoding and indicate this in the transfer-encoding header. HTTP will use the status header to indicate the status of the response using a code and corresponding meaning phrase. (see exception handling) HTTP post method is supported | |
security | Server authentication based on X.509 certificates Client authenticates based on HTTP Basic TLS1.2 Cypher Suites: 0 requests and replies embedded into SOAP 1.2 messages, themselves embedded into HTTP/1.1 requests and responses. Operation names are associated to SOAP requests. The interface does not use compression or message transmission optimization mechanism (MTOM). The following cipher suites are allowed in accordance with ECRYPT-CSA recommendations https://www.ecrypt.eu.org/csa/documents/D5.4-FinalAlgKeySizeProt.pdf: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CCM | |
exception handling | The services make use of the standard HTTP 400 error [Bad Request] in any of the following cases:
| |
_GCM_SHA384. | ||
data format |
The following example shows an extract of the content of a JSON file that conforms to the Service Metadata Schema
Code Block | ||||
---|---|---|---|---|
| ||||
"serviceInterface": [{ "serviceInterfaceBinding": { ... "description": "XML 1.0 requests and replies embedded into SOAP 1.2 messages, themselves embedded into HTTP/1.1 requests and responses. Operation names are associated to SOAP requests. The interface does not use compression or message transmission optimization mechanism (MTOM). The following cipher suites are allowed in accordance with ECRYPT-CSA recommendations https://www.ecrypt.eu.org/csa/documents/D5.4-FinalAlgKeySizeProt.pdf: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384." } "messages": [{ ... "schema": { "url": "https://donlon.eu/schema/1.0.0/tobt/donlon-schema.xsd" } } }] }] |
Complete examples are available at Example service description.