<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE spec PUBLIC "-//W3C//DTD Specification V2.2+Addr//EN" "xmlspec.dtd">
<!--
/*
 * Copyright © 2006 World Wide Web Consortium,
 *
 * (Massachusetts Institute of Technology, European Research Consortium for
 * Informatics and Mathematics, Keio University). All Rights Reserved. This
 * work is distributed under the W3C® Document License [1] in the hope that
 * it will be useful, but WITHOUT ANY WARRANTY; without even the implied
 * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
 *
 * [1] http://www.w3.org/Consortium/Legal/2002/copyright-documents-20021231
 */
    -->
<!-- $Id: ws-policy-primer.xml,v 1.1 2006/10/18 16:34:26 jean-gui Exp $ -->
<?xml-stylesheet type='text/xsl' href='xmlspec-policy.xsl'?><spec w3c-doctype="wd" role="public">
  <header>
    <title>Web Services Policy 1.5 - Primer</title>
    <w3c-designation>http://www.w3.org/TR/2006/WD-ws-policy-primer-20061018</w3c-designation>
    <w3c-doctype>W3C Working Draft</w3c-doctype>
    <pubdate>
      <day>18</day>
      <month>October</month>
      <year>2006</year>
    </pubdate>
    <publoc>
      <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/TR/2006/WD-ws-policy-primer-20061018" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://www.w3.org/TR/2006/WD-ws-policy-primer-20061018</loc>
    </publoc> <altlocs>
	<loc xmlns:xlink="http://www.w3.org/1999/xlink" role="pdf" href="ws-policy-primer.pdf" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">PDF</loc>
	<loc xmlns:xlink="http://www.w3.org/1999/xlink" role="postscript" href="ws-policy-primer.ps" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">PostScript</loc>
	<loc xmlns:xlink="http://www.w3.org/1999/xlink" role="xml" href="ws-policy-primer.xml" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">XML</loc>
	<loc xmlns:xlink="http://www.w3.org/1999/xlink" role="plain" href="ws-policy-primer.txt" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">plain text</loc>
    </altlocs>
    <!--
	<prevlocs>
            <loc href="&prevloc;">&prevloc;</loc>
        </prevlocs>
-->
    <latestloc>
      <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/TR/ws-policy-primer" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://www.w3.org/TR/ws-policy-primer</loc>
    </latestloc>
    <authlist>
      <author role="editor">
        <name>Asir S Vedamuthu</name>
        <affiliation>Microsoft Corporation</affiliation>
      </author>
      <author role="editor">
        <name>David Orchard</name>
        <affiliation>BEA Systems, Inc.</affiliation>
      </author>
      <author role="editor">
        <name>Maryann Hondo</name>
        <affiliation>IBM Corporation</affiliation>
      </author>
      <author role="editor">
        <name>Toufic Boubez</name>
        <affiliation>Layer 7 Technologies</affiliation>
      </author>
      <author role="editor">
        <name>Prasad Yendluri</name>
        <affiliation>webMethods, Inc.</affiliation>
      </author>
    </authlist>
    <abstract>
      <p>
        <emph>Web Services Policy 1.5 - Primer</emph> is an introductory description of the Web Services Policy
        language. This document describes the policy language features using numerous examples. The
        associated Web Services Policy 1.5 - Framework and Web Services Policy 1.5 - Attachment specifications provide the
        complete normative description of the Web Services Policy language. </p>
    </abstract> <status id="Status">

<p><emph>This section describes the status of this document at the
time of its publication. Other documents may supersede this
document. A list of current W3C publications and the latest
revision of this technical report can be found in the <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/TR/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">W3C technical reports index</loc> at http://www.w3.org/TR/.</emph></p>

<p>This is the <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/Consortium/Process/tr.html#first-wd" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">First
Public Working Draft</loc> of the Web Services Policy 1.5 - Primer specification. This Working Draft was produced by the members of
the <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/2002/ws/policy/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Web Services Policy Working Group</loc>, which is part of the <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/2002/ws/Activity" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">W3C Web Services Activity</loc>. The Working Group has not yet decided if it will advance this Working Draft to Recommendation Status. It represents a transcription of the <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://lists.w3.org/Archives/Public/public-ws-policy/2006Jul/0001.html" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">original contribution</loc> into the W3C style. Several issues have already been filed on this document and are recorded in <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/Bugs/Public/buglist.cgi?query_format=advanced&amp;short_desc_type=allwordssubstr&amp;short_desc=&amp;product=WS-Policy&amp;component=Primer" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Bugzilla</loc>. The Working Group has not yet considered these issues and how they relate to the Working Group's plans to publish another document current entitled "Guidelines for Policy Assertion Authors".</p>

  <p>Note that this Working Draft does not necessarily represent a consensus of the Working Group. Discussion of this document takes place on the public <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="mailto:public-ws-policy@w3.org" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">public-ws-policy@w3.org</loc>
  mailing list (<loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://lists.w3.org/Archives/Public/public-ws-policy/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">public
  archive</loc>) and within <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/Bugs/Public/buglist.cgi?query_format=advanced&amp;short_desc_type=allwordssubstr&amp;short_desc=&amp;product=WS-Policy&amp;component=Primer" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Bugzilla</loc>.
  Comments on this specification should be made following the <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/2002/ws/policy/#issues" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Description for Issues</loc> of the Working Group.</p>


<p>Publication as a Working Draft does not imply endorsement by the
W3C Membership. This is a draft document and may be updated,
replaced or obsoleted by other documents at any time. It is
inappropriate to cite this document as other than work in
progress.</p>

<p>This document was produced by a group operating under the
<loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/Consortium/Patent-Policy-20040205/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">5
February 2004 W3C Patent Policy</loc>. W3C maintains a <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/2004/01/pp-impl/39293/status" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">public list of any patent disclosures</loc> made in connection with the deliverables of
the group; that page also includes instructions for disclosing a
patent. An individual who has actual knowledge of a patent which
the individual believes contains <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/Consortium/Patent-Policy-20040205/#def-essential" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
Essential Claim(s)</loc> must disclose the information in accordance
with <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/Consortium/Patent-Policy-20040205/#sec-Disclosure" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
section 6 of the W3C Patent Policy</loc>.</p>

</status> <langusage>
      <language id="en-US">English</language>
    </langusage>
    <revisiondesc>
      <p>Last Modified: $Date: 2006/10/18 16:34:26 $</p>
    </revisiondesc>
  </header>
  <body>
    <div1 id="introduction">
      <head>Introduction</head>
      <p>This document, <emph>Web Services Policy 1.5 - Primer</emph>, provides an introductory description of the
        Web Services Policy language and should be read alongside the formal descriptions contained
        in the WS-Policy and WS-PolicyAttachment specifications.</p>
      <p>This document is:</p>
      <ulist>
        <item>
          <p>for policy expression authors who need to understand the syntax of the language and
            understand how to build consistent policy expressions,</p>
        </item>
        <item>
          <p>for policy implementers whose software modules read and write policy expressions
          and</p>
        </item>
        <item>
          <p>for policy assertion authors who need to know the features of the language and
            understand the requirements for describing policy assertions.</p>
        </item>
      </ulist>
      <p>This document assumes a basic understanding of XML 1.0, Namespaces in XML, WSDL 1.1 and
        SOAP.</p>
      <p>Each major section of this document introduces the features of the policy language and
        describes those features in the context of concrete examples.</p>
      <p><specref ref="basic-concepts-policy-expression"/> covers the basic mechanisms of Web
        Services Policy. It describes how to declare and combine capabilities and requirements of a
        Web service as policy expressions, attach policy expressions to WSDL constructs such as
        endpoint and message, and re-use policy expressions.</p>
      <p><specref ref="advanced-concepts-1-policy-expression"/> this is the first advanced section
        that provides more in-depth materials for policy implementers and assertion authors. It
        explains the basics of normalizing policy expressions, merging policies, determining the
        compatibility (intersection) of policies, the policy data model, the policy expression and
        the extensibility points built into the Web Services Policy language.</p>
      <p><specref ref="advanced-concepts-2-policy-assertion-design"/> this is the second advanced
        section that walks through the dimensions of a policy assertion for assertion authors. This
        section describes the role of policy assertions, parts of a policy assertion, when to design
        policy assertions, outlines guidelines for designing policy assertions and enumerates the
        minimum requirements for describing policy assertions in specifications.</p>
      <p>This is a non-normative document and does not provide a definitive specification of the Web
        Services Policy language. <specref ref="xml-namespaces"/> lists all the namespaces that are used in
        this document. (XML elements without a namespace prefix are from the Web Services Policy XML
        Namespace.)</p>
    </div1>
    <div1 id="basic-concepts-policy-expression">
      <head>Basic Concepts: Policy Expression</head>
      <div2 id="web-services-policy">
        <head>Web Services Policy</head>
        <p>Web services are being successfully used for interoperable solutions across various
          industries. One of the key reasons for interest and investment in Web services is that
          they are well-suited to enable service-oriented systems. XML-based technologies such as
          SOAP, XML Schema and WSDL provide a broadly-adopted foundation on which to build
          interoperable Web services. The WS-Policy and WS-PolicyAttachment specifications extend
          this foundation and offer mechanisms to represent the capabilities and requirements of Web
          services as Policies.</p>
        <p>Service metadata is an expression of the visible aspects of a Web service, and consists
          of a mixture of machine- and human-readable languages. Machine-readable languages enable
          tooling. For example, tools that consume service metadata can automatically generate
          client code to call the service. Service metadata can describe different parts of a Web
          service and thus enable different levels of tooling support.</p>
        <p>First, service metadata can describe the format of the payloads that a Web service sends
          and receives. Tools can use this metadata to automatically generate and validate data sent
          to and from a Web service. The XML Schema language is frequently used to describe the
          message interchange format within the SOAP message construct, i.e. to represent SOAP Body
          children and SOAP Header blocks.</p>
        <p>Second, service metadata can describe the ‘how’ and ‘where’ a Web service exchanges
          messages, i.e. how to represent the concrete message format, what headers are used, the
          transmission protocol, the message exchange pattern and the list of available endpoints.
          The Web Services Description Language is currently the most common language for describing
          the ‘how’ and ‘where’ a Web service exchanges messages. WSDL has extensibility points that
          can be used to expand on the metadata for a Web service.</p>
        <p>Third, service metadata can describe the capabilities and requirements of a Web service,
          i.e. representing whether and how a message must be secured, whether and how a message
          must be delivered reliably, whether a message must flow a transaction, etc. Exposing this
          class of metadata about the capabilities and requirements of a Web service enables tools
          to generate code modules for engaging these behaviors. Tools can use this metadata to
          check the compatibility of requesters and providers. Web Services Policy can be used to
          represent the capabilities and requirements of a Web service. </p>
        <p>Web Services Policy is a machine-readable language for representing the capabilities and
          requirements of a Web service. These are called ‘policies’. Web Services Policy offers
          mechanisms to represent consistent combinations of capabilities and requirements, to
          determine the compatibility of policies, to name and reference policies and to associate
          policies with Web service metadata constructs such as service, endpoint and operation. Web
          Services Policy is a simple language that has four elements - <code>Policy, All</code>,
            <code>ExactlyOne</code> and <code>PolicyReference</code> - and one attribute -
            <code>wsp:Optional</code>.</p>
      </div2>
      <div2 id="simple-message">
        <head>Simple Message</head>
        <p>Let us start by considering a SOAP Message in the example below.</p>
        <example>
          <head>SOAP Message</head>
          <eg xml:space="preserve">&lt;soap:Envelope&gt;
  &lt;soap:Header&gt;
   &lt;wsa:To&gt;http://stock.contoso.com/realquote&lt;/wsa:To&gt;
   &lt;wsa:Action&gt;http://stock.contoso.com/GetRealQuote&lt;/wsa:Action&gt;
  &lt;/soap:Header&gt;
  &lt;soap:Body&gt;...&lt;/soap:Body&gt;
&lt;/soap:Envelope&gt;</eg>
        </example>
        <p>This message uses message addressing headers. The <code>wsa:To</code>
          and <code>wsa:Action</code> header blocks identify the destination and the semantics
          implied by this message respectively. (The prefix <code>wsa</code> is used here to denote
          the Web Services Addressing XML Namespace. <specref ref="xml-namespaces"/> lists all the
          namespaces and prefixes that are used in this document.)</p>
        <p>Let us look at a fictitious scenario used in this document to illustrate the features of
          the policy language. Tony is a Web service developer. He is building a client application
          that retrieves real time stock quote information from Contoso, Ltd. Contoso supplies real
          time data using Web services. Tony has Contoso’s advertised WSDL description of these Web
          services. Contoso requires the use of addressing headers for messaging. Just the WSDL
          description is not sufficient for Tony to enable the interaction between his client and
          these Web services. WSDL constructs do not indicate requirements such as the use of
          addressing.</p>
        <p>(<emph>The example companies, organizations, products, domain names, e-mail addresses,
            logos, people, places, and events depicted herein are fictitious. No association with
            any real company, organization, product, domain name, email address, logo, person,
            places, or events is intended or should be inferred.</emph>)</p>
        <p>Providers have the option to convey requirements, such as the use of addressing, through
          word-of-mouth and documentation – as they always have. To interact successfully with this
          service, Tony may have to read any related documentation, call someone at Contoso to
          understand the service metadata, or look at sample SOAP messages and infer such
          requirements or behaviors.</p>
        <p>Web Services Policy is a machine-readable language for representing these Web service
          capabilities and requirements as policies. Policy makes it possible for providers to
          represent such capabilities and requirements in a machine-readable form. For example,
          Contoso may augment the service WSDL description with a policy that requires the use of
          addressing. Tony can use a policy-aware client that understands this policy and engages
          addressing automatically.</p>
        <p>How does Contoso use policy to represent the use of addressing? The example below
          illustrates a policy expression that requires the use of addressing.</p>
        <example>
          <head>Policy Expression</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;wsap:UsingAddressing /&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>The policy expression in the above example consists of a <code>Policy</code> main element
          and a child element <code>wsap:UsingAddressing.</code> Child elements of the
          <code>Policy</code> element are policy assertions. Contoso attaches the above policy
          expression to a WSDL binding description.</p>
        <p>The <code>wsap:UsingAddressing</code> element is a policy assertion. (The prefix
            <code>wsap</code> is used here to denote the Web Services Addressing – WSDL Binding XML
          Namespace.) This assertion identifies the use of Web Services Addressing information
          headers. A policy-aware client can recognize this policy assertion, engage addressing
          automatically, and use headers such as <code>wsa:To</code> and <code>wsa:Action</code> in
          SOAP Envelopes.</p>
        <p>It is important to understand the association between the SOAP message and policy
          expression in the above example. As you can see by careful examination of the message,
          there is no reference to any policy expression. Just as WSDL does not require a message to
          reference WSDL constructs (such as port, binding and portType), Web Services Policy does
          not require a message to reference a policy expression though the policy expression
          describes the message.</p>
      </div2>
      <div2 id="secure-message">
        <head>Secure Message</head>
        <p>In addition to requiring the use of addressing, Contoso requires the use of
          transport-level security for protecting messages.</p>
        <example>
          <head>Secure Message</head>
          <eg xml:space="preserve">&lt;soap:Envelope&gt;
  &lt;soap:Header&gt;
    &lt;wss:Security soap:mustUnderstand="1" &gt;
      &lt;wsu:Timestamp u:Id="_0"&gt;
       &lt;wsu:Created&gt;2006-01-19T02:49:53.914Z&lt;/u:Created&gt;
       &lt;wsu:Expires&gt;2006-01-19T02:54:53.914Z&lt;/u:Expires&gt;
      &lt;/wsu:Timestamp&gt;
    &lt;/wss:Security&gt;
   &lt;wsa:To&gt;http://real.contoso.com/quote&lt;/wsa:To&gt;
   &lt;wsa:Action&gt;http://real.contoso.com/GetRealQuote&lt;/wsa:Action&gt;
  &lt;/soap:Header&gt;
  &lt;soap:Body&gt;...&lt;/soap:Body&gt;
&lt;/soap:Envelope&gt;</eg>
        </example>
        <p>The SOAP message in the example above includes security timestamps that express creation
          and expiration times of this message. Contoso requires the use of security timestamps and
          transport-level security - such as <code>HTTPS</code> – for protecting messages. (The
          prefixes <code>wss</code> and <code>wsu</code> are used here to denote the Web Services
          Security and Utility namespaces.)</p>
        <p>Similar to the use of addressing, Contoso indicates the use of transport-level security
          using a policy expression. The example below illustrates a policy expression that requires
          the use of addressing and transport-level security for securing messages.</p>
        <example>
          <head>Addressing and Security Policy Expression</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;wsap:UsingAddressing /&gt;
  &lt;sp:TransportBinding&gt;...&lt;/sp:TransportBinding&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>The <code>sp:TransportBinding</code> element is a policy assertion. (The prefix
          <code>sp</code> is used here to denote the Web Services Security Policy XML Namespace.)
          This assertion identifies the use of transport-level security – such as <code>HTTPS</code>
          - for protecting messages. Policy-aware clients can recognize this policy assertion,
          engage transport-level security for protecting messages and include security timestamps in
          SOAP Envelopes.</p>
        <p>Tony can use a policy-aware client that recognizes this policy expression and engages
          both addressing and transport-level security automatically.</p>
        <p>For the moment, let us set aside the contents of the <code>sp:TransportBinding</code>
          policy assertion and consider its details in a later section.</p>
      </div2>
      <div2 id="other-assertions">
        <head>Other Assertions</head>
        <p>Thus far, we explored how Contoso uses policy expressions and assertions for representing
          behaviors that must be engaged for a Web service interaction. What is a policy assertion?
          What role does it play? In brief, a policy assertion is a piece of service metadata, and
          it identifies a domain (such as messaging, security, reliability and transaction) specific
          behavior that is a requirement. Contoso uses a policy assertion to convey a condition
          under which they offer a Web service. A policy-aware client can recognize policy
          assertions and engage these behaviors automatically.</p>
        <p>Providers, like Contoso, have the option to combine behaviors for an interaction from
          domains such as messaging, security, reliability and transactions. Using policy
          assertions, providers can represent these behaviors in a machine-readable form. Web
          service developers, like Tony, can use policy-aware clients that recognize these
          assertions and engage these behaviors automatically.</p>
        <p>Who defines policy assertions? Where are they? Policy assertions are defined by Web
          services developers, product designers, protocol authors and users. Like XML Schema
          libraries, policy assertions are a growing collection. Several WS-* protocol
          specifications and applications define policy assertions:</p>
        <ulist>
          <item>
            <p>
              Web Services Security Policy [<bibref ref="WS-SecurityPolicy"/>]
            </p>
          </item>
          <item>
            <p>
              Web Services Reliable Messaging Policy [<bibref ref="WS-RM-Policy"/>]
            </p>
          </item>
          <item>
            <p>
              Web Services Atomic Transaction [<bibref ref="WS-Atomic"/>]
            </p>
          </item>
          <item>
            <p>
              Web Services Business Activity Framework [<bibref ref="WS-BA"/>]
            </p>
          </item>
          <item>
            <p>
              Devices Profile for Web Services [<bibref ref="WS-Device"/>]
            </p>
          </item>
          <item>
            <p>
              A Technical Reference for Windows CardSpace [<bibref ref="WS-WinCard"/>]
            </p>
          </item>
          <item>
            <p>…</p>
          </item>
        </ulist>
      </div2>
      <div2 id="combining-policy-assertions">
        <head>Combining Policy Assertions</head>
        <p>Policy assertions can be combined in different ways to express consistent combinations of
          behaviors (capabilities and requirements). There are three policy operators for combining
          policy assertions: <code>Policy</code>, <code>All</code> and <code>ExactlyOne</code>
            (the <code>Policy</code> operator is a synonym for <code>All).</code></p>
        <p>Let us consider the <code>All</code> operator first. The policy expression in the example
          below requires the use of addressing and transport-level security. There are two policy
          assertions. These assertions are combined using the <code>All</code> operator. Combining
          policy assertions using the <code>Policy</code> or <code>All</code> operator means that
          all the behaviors represented by these assertions are required.</p>
        <example>
          <head>Addressing and Security Policy Expression</head>
          <eg xml:space="preserve">&lt;All&gt;
  &lt;wsap:UsingAddressing /&gt;
  &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
&lt;/All&gt;</eg>
        </example>
        <p>In addition to requiring the use of addressing, Contoso allows either the use of
          transport- or message-level security for protecting messages. Web Services Policy language
          can indicate this choice of behaviors in a machine-readable form. To indicate the use of
          message-level security for protecting messages, Contoso uses the
            <code>sp:AsymmetricBinding</code> policy assertion (see the example below).</p>
        <example>
          <head>Asymmetric Binding Security Policy Assertion</head>
          <eg xml:space="preserve">&lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding&gt;</eg>
        </example>
        <p>The <code>sp:AsymmetricBinding</code> element is a policy assertion. (The prefix
          <code>sp</code> is used here to denote the Web Services Security Policy namespace.) This
          assertion identifies the use of message-level security – such as <emph>WS-Security
          1.0</emph> - for protecting messages. Policy-aware clients can recognize this policy
          assertion, engage message-level security for protecting messages and use headers such
            as <code>wss:Security</code> in SOAP Envelopes.</p>
        <p>To allow the use of either transport- or message-level security, Contoso uses the
            <code>ExactlyOne</code> policy operator. Policy assertions combined using the
            <code>ExactlyOne</code> operator requires exactly one of the behaviors represented by
          the assertions. The policy expression in the example below requires the use of either
          transport- or message-level security for protecting messages.</p>
        <example>
          <head>Transport- or Message-Level Security Policy Expression</head>
          <eg xml:space="preserve">&lt;ExactlyOne&gt;
  &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
  &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding&gt;
&lt;/ExactlyOne&gt;</eg>
        </example>
        <p>Contoso requires the use of addressing and requires the use of either transport- or
          message-level security for protecting messages. They represent this combination using
            the <code>All</code> and <code>ExactlyOne</code> operators. Policy operators can be mixed
          to represent different combinations of behaviors (capabilities and requirements). The
          policy expression in the example below requires the use of addressing and one of
          transport- or message-level security for protecting messages.</p>
        <example>
          <head>Addressing and Transport- OR Message-Level Security Policy Expression</head>
          <eg xml:space="preserve">&lt;All&gt;
  &lt;wsap:UsingAddressing /&gt;
  &lt;ExactlyOne&gt;
    &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
    &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding&gt;
  &lt;/ExactlyOne&gt;
&lt;/All&gt;</eg>
        </example>
        <p>Using this policy expression, Contoso gives the choice of mechanisms for protecting
          messages to clients (or requesters).</p>
      </div2>
      <div2 id="optional-policy-assertion">
        <head>Optional Policy Assertion</head>
        <p>Through a customer survey program, Contoso learns that a significant number of their
          customers prefer to use the Optimized MIME Serialization (as defined in the MTOM
          specification) for sending and receiving messages. Contoso adds optional support for the
          Optimized MIME Serialization and expresses this optional behavior in a machine-readable
          form.</p>
        <p>To indicate the use of optimization using the Optimized MIME Serialization, Contoso uses
          the <code>mtom:OptimizedMimeSerialization</code> policy assertion (see the example below).</p>
        <example>
          <head>Optimized MIME Serialization Policy Assertion</head>
          <eg xml:space="preserve">&lt;mtom:OptimizedMimeSerialization /&gt;</eg>
        </example>
        <p>The <code>mtom:OptimizedMimeSerialization</code> element is a policy assertion. (The
          prefix <code>mtom</code> is used here to denote the Optimized MIME Serialization Policy
          namespace.) This assertion identifies the use of MIME Multipart/Related serialization for
          messages. Policy-aware clients can recognize this policy assertion and engage Optimized
          MIME Serialization for messages. The semantics of this assertion are reflected in
          messages: they use an optimized wire format (MIME Multipart/Related serialization).</p>
        <p>Like Contoso’s optional support for Optimized MIME Serialization, there are behaviors
          that may be engaged (in contrast to must be engaged) for a Web service interaction. A
          service provider will not fault if these behaviors are not engaged. Policy assertions can
          be marked optional to represent behaviors that may be engaged for an interaction. A policy
          assertion is marked as optional using the <code>wsp:Optional</code> attribute. Optional
          assertions represent the capabilities of the service provider as opposed to the
          requirements of the service provider.</p>
        <p>In the example below, the Optimized MIME Serialization policy assertion is marked
          optional. This policy expression allows the use of optimization and requires the use of
          addressing and one of transport- or message-level security.</p>
        <example>
          <head>Optional MIME Serialization, Addressing and Transport- OR Message-Level Security
            Policy Expression</head>
          <eg xml:space="preserve">&lt;All&gt;
  &lt;mtom:OptimizedMimeSerialization wsp:Optional="true"/&gt;
  &lt;wsap:UsingAddressing /&gt;
  &lt;ExactlyOne&gt;
    &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
    &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding&gt;
  &lt;/ExactlyOne&gt;
&lt;/All&gt;</eg>
        </example>
        <p>Contoso is able to meet their customer needs by adding optional support for the Optimized
          MIME Serialization. An optional policy assertion represents a behavior that may be
          engaged.</p>
      </div2>
      <div2 id="nested-policy-expressions">
        <head>Nested Policy Expressions</head>
        <p>In the previous sections, we considered two security policy assertions. In this section,
          let us look at one of the security policy assertions in little more detail.</p>
        <p>As you would expect, securing messages is a complex usage scenario. Contoso uses the
            <code>sp:TransportBinding</code> policy assertion to indicate the use of transport-level
          security for protecting messages. Just indicating the use of transport-level security for
          protecting messages is not sufficient. To successfully interact with Contoso’s Web
          services, Tony must know what transport token to use, what secure transport to use, what
          algorithm suite to use for performing cryptographic operations, etc. The
            <code>sp:TransportBinding</code> policy assertion can represent these dependent
          behaviors. In this section, let us look at how to capture these dependent behaviors in a
          machine-readable form.</p>
        <p>A policy assertion – like the <code>sp:TransportBinding</code> - identifies a visible
          domain specific behavior that is a requirement. Given an assertion, there may be other
          dependent behaviors that need to be enumerated for a Web Service interaction. In the case
          of the <code>sp:TransportBinding</code> policy assertion, Contoso needs to identify the
          use of a transport token, a secure transport, an algorithm suite for performing
          cryptographic operations, etc. A nested policy expression can be used to enumerate such
          dependent behaviors.</p>
        <p>What is a nested policy expression? A nested policy expression is a policy expression
          that is a child element of a policy assertion element. A nested policy expression further
          qualifies the behavior of its parent policy assertion.</p>
        <p>In the example below, the child <code>Policy</code> element is a nested policy expression
          and further qualifies the behavior of the <code>sp:TransportBinding</code> policy
          assertion. The <code>sp:TransportToken</code> is a nested policy assertion of
            the <code>sp:TransportBinding</code> policy assertion. The <code>sp:TransportToken</code>
          assertion requires the use of a specific transport token and further qualifies the
          behavior of the <code>sp:TransportBinding</code> policy assertion (which already requires
          the use of transport-level security for protecting messages).</p>
        <example>
          <head>Transport Security Policy Assertion</head>
          <eg xml:space="preserve">&lt;sp:TransportBinding&gt;
  &lt;Policy&gt;
    &lt;sp:TransportToken&gt;
      &lt;Policy&gt;
        &lt;sp:HttpsToken RequireClientCertificate="false" /&gt;
      &lt;/Policy&gt;
    &lt;/sp:TransportToken&gt;
    &lt;sp:AlgorithmSuite&gt;
      &lt;Policy&gt;
        &lt;sp:Basic256Rsa15/&gt;
      &lt;/Policy&gt;
    &lt;/sp:AlgorithmSuite&gt;
    …
  &lt;/Policy&gt;
&lt;/sp:TransportBinding&gt;</eg>
        </example>
        <p>The <code>sp:AlgorithmSuite</code> is a nested policy assertion of
            the <code>sp:TransportBinding</code> policy assertion. The <code>sp:AlgorithmSuite</code>
          assertion requires the use of the algorithm suite identified by its nested policy
          assertion (<code>sp:Basic256Rsa15</code>
          <emph>in the example above</emph>) and further qualifies the behavior of the
            <code>sp:TransportBinding</code> policy assertion.</p>
        <p>Setting aside the details of using transport-level security, Web service developers, like
          Tony, can use a policy-aware client that recognizes this policy assertion and engages
          transport-level security and its dependent behaviors automatically. That is, the
          complexity of security usage is absorbed by a policy-aware client and hidden from these
          Web service developers.</p>
      </div2>
      <div2 id="Referencing_Policy_Expressions">
        <head>Referencing Policy Expressions</head>
        <p>Contoso has numerous Web service offerings that provide different kinds of real-time
          quotes and book information on securities such as
            <code>GetRealQuote</code>, <code>GetRealQuotes</code> and
          <code>GetExtendedRealQuote</code>. To accommodate the diversity of Contoso’s customers,
          Contoso supports multiple WSDL bindings for these Web services. Contoso provides
          consistent ways to interact with their services and wants to represent these capabilities
          and requirements consistently across all of their offerings without duplicating policy
          expressions multiple times. How? It is simple - a policy expression can be named and
          referenced for re-use.</p>
        <p>A policy expression may be identified by an IRI and referenced for re-use as a standalone
          policy or within another policy expression. There are two mechanisms to identify a policy
          expression: the <code>wsu:Id</code> and <code>Name</code> attributes. A
            <code>PolicyReference</code> element can be used to reference a policy expression
          identified using either of these mechanisms.</p>
        <example>
          <head>Common Policy Expression</head>
          <eg xml:space="preserve">&lt;Policy wsu:Id=”common”&gt;
  &lt;mtom:OptimizedMimeSerialization wsp:Optional="true"/&gt;
  &lt;wsap:UsingAddressing /&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>In the example above, the <code>wsu:Id</code> attribute is used to identify a policy
          expression. The value of the <code>wsu:Id</code> attribute is an XML ID. The relative IRI
          for referencing this policy expression (within the same document) is <code>#common</code>.
          If the policy document IRI is <code>http://real.contoso.com/policy.xml</code> then the
          absolute IRI for referencing this policy expression is
            <code>http://real.contoso.com/policy.xml#common. (</code>The absolute IRI is formed by
          combining the document IRI, <code>#</code> and the value of the <code>wsu:Id</code>
          attribute.)</p>
        <p>For re-use, a <code>PolicyReference</code> element can be used to reference a policy
          expression as a standalone policy or within another policy expression. The example below
          is a policy expression that re-uses the common policy expression above.</p>
        <example>
          <head>PolicyReference to Common Policy Expression</head>
          <eg xml:space="preserve">&lt;PolicyReference URI="#common"/&gt;</eg>
        </example>
        <p>For referencing a policy expression within the same XML document, Contoso uses the
            <code>wsu:Id</code> attribute for identifying a policy expression and an IRI to this ID
          value for referencing this policy expression using a <code>PolicyReference</code> element.</p>
        <p>The example below is a policy expression that re-uses the common policy expression within
          another policy expression. This policy expression requires the use of addressing, one of
          transport- or message-level security for protecting messages and allows the use of
          optimization.</p>
        <example>
          <head>Secure Policy Expression</head>
          <eg xml:space="preserve">&lt;Policy wsu:Id=”secure”&gt;
  &lt;All&gt;
    &lt;PolicyReference URI="#common"/&gt;
    &lt;ExactlyOne&gt;     
      &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
      &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding &gt;
    &lt;/ExactlyOne&gt;
  &lt;/All&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>The <code>Name</code> attribute is an alternate mechanism to identify a policy
          expression. The value of the <code>Name</code> attribute is an absolute IRI and is
          independent of the location of the XML document where the identified policy expression
          resides in. As such, referencing a policy expression using the <code>Name</code> attribute
          relies on additional out of band information. In the example below, the <code>Name</code>
          attribute identifies the policy expression. The IRI of this policy expression is
            <code>http://real.contoso.com/policy/common</code>.</p>
        <example>
          <head>Common Policy Expression</head>
          <eg xml:space="preserve">&lt;Policy Name=”http://real.contoso.com/policy/common”&gt;
  &lt;mtom:OptimizedMimeSerialization wsp:Optional="true"/&gt;
  &lt;wsap:UsingAddressing /&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>The example below is a policy expression that re-uses the common policy expression above.</p>
        <example>
          <head>PolicyReference to Common Policy Expression</head>
          <eg xml:space="preserve">&lt;PolicyReference URI="http://real.contoso.com/policy/common"/&gt;</eg>
        </example>
      </div2>
      <div2 id="attaching-policy-expressions-to-wsdl">
        <head>Attaching Policy Expressions to WSDL</head>
        <p>A majority of Contoso’s customers use WSDL for building their client applications.
          Contoso leverages this usage by attaching policy expressions to the WSDL binding
          descriptions.</p>
        <p>In the example below, the <code>SecureBinding</code> WSDL binding description defines a
          binding for an interface that provides real-time quotes and book information on
          securities. (The prefixes <code>wsdl</code> and <code>tns</code> are used here to denote
          the Web Services Description language XML namespace and target namespace of this WSDL
          document.) To require the use of security for these offerings, Contoso attaches the secure
          policy expression in the previous section to this binding description. The WSDL
            <code>binding</code> element is a common policy attachment point. The secure policy
          expression attached to the <code>SecureBinding</code> WSDL binding description applies to
          any message exchange associated with any <code>port</code> that supports this binding
          description. This includes all the message exchanges described by operations in the
            <code>RealTimeDataInterface</code>.</p>
        <example>
          <head>Secure Policy Expression Attached to WSDL Binding</head>
          <eg xml:space="preserve">&lt;wsdl:binding name="SecureBinding" type="tns:RealTimeDataInterface" &gt;
  &lt;PolicyReference URI="#secure" /&gt;
  &lt;wsdl:operation name="GetRealQuote"&gt;…&lt;/wsdl:operation&gt;
  …
&lt;/wsdl:binding&gt;</eg>
        </example>
        <p>In addition to providing real-time quotes and book information on securities, Contoso
          provides other kinds of data through Web services such as quotes delayed by 20 minutes and
          security symbols through Web services (for example <code>GetDelayedQuote</code>,
            <code>GetDelayedQuotes,</code>
          <code>GetSymbol</code> and <code>GetSymbols</code>). Contoso does not require the use of
          security for these services, but requires the use of addressing and allows the use of
          optimization.</p>
        <example>
          <head>Open Policy Expression Attached to WSDL Binding</head>
          <eg xml:space="preserve">&lt;wsdl:binding name="OpenBinding" type="tns:DelayedDataInterface" &gt;
  &lt;PolicyReference URI="#common" /&gt;
  &lt;wsdl:operation name="GetDelayedQuote"&gt;…&lt;/wsdl:operation&gt;
  …
&lt;/wsdl:binding&gt;</eg>
        </example>
        <p>In the example above, the <code>OpenBinding</code> WSDL binding description defines a
          binding for an interface that provides other kinds of data such as quotes delayed by 20
          minutes and security symbols. To require the use of addressing and allow the use of
          optimization, Contoso attaches the common policy expression in the previous section to
          this binding description. As we have seen in the <code>SecureBinding</code> case, the
          common policy expression attached to the <code>OpenBinding</code> WSDL binding description
          applies to any message exchange associated with any <code>port</code> that supports this
          binding description. This includes all the message exchanges described by operations in
          the <code>DelayedDataInterface</code>.</p>
        <p>As mentioned earlier, providers have the option to convey requirements, such as the use
          of addressing or security, through word-of-mouth and documentation – as they always have.
          The absence of policy expressions in a WSDL document does not indicate anything about the
          capabilities and requirements of a service. The service may have capabilities and
          requirements that can be expressed as policy expressions, such as the use of addressing,
          security and optimization. Or, the service may not have such capabilities and
          requirements. A policy aware client should not conclude anything (other than ‘no claims’)
          about the absence of policy expressions.</p>
        <p>Service providers, like Contoso, can preserve and leverage their investments in WSDL and
          represent the capabilities and requirements of a Web service as policies. A WSDL document
          may specify varying behaviors across Web service endpoints. Web service developers, like
          Tony, can use a policy-aware client that recognizes these policy expressions in WSDL
          documents and engages behaviors automatically for each of these endpoints. Any complexity
          of varying behaviors across Web service endpoints is absorbed by a policy-aware client or
          tool and hidden from these Web service developers.</p>
      </div2>
      <div2 id="policy-automates-web-services-interaction">
        <head>Policy Automates Web Services Interaction</head>
        <p>As you have seen, Web Services Policy is a simple language that has four elements -
            <code>Policy, All</code>, <code>ExactlyOne</code> and <code>PolicyReference</code> - and
          one attribute - <code>wsp:Optional</code>. In practice, service providers, like Contoso,
          use policy expressions to represent combinations of capabilities and requirements. Web
          service developers, like Tony, use policy-aware clients that understand policy expressions
          and engage the behaviors represented by providers automatically. A sizable amount of
          complexity is absorbed by policy-aware clients (or tools) and is invisible to these Web
          service developers.</p>
        <p>Web Services Policy extends the foundation on which to build interoperable Web services,
          hides complexity from developers and automates Web service interactions.</p>
      </div2>
    </div1>
    <div1 id="advanced-concepts-1-policy-expression">
      <head>Advanced Concepts I: Policy Expression</head>
      <p>In <specref ref="basic-concepts-policy-expression"/>, we covered the basics of Web Services
        Policy language. This is the first advanced section that provides more in-depth materials
        for Web Services Policy implementers and assertion authors. This section covers the
        following topics:</p>
      <ulist>
        <item>
          <p>What is a policy expression?</p>
        </item>
        <item>
          <p>What is the normal form of a policy expression and how to normalize policy
          expressions?</p>
        </item>
        <item>
          <p>What is the policy data model?</p>
        </item>
        <item>
          <p>How to select a compatible policy alternative?</p>
        </item>
        <item>
          <p>How to attach policy expressions to WSDL constructs?</p>
        </item>
        <item>
          <p>How to combine policies?</p>
        </item>
        <item>
          <p>What are the extensibility points?</p>
        </item>
      </ulist>
      <div2 id="policy-expression">
        <head>Policy Expression</head>
        <p>A policy expression is the XML representation and interoperable form of a Web Services
          Policy. A policy expression consists of a <code>Policy</code> wrapper element and a
          variety of child and descendent elements. Child and descendent elements from the policy
          language are <code>Policy, All</code>, <code>ExactlyOne</code>
          and <code>PolicyReference</code>. Other child elements of <code>Policy</code>,
          <code>All</code> and <code>ExactlyOne</code> are policy assertions. (The <code>Policy</code>
          element plays two roles: wrapper element and operator.) Policy assertions can contain a
          nested policy expression. Policy assertions can also be marked optional to represent
          behaviors that may be engaged (capabilities) for an interaction. The optional marker is
          the <code>wsp:Optional</code> attribute which is placed on a policy assertion element.</p>
        <p>Let us take a closer look at Contoso’s policy expression (see below) from the previous
          section.</p>
        <example>
          <head>Contoso’s Secure Policy Expression</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;All&gt;
    &lt;mtom:OptimizedMimeSerialization wsp:Optional="true"/&gt;
    &lt;wsap:UsingAddressing /&gt;
    &lt;ExactlyOne&gt;
     &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
     &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding &gt;
    &lt;/ExactlyOne&gt;
  &lt;/All&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>The <code>Policy</code> element is the wrapper element. The <code>All</code>
            and <code>ExactlyOne</code> elements are the policy operators. All other child elements
          of the <code>All</code> and <code>ExactlyOne</code> elements are policy assertions from
          domains such as messaging, addressing, security, reliability and transactions.</p>
      </div2>
      <div2 id="normal-form-for-policy-expressions">
        <head>Normal Form for Policy Expressions</head>
        <p>Web Services Policy language defines two forms of policy expressions: compact and normal
          form. Up to this point, we have used the compact form. The compact form is less verbose
          than the normal form. The compact form is useful for authoring policy expressions. The
          normal form is an intuitive representation of the policy data model. We will look into the
          policy data model in the next section.</p>
        <p>The normal form uses a subset of constructs used in the compact form and follows a simple
          outline for its XML representation:</p>
        <example>
          <head>Normal Form for Policy Expressions</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;ExactlyOne&gt;
    &lt;All&gt;
     &lt;x:AssertionA&gt;…&lt;/x:AssertionA&gt;
     &lt;y:AssertionB&gt;…&lt;/y:AssertionB&gt;
      …
    &lt;/All&gt;
    &lt;All&gt;
     &lt;x:AssertionA&gt;…&lt;/x:AssertionA&gt;
     &lt;z:AssertionC&gt;…&lt;/z:AssertionC&gt;
      …
    &lt;/All&gt;
   … 
  &lt;/ExactlyOne&gt;
&lt;Policy/&gt;</eg>
        </example>
        <p>The normal form consists of a <code>Policy</code> wrapper element and has one child
            <code>ExactlyOne</code> element. This <code>ExactlyOne</code> element has zero or more
            <code>All</code> child elements. Each of these <code>All</code> elements has zero or
          more policy assertions. The <code>PolicyReference</code> element and
          <code>wsp:Optional</code> attribute are not used in the normal form. And, a nested policy
          expression in the normal form has at most one policy alternative.</p>
        <p>The normal form represents a policy as a collection of policy alternatives and a policy
          alternative as a collection of policy assertions in a straight-forward manner.</p>
        <p>The example below is a policy expression in the normal form. This expression contains two
          policy alternatives: one that requires the use of transport-level security and the other
          that requires the use of message-level security for protecting messages.</p>
        <example>
          <head>Transport- or Message-Level Security Policy Expression in Normal Form</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;ExactlyOne&gt;
    &lt;All&gt;
     &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
    &lt;/All&gt;
    &lt;All&gt;
     &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding &gt;
    &lt;/All&gt;
  &lt;/ExactlyOne&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>A policy expression in the compact form can be converted to the normal form. Web Services
          Policy language describes the algorithm for this conversion.</p>
        <p>Let us re-consider Contoso’s policy expression (see the example below). Contoso requires
          the use of addressing and either transport- or message-level security and allows the use
          of optimization. This policy expression is in the compact form and has four policy
          alternatives for requesters:</p>
        <olist>
          <item>
            <p>Requires the use of addressing and transport-level security</p>
          </item>
          <item>
            <p>Requires the use of addressing and message-level security</p>
          </item>
          <item>
            <p>Requires the use of optimization, addressing and transport-level security and</p>
          </item>
          <item>
            <p>Requires the use of optimization, addressing and message-level security.</p>
          </item>
        </olist>
        <example>
          <head>Contoso’s Secure Policy Expression in Compact Form</head>
          <eg xml:space="preserve">&lt;Policy wsu:Id=”secure”&gt;
  &lt;All&gt;
    &lt;PolicyReference URI=”#common”/&gt;
    &lt;ExactlyOne&gt;
     &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
     &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding &gt;
    &lt;/ExactlyOne&gt;
  &lt;/All&gt;
&lt;/Policy&gt;

&lt;Policy wsu:Id=”common”&gt;
  &lt;mtom:OptimizedMimeSerialization wsp:Optional="true"/&gt;
  &lt;wsap:UsingAddressing /&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>Let us look at the normal form for this policy expression. The example below is Contoso’s
          policy expression in the normal form. As you can see, the compact form is less verbose
          than the normal form. The normal form represents a policy as a collection of policy
          alternatives. Each of the <code>All</code> operators is a policy alternative. There are
          four policy alternatives in the normal form. These alternatives map to bullets (a) through
          (d) above.</p>
        <example>
          <head>Contoso’s Policy Expression in Normal Form</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;ExactlyOne&gt;
    &lt;All&gt; &lt;!-- - - - - - - - - - - - - - Policy Alternative (a) --&gt;
       &lt;wsap:UsingAddressing/&gt;
       &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
    &lt;/All&gt;
    &lt;All&gt; &lt;!-- - - - - - - - - - - - - - Policy Alternative (b) --&gt;
      &lt;wsap:UsingAddressing/&gt;
      &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding &gt;
    &lt;/All&gt;
    &lt;All&gt; &lt;!-- - - - - - - - - - - - - - Policy Alternative (c) --&gt;
      &lt;mtom:OptimizedMimeSerialization /&gt;
       &lt;wsap:UsingAddressing/&gt;
       &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
    &lt;/All&gt;
    &lt;All&gt; &lt;!-- - - - - - - - - - - - - - Policy Alternative (d) --&gt;
      &lt;mtom:OptimizedMimeSerialization /&gt;
      &lt;wsap:UsingAddressing/&gt;
      &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding&gt;
    &lt;/All&gt;
  &lt;/ExactlyOne&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>The <code>wsp:Optional</code> attribute, nested policy expression and
            <code>Policy</code><code>Reference</code> element are converted to their corresponding
          normal form. The <code>wsp:Optional</code> attribute converts to two alternatives, one
          with and the other without the assertion. A policy alternative containing an assertion
          with a nested policy expression that has multiple policy alternatives converts to multiple
          policy alternatives where the assertion contains a nested policy expression that has at
          most one policy alternative.</p>
        <p>The <code>PolicyReference</code> element is replaced with its referenced policy
          expression. Just as other service metadata languages, Web Services Policy does not mandate
          any specific policy retrieval mechanism. Any combination of any retrieval mechanisms in
          any order may be used for referencing policy expressions. Example retrieval mechanisms
          are:</p>
        <ulist>
          <item>
            <p>Do nothing. A policy expression with the referenced IRI is already known to be
              available in a local cache or chip (embedded systems).</p>
          </item>
          <item>
            <p>Use the referenced IRI and retrieve an existing policy expression from the containing
              XML document: a policy element with an XML ID.</p>
          </item>
          <item>
            <p>Use the referenced IRI and retrieve a policy expression from some policy repository
              (local or remote) or catalog. Policy tools may use any protocols (say Web Services
              Metadata Exchange) for such metadata retrieval. These protocols may require additional
              out of band information.</p>
          </item>
          <item>
            <p>Attempt to resolve the referenced IRI on the Web. This may resolve to a policy
              element or a resource that contains a policy element.</p>
          </item>
        </ulist>
        <p>If the referenced policy expression is in the same XML document as the reference, then
          the policy expression should be identified using the <code>wsu:Id</code> (XML ID)
          attribute and referenced using an IRI reference to this XML ID value.</p>
      </div2>
      <div2 id="policy-data-model">
        <head>Policy Data Model</head>
        <p>In the previous section, we considered the normal form for policy expressions. As we
          discussed, the normal form represents a policy as a collection of policy alternatives. In
          this section, let us look at the policy data model.</p>
        <p>Contoso uses a policy to convey the conditions for an interaction. Policy-aware clients,
          like the one used by Tony (as explained earlier in <specref ref="basic-concepts-policy-expression"/>), view policy as an unordered collection of
          zero or more policy alternatives. A policy alternative is an unordered collection of zero
          or more policy assertions. A policy alternative represents a collection of behaviors or
          requirements or conditions for an interaction. In simple words, each policy alternative
          represents a set of conditions for an interaction. The diagram below describes the policy
          data model.</p>
        <graphic xmlns:xlink="http://www.w3.org/1999/xlink" alt="WS-Policy Data Model" source="ws-policy-data-model.jpg" xlink:type="simple" xlink:show="embed" xlink:actuate="onLoad"/>
        <p>A policy-aware client uses a policy to determine whether one of these policy alternatives
          (i.e. the conditions for an interaction) can be met in order to interact with the
          associated Web Service. Such clients may choose any of these policy alternatives and must
          choose exactly one of them for a successful Web service interaction. Clients may choose a
          different policy alternative for a subsequent interaction. It is important to understand
          that a policy is a useful piece of metadata in machine-readable form that enables tooling,
          yet is not required for a successful Web service interaction. Why? Web service developers,
          like Tony, could use the documentation, talk to the service providers, or look at message
          traces to infer these conditions for an interaction. Developers continue to have these
          options, as they always had.</p>
        <p>As we discussed, a policy assertion identifies a domain specific behavior or requirement
          or condition. A policy assertion has a QName that identifies its behavior or requirement
          or condition. In the XML representation, the QName of the assertion element is the QName
          of the policy assertion. A policy assertion may contain assertion parameters and a nested
          policy.</p>
        <p>The assertion parameters are the opaque payload of an assertion. Parameters carry
          additional useful pieces of information necessary for engaging the behavior described by
          an assertion. In the XML representation, the child elements and attributes of an assertion
          are the assertion parameters.</p>
        <p>We considered nested policy expressions in the context of a security usage scenario. Let
          us look at its shape in the policy data model. In the normal form, a nested policy is a
          policy that has at most one policy alternative and is owned by its parent policy
          assertion. The policy alternative in a nested policy represents a collection of dependent
          behaviors or requirements or conditions that qualify the behavior of its parent policy
          assertion.</p>
        <p>A policy-aware client supports a policy assertion if the client engages the behavior or
          requirement or condition indicated by the assertion. A policy-aware client supports a
          policy alternative if the client engages the behaviors represented by all the assertions
          in the alternative. A policy-aware client supports a policy if the client engages the
          behaviors represented by at least one of the policy alternatives.</p>
        <p>In the previous section, we saw how the normal form of a policy expression represents a
          policy as a collection of policy alternatives. By policy language design, the normal form
          of a policy expression directly maps to the policy data model:</p>
        <ulist>
          <item>
            <p>Each child element of <code>Policy/ExactlyOne/All</code> maps to a policy
            assertion.</p>
          </item>
          <item>
            <p>Each <code>Policy/ExactlyOne/All</code> element and policy assertions which
              correspond to its children map to a policy alternative.</p>
          </item>
          <item>
            <p>The <code>Policy/ExactlyOne</code> element maps to a collection of policy
              alternatives.</p>
          </item>
          <item>
            <p>The <code>Policy</code> wrapper element and policy alternatives which correspond to
                the <code>Policy/ExactlyOne</code> element map to a policy.</p>
          </item>
        </ulist>
        <p>The diagram below describes this mapping from the normal form of a policy expression to
          the policy data model.</p>
        <graphic xmlns:xlink="http://www.w3.org/1999/xlink" alt="Mapping from Normal Form to Policy Data Model" source="normal-form-2-data-model.jpg" xlink:type="simple" xlink:show="embed" xlink:actuate="onLoad"/>
      </div2>
      <div2 id="compatible-policies">
        <head>Compatible Policies</head>
        <p>A provider, like Contoso, and a requester, like Tony’s policy-aware client, may represent
          their capabilities and requirements for an interaction as policies and want to limit their
          message exchanges to mutually compatible policies. Web Services Policy defines an
          intersection mechanism for selecting compatible policy alternatives when there are two or
          more policies.</p>
        <p>The example below is a copy of Contoso’s policy expression (from <specref ref="normal-form-for-policy-expressions"/>). As we saw before, Contoso offers four
          policy alternatives. Of them, one of the policy alternatives requires the use of
          addressing and transport-level security.</p>
        <example>
          <head>Contoso’s Policy Expression</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;ExactlyOne&gt;
    &lt;All&gt; &lt;!-- - - - - - - - - -  Contoso’s Policy Alternative (a) --&gt;
       &lt;!-- - - - - - - - - - - - - - - - - - Policy Assertion (c1) --&gt;
       &lt;wsap:UsingAddressing/&gt;
       &lt;!-- - - - - - - - - - - - - - - - - - Policy Assertion (c2) --&gt;
      &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
    &lt;/All&gt;
    …
  &lt;/ExactlyOne&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>Tony’s organization requires the use of addressing and transport-level security for any
          interaction with Contoso’s Web services. Tony represents these behaviors using a policy
          expression illustrated in the example below in normal form. This policy expression
          contains one policy alternative that requires the use of addressing and transport-level
          security.</p>
        <example>
          <head>Tony’s Policy Expression in Normal Form</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;ExactlyOne&gt;
    &lt;All&gt; &lt;!-- - - - - - - - - - - - - -  Tony’s Policy Alternative --&gt;
       &lt;!-- - - - - - - - - - - - - - - - - - Policy Assertion (t1) --&gt;
     &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
       &lt;!-- - - - - - - - - - - - - - - - - - Policy Assertion (t2) --&gt;
      &lt;wsap:UsingAddressing/&gt;
    &lt;/All&gt;
  &lt;/ExactlyOne&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>Tony lets his policy-aware client select a compatible policy alternative in Contoso’s
          policy. How does this client select a compatible policy alternative? It is simple – it
          uses the policy intersection. That is, Tony’s policy-aware client uses these two policy
          expressions (Tony’s and Contoso’s) and the policy intersection to select a compatible
          policy alternative for this interaction. Let us look at the details of policy
          intersection.</p>
        <p>For two policy assertions to be compatible they must have the same QName. And, if either
          assertion has a nested policy, both assertions must have a nested policy and the nested
          policies must be compatible. For example, policy assertions (c2) and (t1) have the same
          QName, <code>sp:TransportBinding</code>. For this discussion, let us assume that these two
          assertions have compatible nested policies. These two assertions are compatible because
          they have the same QName and their nested policies are compatible.</p>
        <p>Two policy alternatives are compatible if each policy assertion in one alternative is
          compatible with a policy assertion in the other and vice-versa. For example, policy
          assertions (c1) and (c2) in Contoso’s policy alternative are compatible with policy
          assertions (t2) and (t1) in Tony’s policy alternative. Contoso’s policy alternative (a)
          and Tony’s policy alternative are compatible because assertions in these two alternatives
          are compatible.</p>
        <p>Two policies are compatible if a policy alternative in one is compatible with a policy
          alternative in the other. For example, Contoso’s policy alternative (a) is compatible with
          Tony’s policy alternative. Contoso’s policy and Tony’s policy are compatible because one
          of Contoso’s policy alternative is compatible with Tony’s policy alternative.</p>
        <p>For this interaction, Tony’s policy-aware client can use policy alternative (a) to
          satisfy Contoso’s conditions or requirements.</p>
        <p>Similarly, policy intersection can be used to check if providers expose endpoints that
          conform to a standard policy. For example, a major retailer might require all their
          supplier endpoints to be compatible with an agreed upon policy.</p>
      </div2>
      <div2 id="attaching-policy-expressions-to-wsdl2">
        <head>Attaching Policy Expressions to WSDL</head>
        <p>In <specref ref="basic-concepts-policy-expression"/>, we looked into how Contoso attached
          their policy expressions to the WSDL <code>binding</code> element. In addition to the WSDL
            <code>binding</code> element, a policy expression can be attached to other WSDL elements
          such as <code>service</code>, <code>port</code>, <code>operation</code>
          and <code>message</code>. These elements are the WSDL policy attachment points in a WSDL
          document.</p>
        <p>The WSDL attachment points are partitioned (as illustrated below) into four policy
          subjects: message, operation, endpoint and service. When attached, capabilities and
          requirements represented by a policy expression apply to a message exchange or message
          associated with (or described by) a policy subject.</p>
        <graphic xmlns:xlink="http://www.w3.org/1999/xlink" alt="Policy Subjects and Effective Policy in WSDL" source="policy-subjects-in-wsdl.jpg" xlink:type="simple" xlink:show="embed" xlink:actuate="onLoad"/>
        <p>The WSDL <code>service</code> element represents the service policy subject. Policy
          expressions associated with a service policy subject apply to any message exchange using
          any of the endpoints offered by that service.</p>
        <p>The WSDL <code>port</code>, <code>binding</code> and <code>portType</code> elements
          collectively represent the endpoint policy subject. Policy expressions associated with an
          endpoint policy subject apply to any message exchange made using that endpoint.</p>
        <p>The WSDL <code>binding/operation</code> and <code>portType/operation</code> elements
          collectively represent the operation policy subject. Policy expressions associated with an
          operation policy subject apply to the message exchange defined by that operation.</p>
        <p>The WSDL <code>binding/operation/input</code>, <code>portType/operation/input</code>, and
            <code>message</code> element collectively represent the message policy subject for the
          input message. The WSDL <code>binding/operation/output</code>,
            <code>portType/operation/output</code>, and <code>message</code> element collectively
          represent the message policy subject for the output message. The WSDL
            <code>binding/operation/fault</code>, <code>portType/operation/fault</code>, and
            <code>message</code> element collectively represent the message policy subject for the
          fault message. Policy expressions associated with a message policy subject apply only to
          that message.</p>
        <p>In the example below, the policy expression is attached to an endpoint policy subject.</p>
        <example>
          <head>Contoso’s Policy Expression Attached to WSDL binding Element</head>
          <eg xml:space="preserve">&lt;wsdl:binding name="SecureBinding" type="tns:RealTimeDataInterface" &gt;
  &lt;PolicyReference URI="#secure" /&gt;
  &lt;wsdl:operation name="GetRealQuote"&gt;…&lt;/wsdl:operation&gt;
  …
&lt;/wsdl:binding&gt;</eg>
        </example>
        <p>If multiple policy expressions are attached to WSDL elements that collectively represent
          a policy subject then the effective policy of these policy expressions applies. The
          effective policy is the combination of the policy expressions that are attached to the
          same policy subject. For example, the effective policy of an endpoint policy subject is
          the combination of policy expressions attached to a WSDL <code>port</code> element, policy
          expressions attached to the <code>binding</code> element referenced by this port, and
          policy expressions attached to the <code>portType</code> element that is supported by this
          port. Let us consider how to combine policy expressions in the next section.</p>
        <p>Most of the policy assertions are designated for the endpoint, operation or message
          policy subject. The commonly used WSDL attachment points are:</p>
        <table id="Table2" border="1" cellspacing="0" cellpadding="5">
          <tbody>
            <tr>
              <th rowspan="1" colspan="1">Policy Subject</th>
              <td rowspan="1" colspan="1">Commonly used attachment point (s)</td>
            </tr>
            <tr>
              <th rowspan="1" colspan="1">Endpoint</th>
              <td rowspan="1" colspan="1"><code>binding</code> element</td>
            </tr>
            <tr>
              <th rowspan="1" colspan="1">Operation</th>
              <td rowspan="1" colspan="1"><code>binding/operation</code> element</td>
            </tr>
            <tr>
              <th rowspan="1" colspan="1">Message</th>
              <td rowspan="1" colspan="1"><code>binding/operation/input</code> and <code>binding/operation/output</code>
                elements</td>
            </tr>
          </tbody>
        </table>
      </div2>
      <div2 id="combine-policies">
        <head>Combine Policies</head>
        <p>Multiple policy expressions may be attached to WSDL constructs. Let us consider how
          Contoso could have used multiple policy expressions in a WSDL document. In the example
          below, there are two policy expressions <code>#common2</code> and <code>#secure2</code>
          attached to the <code>SecureBinding</code> WSDL binding and <code>RealTimeDataPort</code>
          WSDL port descriptions.</p>
        <example>
          <head>Multiple Policy Expressions Attached to Endpoint Policy Subject </head>
          <eg xml:space="preserve">&lt;Policy wsu:Id=”common2”&gt;
  &lt;mtom:OptimizedMimeSerialization wsp:Optional="true"/&gt;
  &lt;wsap:UsingAddressing /&gt;
&lt;/Policy&gt;
&lt;Policy wsu:Id=”secure2”&gt;
  &lt;ExactlyOne&gt;
   &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
   &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding &gt;
  &lt;/ExactlyOne&gt;
&lt;/Policy&gt;
&lt;wsdl:binding name="SecureBinding" type="tns:RealTimeDataInterface" &gt;
  &lt;PolicyReference URI="#secure2" /&gt;
  &lt;wsdl:operation name="GetRealQuote"&gt;…&lt;/wsdl:operation&gt;
  …
&lt;/wsdl:binding&gt;
&lt;wsdl:service name=”RealTimeDataService”&gt;
  &lt;wsdl:port name=”RealTimeDataPort” binding=”tns:SecureBinding”&gt;
    &lt;PolicyReference URI="#common2"/&gt;
    …
  &lt;/wsdl:port&gt;
&lt;/wsdl:service&gt;</eg>
        </example>
        <p>As we discussed before, the WSDL <code>port</code>, <code>binding</code> and
            <code>portType</code> elements collectively represent the endpoint policy subject. In
          the example above, the <code>#common2</code> and <code>#secure2</code> policy expressions
          attached to the <code>SecureBinding</code> WSDL binding and <code>RealTimeDataPort</code>
          WSDL port descriptions collectively apply to any message exchange associated with the
            <code>RealTimeDataPort</code> WSDL port.</p>
        <p>As in the example above, multiple policy expressions may be attached to Web service
          constructs that collectively represent a single policy subject. When there are multiple
          policy expressions attached to the same policy subject then the effective policy or
          combination of these policy expressions apply to the associated policy subject.</p>
        <p>The effective policy is the combination of two or more policy expressions attached to the
          same policy subject. The combination of two policy expressions, also known as the merged
          policy expression, is a new policy expression that combines these two policy expressions
          using the <code>All</code> policy operator.</p>
        <p>The policy expression below is the combination of the two policy expressions attached to
          the <code>SecureBinding</code> WSDL binding and <code>RealTimeDataPort</code> WSDL port
          descriptions. The <code>#common2</code> policy expression has two policy alternatives. The
          <code>#secure2</code> policy expression has two policy alternatives. The
          combination of these two policies is equivalent to Contoso’s secure policy in <specref ref="basic-concepts-policy-expression"/> and has four policy alternatives. In other
          words, the combination of two policies is the cross product of alternatives in these two
          policies.</p>
        <example>
          <head>Effective Policy of the Endpoint Policy Subject in the Previous Example</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;All&gt;
    &lt;Policy&gt;
     &lt;mtom:OptimizedMimeSerialization wsp:Optional="true"/&gt;
      &lt;wsap:UsingAddressing/&gt;
    &lt;/Policy&gt;
    &lt;Policy&gt;
      &lt;ExactlyOne&gt;
       &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
       &lt;sp:AsymmetricBinding&gt;…&lt;/sp:AsymmetricBinding &gt;
      &lt;/ExactlyOne&gt;
    &lt;/Policy&gt;
  &lt;/All&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>Of course, the above policy expression can be normalized. There are four policy
          alternatives in the normal form. As we have seen in the policy data model, a policy is an
          unordered collection of policy alternatives. That is, the order of policy alternatives is
          insignificant. Therefore, the order of combining these policy expressions is
          insignificant.</p>
      </div2>
      <div2 id="extensibility-and-versioning">
        <head>Extensibility and Versioning</head>
        <p>Web Services Policy language is an extensible language by design. The
            <code>Policy</code>, <code>ExactlyOne</code>, <code>All</code>
          and <code>PolicyReference</code> elements are extensible. The <code>Policy</code>,
            <code>ExactlyOne</code> and <code>All</code> elements allow child element and attribute
          extensibility. The <code>PolicyReference</code> element allows attribute extensibility.
          Extensions must not use the policy language XML namespace name. A consuming processor
          processes known attributes and elements, ignores unknown attributes and treats unknown
          elements as policy assertions.</p>
        <p>Web Services Policy language enables simple versioning practices that allow requesters to
          continue the use of any older policy alternatives in a backward compatible manner. This
          allows service providers, like Contoso, to deploy new behaviors using additional policy
          assertions without breaking compatibility with clients that rely on any older policy
          alternatives.</p>
        <p>The example below represents a Contoso version 1 policy expression. This expression
          requires the use of addressing and transport-level security for protecting messages. </p>
        <example>
          <head>Contoso’s Version 1 Policy Expression</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;ExactlyOne&gt;
    &lt;All&gt;
      &lt;wsap:UsingAddressing/&gt;
     &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
    &lt;/All&gt;
  &lt;/ExactlyOne&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>Over time, Contoso adds support for advanced behaviors: requiring the use of addressing
          and message-level security for protecting messages. They added this advanced support
          without breaking compatibility with requesters that rely on addressing and transport-level
          security. The example below is Contoso’s version 2 policy expression. In this version,
          Contoso’s adds a new policy alternative that requires the use of addressing and
          message-level security. The clients that rely on addressing and transport-level security
          may continue to interact with Contoso’s using the old policy alternative. Of course, these
          clients have the option to migrate from using old policy alternatives to new policy
          alternatives.</p>
        <example>
          <head>Contoso’s Version 2 Policy Expression</head>
          <eg xml:space="preserve">&lt;Policy&gt;
  &lt;ExactlyOne&gt;
    &lt;All&gt;
      &lt;wsap:UsingAddressing/&gt;
     &lt;sp:TransportBinding&gt;…&lt;/sp:TransportBinding&gt;
    &lt;/All&gt;
    &lt;All&gt; &lt;!-- - - - - - - - - - - - - - - - NEW Policy Alternative --&gt;
      &lt;wsap:UsingAddressing/&gt;
      &lt;sp:AsymmetricBinding&gt;…&lt;/sp: AsymmetricBinding &gt;
    &lt;/All&gt;
  &lt;/ExactlyOne&gt;
&lt;/Policy&gt;</eg>
        </example>
        <p>When Contoso added support for advanced behaviors, they spent time to plan for the
          continued support for existing clients, the smooth migration from using current to
          advanced behaviors, and the switch to use only the advanced behaviors in the near future
          (i.e. sun-setting current behaviors). In this versioning scenario, policy can be used to
          represent current and advanced behaviors in a non-disruptive manner: no immediate changes
          to existing clients are required and these clients can smoothly migrate to new
          functionality when they choose to. This level of versioning support in policy enables the
          same class of versioning best practices built into WSDL constructs such as service, port
          and binding.</p>
        <p>Let us look at tooling for unknown policy assertions. As service providers, like Contoso,
          incrementally deploy advanced behaviors, some requesters may not recognize these new
          policy assertions. As discussed before, these requesters may continue to interact using
          old policy alternatives. New policy assertions will emerge to represent new behaviors and
          slowly become part of everyday interoperable interaction between requesters and providers.
          Today, most tools use a practical tolerant strategy to process new or unrecognized policy
          assertions. These tools consume such unrecognized assertions and designate these for user
          intervention. As you would recognize, there is nothing new in this practice. This is
          similar to how a proxy generator that generates code from WSDL creates code for all the
          known WSDL constructs and allows Web service developers to fill in code for custom or
          unknown constructs in the WSDL.</p>
      </div2>
    </div1>
    <div1 id="advanced-concepts-2-policy-assertion-design">
      <head>Advanced Concepts II: Policy Assertion Design</head>
      <p>In the previous section, we covered in-depth materials for Web Services Policy
        implementers. This is the second advanced section that walks through the dimensions of a
        policy assertion for assertion authors. This section covers the following topics:</p>
      <ulist>
        <item>
          <p>What is the role of policy assertions?</p>
        </item>
        <item>
          <p>What are the parts of a policy assertion?</p>
        </item>
        <item>
          <p>When to design policy assertions?</p>
        </item>
        <item>
          <p>What are the guidelines for designing policy assertions?</p>
        </item>
        <item>
          <p>What are the minimum requirements for describing policy assertions?</p>
        </item>
      </ulist>
      <div2 id="role-of-policy-assertions">
        <head>Role of Policy Assertions</head>
        <p>As you have seen, Web Services Policy is a simple language that has four elements
            -<code>Policy, All</code>, <code>ExactlyOne</code> and <code>PolicyReference</code> -
          and one attribute - <code>wsp:Optional</code>. Policy is a flexible language to represent
          consistent combinations of behaviors using policy operators: <code>Policy, All</code> and
            <code>ExactlyOne.</code> Policy is an expressive language and capable of representing
          behaviors from a variety of domains. Let us look for the key parts that unlock this
          potential.</p>
        <p>Service providers combine behaviors for an interaction from domains such as messaging,
          security, reliability and transactions. To enable clients to engage these behaviors,
          services require some way to advertise these behaviors. Providers require machine readable
          metadata pieces that identify these behaviors. A policy assertion is a machine-readable
          metadata piece that requires the use of a behavior identified by the assertion. Web
          service developers can use policy-aware clients that recognize these assertions and engage
          their corresponding behaviors automatically.</p>
        <p>Policy assertions are the key parts and play a central role to unlock the potential
          offered by the Web Services Policy language. Assertions are defined by product designers,
          protocol authors, protocol implementers and Web service developers.</p>
        <p>Policy assertion authors identify behaviors required for Web services interactions and
          represent these behaviors as policy assertions. By designing policy assertions, assertion
          authors make a significant contribution to automate Web services interactions and enable
          advanced behaviors.</p>
      </div2>
      <div2 id="parts-of-a-policy-assertion">
        <head>Parts of a Policy Assertion</head>
        <p>As we discussed, a policy assertion identifies a domain specific behavior or requirement
          or condition. A policy assertion has a QName that identifies its behavior or requirement
          or condition. A policy assertion may contain assertion parameters and a nested policy.</p>
        <p>Let us look at the anatomy of a policy assertion from the security domain. The policy
          expression in the diagram below uses the <code>sp:IssuedToken</code> policy assertion.
          This assertion illustrates the use of assertion parameters and nested policy.</p>
        <graphic xmlns:xlink="http://www.w3.org/1999/xlink" alt="sp:IssuedToken Policy Assertion" source="policy-assertion.jpg" xlink:type="simple" xlink:show="embed" xlink:actuate="onLoad"/>
        <p>The <code>sp:IssuedToken</code> element is a policy assertion that identifies the use of
          a security token – such as SAML token - issued by a third party for protecting messages. A
          policy assertion is an XML element. The QName of this element represents the behavior
          identified by this policy assertion.</p>
        <p>The <code>sp:IssuedToken</code> policy assertion has three parameters:
            <code>@sp:IncludeToken</code>, <code>sp:Issuer</code>
            and <code>sp:RequestSecurityTokenTemplate</code>.</p>
        <p>The <code>sp:IncludeToken</code> attribute is a parameter that contains information on
          whether a security token should be included in messages or an external reference to the
          key of this security token should be used. The <code>sp:Issuer</code> parameter is an
          endpoint reference to a security token issuer. The
          <code>sp:RequestSecurityTokenTemplate</code> parameter contains the necessary information
          to request a security token from the specified issuer. Parameters are the opaque payload
          of a Policy Assertion, carry useful information for engaging the behavior described by an
          assertion and are preserved through policy processing such as normalize, merge and
          intersection. requesters may use policy intersection to select a compatible policy
          alternative for an interaction. Assertion parameters do not affect the outcome of policy
          intersection.</p>
        <p>For the <code>sp:Issuer</code> policy assertion parameter, the assertion author uses the
          natural XML structural relationships (the child elements and attributes) and encodes the
          relationship between an assertion and its parameters in a machine readable form. Assertion
          parameters may be represented as child XML elements or attributes of an assertion. The
          policy language allows assertion authors to strongly tie the relationship between an
          assertion and its parameters using the natural XML structural relationships.</p>
        <p>The <code>sp:IssuedToken</code> policy assertion has a nested policy expression. The
            <code>sp:RequireInternalReference</code> element is a nested policy assertion of the
            <code>sp:IssuedToken</code> policy assertion. The
          <code>sp:RequireInternalReference</code> assertion requires the use of an internal
          reference for referencing the issued token. A nested policy assertion further qualifies a
          dependent behavior of its parent policy assertion. As mentioned earlier, requesters may
          use policy intersection to select a compatible policy alternative for an interaction.
          Nested policy assertions affect the outcome of policy intersection.</p>
        <p>The <code>sp:IssuedToken</code> security policy assertion identifies a visible domain
          specific behavior: the use of a security token – such as SAML token - issued by a third
          party for protecting messages. This behavior is relevant to a Web service interaction. For
          the sake of discussion, let us assume that Contoso requires the use of a SAML token issued
          by a third party. Service providers, like Contoso, must convey this usage and all the
          necessary information to obtain this security token for Web service developers. This is a
          key piece of metadata for a successful interaction with Contoso’s Web services.</p>
      </div2>
      <div2 id="when-to-design-policy-assertions">
        <head>When to design policy assertions?</head>
        <p>As we illustrated in the previous section, requiring the use of a security token issued
          by a third party is represented as a policy assertion. In simple words, a policy assertion
          identifies a domain specific behavior:</p>
        <ulist>
          <item>
            <p>That is a requirement</p>
          </item>
          <item>
            <p>That is relevant to an interoperable Web service interaction</p>
          </item>
          <item>
            <p>That is relevant to an interaction that involves two or more Web service
            participants</p>
          </item>
          <item>
            <p>That applies to its associated policy subject such as service, endpoint, operation
              and message.</p>
          </item>
        </ulist>
        <p>Given that interoperability and automation are the motivations, policy assertions that
          represent opt-in, shared and visible behaviors are useful pieces of metadata. Such
          assertions enable tooling and improve interoperability. The key to understanding when to
          design policy assertions is to have clarity on the characteristics of a behavior
          represented by a useful policy assertion: opt-in, shared and visible.</p>
        <div3 id="opt-in-behavior">
          <head>Opt-in behavior</head>
          <p>An opt-in behavior refers to a requirement that providers and requesters must
            deliberately choose to engage for a successful web service interaction. Examples of such
            behaviors are the use of optimization, message-level security, reliable messaging and
            atomic transaction. Policy assertions are not necessary to interoperate on widespread
            assumed behaviors. An example of an assumed behavior is the use of UTF-8 or UTF-16 text
            encoding for XML messages. </p>
        </div3>
        <div3 id="shared-behavior">
          <head>Shared behavior</head>
          <p>A shared behavior refers to a requirement that is relevant to an interoperable Web
            service interaction and involves two or more participants. If an assertion only
            describes one participant’s behavior (non-shared behavior) then the assertion is not
            relevant to an interoperable interaction. Non-shared behaviors do not add any value for
            tooling or interoperability. An example of a non-shared behavior is the use of logging
            or auditing by the provider.</p>
          <p>requesters may use the policy intersection to select a compatible policy alternative
            for a Web service interaction. If an assertion only describes one participant’s behavior
            then this assertion will not be present in the other participants’ policy and the policy
            intersection will unnecessarily produce false negatives.</p>
        </div3>
        <div3 id="visible-behavior">
          <head>Visible behavior</head>
          <p>A visible behavior refers to a requirement that manifests on the wire. Web services
            provide interoperable machine-to-machine interaction among disparate systems. Web
            service interoperability is the capability of disparate systems to exchange data using
            common data formats and protocols such as messaging, security, reliability and
            transaction. Such data formats and protocols manifest on the wire. Providers and
            requesters only rely on these wire messages that conform to such formats and protocols
            for interoperability. If an assertion describes a behavior that does not manifest on the
            wire then the assertion is not relevant to an interoperable interaction.</p>
          <p>For example, say an assertion describes the privacy notice information of a provider
            and there is an associated regulatory safeguard in place on the provider’s side. Such
            assertions may represent business or regulatory level metadata but do not add any value
            to interoperability.</p>
          <p>If an assertion has no wire- or message-level visible behavior, then the interacting
            participants may require some sort of additional non-repudiation mechanism to indicate
            compliance with the assertion. Introducing an additional non-repudiation mechanism adds
            unnecessary complexity to processing a policy assertion.</p>
        </div3>
      </div2>
      <div2 id="guidelines-for-designing-assertions">
        <head>Guidelines for Designing Assertions</head>
        <p>The policy language allows assertion authors to invent their own XML dialects to
          represent policy assertions. The policy language builds on natural XML nesting and
          leverages XML Schema validation. The policy language relies only on the QName of the
          policy assertion XML element. Everything else is left for the policy assertion authors to
          design. The policy language offers plenty of options to assertion authors such as
          independent assertions, dependent assertions, nested policies and assertion parameters.</p>
        <p>The description of a policy assertion should identify a single domain specific behavior
          in an objective manner and answer the following questions:</p>
        <ulist>
          <item>
            <p>What is the behavior? (In the previous section, we discussed the characteristics of a
              behavior represented by a useful policy assertion.)</p>
          </item>
          <item>
            <p>What are the assertion parameters?</p>
          </item>
          <item>
            <p>Are there any dependent behaviors, and how are they represented?</p>
          </item>
          <item>
            <p>What is the assertion’s QName and XML information set representation?</p>
          </item>
          <item>
            <p>What is the policy subject of this behavior?</p>
          </item>
          <item>
            <p>What are the attachment points?</p>
          </item>
        </ulist>
        <p>As you would have expected, the policy assertion design is more than a technical design.
          Given that interoperability and automation are the motivations, policy assertion design is
          a business process to reach agreements with relevant stakeholders for interoperability and
          tooling. Setting aside the business aspects of the design, the rest of this section walks
          through a few tradeoffs or dimensions to consider and provides technical guidelines for
          designing policy assertions.</p>
        <div3 id="optional-behaviors">
          <head>Optional Behaviors</head>
          <p>A policy assertion identifies a domain specific behavior that is a requirement relevant
            to a Web Service interaction. Policy assertions can be marked optional using
              the <code>wsp:Optional</code> attribute marker to represent behaviors that may be
            engaged (capabilities) for an interaction. It is important to note that behavior (policy
            assertion) and optional representation (<code>wsp:Optional</code> attribute) are
            distinct ideas of the Web Services Policy language. Conflating these distinct ideas
            unnecessarily disrupts scenarios that depend on the policy intersection: if an assertion
            indicates an optional behavior and this assertion is not present in the other
            participants’ policy then the policy intersection will unnecessarily produce false
            negatives.</p>
          <p>Best practice: use the <code>wsp:Optional</code> attribute to indicate optional
            behaviors.</p>
        </div3>
        <div3 id="assertion-vs-assertion-parameter">
          <head>Assertion vs. assertion parameter</head>
          <p>Policy assertion parameters are the opaque payload of an assertion. Parameters carry
            additional useful information for engaging the behavior described by an assertion and
            are preserved through policy processing such as normalize, merge and policy
            intersection. requesters may use policy intersection to select a compatible policy
            alternative for an interaction. Assertion parameters do not affect the outcome of policy
            intersection.</p>
          <p>In the example below, <code>sp:Body</code> and <code>sp:Header</code> elements are the
            two assertion parameters of the <code>sp:SignedParts</code> policy assertion (this
            assertion requires the parts of a message to be protected). These two parameters
            identify the parts of a wire message that should be protected. These parameters carry
            additional useful information for engaging the behavior that is irrelevant to
            compatibility tests.</p>
          <example>
            <head>Policy Assertion with Assertion Parameters</head>
            <eg xml:space="preserve">&lt;Policy&gt;
  &lt;sp:SignedParts&gt;
    &lt;sp:Body /&gt;
    &lt;sp:Header /&gt;
  &lt;/sp:SignedParts&gt;
  …
&lt;/Policy&gt;</eg>
          </example>
          <p>Best practice: represent useful (or additional) information necessary for engaging the
            behavior represented by a policy assertion as assertion parameters.</p>
        </div3>
        <div3 id="leveraging-nested-policy">
          <head>Leveraging Nested Policy</head>
          <p>As we have seen before, a nested policy expression further qualifies the dependent
            behaviors of its parent policy assertion. When we consider nested policy there is always
            two or more policy assertions involved. The following design questions below can help
            you to determine when to use nested policy expressions:</p>
          <p>Are these assertions designed for the same policy subject? </p>
          <p>Do these assertions represent dependent behaviors?</p>
          <p>If the answers are yes to both of these questions then leveraging nested policy
            expressions is a good idea. Keep in mind that a nested policy expression participates in
            the policy intersection algorithm. If a requester uses policy intersection to select a
            compatible policy alternative then the assertions in a nested policy expression play a
            first class role in the outcome. There is one caveat to watch out for: policy assertions
            with deeply nested policy can greatly increase the complexity of a policy and should be
            avoided when they are not needed.</p>
          <p>Best practice: represent dependent behaviors that apply to the same policy subject
            using nested policy assertions.</p>
        </div3>
        <div3 id="minimal-approach">
          <head>Minimal approach</head>
          <p>How big should an assertion be? How many assertion parameters should the assertion
            enumerate? How many dependent behaviors should the assertion enumerate? It is always
            good to start with a simple working policy assertion that allows extensibility. As your
            design work progresses, you may add more parameters or nested policy assertions to meet
            your interoperability needs. </p>
          <p>Best practice: start with a simple working assertion that allows extensibility.</p>
        </div3>
        <div3 id="QName_and_XML_Information_Set_representation">
          <head>QName and XML Information Set representation</head>
          <p>As mentioned before, Web Services Policy language allows assertion authors to invent
            their own XML dialects to represent policy assertions. The policy language relies only
            on the policy assertion XML element QName. This QName is unique and identifies the
            behavior represented by a policy assertion. Assertion authors have the option to
            represent an assertion parameter as a child element (by leveraging natural XML nesting)
            or an attribute of an assertion. The general guidelines on when to use XML elements
            versus attributes apply.</p>
          <p>The syntax of an assertion can be represented using an XML outline (plus an XML schema
            document). If the assertion has a nested policy expression then the assertion XML
            outline can enumerate the nested assertions that are allowed.</p>
          <p>Best practice: use a unique QName to identify the behavior and provide an XML outline
            (plus an XML schema document) to specify the syntax of an assertion.</p>
        </div3>
        <div3 id="Policy_subject_and_attachment_points">
          <head>Policy subject and attachment points</head>
          <p>A behavior identified by a policy assertion applies to the associated policy subject.
            If a policy assertion is to be used with WSDL, policy assertion authors must specify a
            WSDL policy subject. What is the policy subject of this behavior?</p>
          <ulist>
            <item>
              <p>If the behavior applies to any message exchange using any of the endpoints offered
                by a service then the subject is the service policy subject.</p>
            </item>
            <item>
              <p>If the behavior applies to any message exchange made using an endpoint then the
                subject is the endpoint policy subject.</p>
            </item>
            <item>
              <p>If the behavior applies to any message exchange defined by an operation then the
                subject is the operation policy subject.</p>
            </item>
            <item>
              <p>If the behavior applies to an input message then the subject is the message policy
                subject - similarly for output and fault message policy subjects.</p>
            </item>
          </ulist>
          <p>For a given WSDL policy subject, there may be several attachment points. For example,
            there are three attachment points for the endpoint policy subject: the
            <code>port</code>, <code>binding</code> and <code>portType</code> element. Policy
            assertion authors should identify the relevant attachment point when defining a new
            assertion. To determine the relevant attachment points, authors should consider the
            scope of the attachment point. For example, an assertion should only be allowed in the
              <code>portType</code> element if the assertion reasonably applies to any endpoint that
            ever references that <code>portType</code>. Most of the known policy assertions are
            designed for the endpoint, operation or message policy subject. The commonly used
            attachment points for these policy subjects are outlined in <specref ref="attaching-policy-expressions-to-wsdl2"/>.</p>
          <p>The service policy subject is a collection of endpoint policy subjects. The endpoint
            policy subject is a collection of operation policy subjects and etc. As you can see, the
            WSDL policy subjects compose naturally. It is quite tempting to associate the identified
            behavior to a broader policy subject than to a fine granular policy subject. For
            instance, it is convenient to attach a supporting token assertion (defined by the Web
            Services Security Policy specification) to an endpoint policy subject instead of a
            message policy subject. For authoring convenience, an assertion author may allow the
            association of an assertion to multiple policy subjects. If an assertion is allowed to
            be associated with multiple policy subjects then the assertion author has the burden to
            describe the semantics of multiple instances of the same assertion attached to multiple
            policy subjects at the same time. The best practice is to choose the most granular
            policy subject that the behavior applies to.</p>
          <p>Best practice: specify a policy subject, choose the most granular policy subject that
            the behavior applies to and specify a preferred attachment point.</p>
        </div3>
        <div3 id="versioning-behaviors">
          <head>Versioning behaviors</head>
          <p>Over time, there may be multiple equivalent behaviors emerging in the Web Service
            interaction space. Examples of such multiple equivalent behaviors are WSS: SOAP Message
            Security 1.0 vs. 1.1 and WS-Addressing August 2004 version vs. WS-Addressing W3C
            Recommendation. These equivalent behaviors are mutually exclusive for an interaction.
            Such equivalent behaviors can be modeled as independent assertions. The policy
            expression in the example below requires the use of WSS: SOAP Message Security 1.0.</p>
          <example>
            <head>Message-level Security and WSS: SOAP Message Security 1.0</head>
            <eg xml:space="preserve">&lt;Policy&gt;
  &lt;sp:Wss10&gt;…&lt;/sp:Wss10&gt;
&lt;/Policy&gt;</eg>
          </example>
          <p>The policy expression in the example below requires the use of WSS: SOAP Message
            Security 1.1. These are multiple equivalent behaviors and are represented using distinct
            policy assertions.</p>
          <example>
            <head>Message-level Security and WSS: SOAP Message Security 1.1</head>
            <eg xml:space="preserve">&lt;Policy&gt;
  &lt;sp:Wss11&gt;…&lt;/sp:Wss11&gt;
&lt;/Policy&gt;</eg>
          </example>
          <p>Best practice: use independent assertions for modeling multiple equivalent
          behaviors.</p>
        </div3>
        <div3 id="versioning-policy-language"><head>Versioning Policy Language</head>
        <p> 
         <ednote> 
          <edtext>
          The WG is contemplating moving some or all of this material into a non-normative appendix of the framework or attachment document.  User feedback is solicited
          </edtext>
         </ednote>
        </p>
        <p>Over time, the Policy WG or third parties can version or extend the Policy Language with new or modified constructs.  These constructs may be compatible or incompatible with previous versions.  Some of the possible new constructs that have been mentioned previously are: new operators, operator cardinality, policy identification, compact syntax, Policy Inclusion, security, referencing, attachment points, alternative
priority, effective dating, negotiation. </p>
<p>WS-Policy provides extensibility points on 6 elements with a combination of attribute and/or element extensibility.  
The possible extensibility points with their current extensibility - including some outstanding issues related to extensibility - are:</p>
<olist>
<item><p>Policy: element from ##other namespace and any attribute</p></item>
<item><p>PolicyReference: any attribute and a proposal to add any element ExactlyOne, All: element from ##other namespace, no attribute extensibility</p></item>
<item><p>PolicyAttachment:  element from ##other namespace and any attribute</p></item>
<item><p>AppliesTo: any element and any attribute</p></item>
</olist>

<div4 id="versioning-policy-framework"><head>Policy Framework</head>
<p>WS-Policy Framework 1.5 specifies that any element that is not known inside a Policy, ExactlyOne or All will be treated as an assertion.  The default value for wsp:Optional="false", which means after normalization it will be inside an ExactlyOne/All operator.  </p>
<p>Let us show an example with a hypothetical new operator that is a Choice with a minOccurs and a maxOccurs attributes, ala XSD:Choice, in a new namespace.  We use the wsp16 prefix to indicate a hypothetical Policy Language 1.6 that is intended to be compatible with Policy Language 1.5:</p>
<example><head>Policy containing 1.5 and 1.6 Policies.</head>
<eg xml:space="preserve">&lt;wsp:Policy&gt;
  &lt;wsp:ExactlyOne&gt;
    &lt;wsp16:Choice wsp16:minOccurs="1" wsp16:maxOccurs="2"&gt;
      ...
    &lt;/wsp16:Choice&gt;
    &lt;wsp:All&gt;
       ...
    &lt;/wsp:All&gt;
  &lt;/wsp:ExactlyOne&gt;
&lt;/wsp:Policy&gt;</eg>
</example>
<p>The normalization rule for wsp:Optional="false" would be applied to the wsp16:Choice, yielding the following expression:</p>
<example><head>Normalized Policy containing 1.5 and 1.6 Policies</head>
<eg xml:space="preserve">&lt;wsp:Policy&gt;
  &lt;wsp:ExactlyOne&gt;
    &lt;wsp:ExactlyOne&gt;
      &lt;wsp:All&gt;
         &lt;wsp16:Choice wsp16:minOccurs="1" wsp16:maxOccurs="2"&gt;
          ...
        &lt;/wsp16:Choice&gt;
      &lt;/wsp:All&gt;
    &lt;/wsp:ExactlyOne&gt;
    &lt;wsp:All&gt;
       ...
    &lt;/wsp:All&gt;
  &lt;/wsp:ExactlyOne&gt;
&lt;/wsp:Policy&gt;</eg>
</example>
<p>Alternatively, the wsp:Optional could be set to "true" on the choice, as
in:</p>
<example><head>Policy containing explicit wsp:Optional="true"</head>
<eg xml:space="preserve">&lt;wsp:Policy&gt;
  &lt;wsp16:Choice wsp16:minOccurs="1" wsp16:maxOccurs="2"
wsp:Optional="true"&gt;
      ...
  &lt;/wsp16:Choice&gt;
&lt;/wsp:Policy&gt;</eg>
</example>
<p>The normalized form will be:</p>
<example><head>Normalized policy</head>
<eg xml:space="preserve">&lt;wsp:Policy&gt;
  &lt;wsp:ExactlyOne&gt;
     &lt;wsp:All&gt;
         &lt;wsp16:Choice wsp16:minOccurs="1" wsp16:maxOccurs="2"&gt;
          ...
        &lt;/wsp16:Choice&gt;
      &lt;/wsp:All&gt;
     &lt;wsp:All/&gt;
  &lt;/wsp:ExactlyOne&gt;
&lt;/wsp:Policy&gt;</eg>
</example>
<p>Because the wsp16:Choice alternative isn't understood in either normalized form, it will not be chosen as one of the alternatives and will effectively be ignored.  Policy intersection may be more difficult with such compatible extensions.  For example, the previous will "look"
like it has a wsp16:Choice typed assertion.  To determine intersection with a Policy that does not have the wsp16:Choice type assertion, domain specific processing would have to be done.  However, there is an alternative that does not have the wsp16:Choice, so intersection would yield the expected result.
</p>
<p>Note: it is possible to add new names to the existing namespace, such as: </p>
<example><head>Policy containing 1.5 and 1.6 Policies all in the 1.5 namespace</head>
<eg xml:space="preserve">&lt;wsp:Policy&gt;
  &lt;wsp:ExactlyOne&gt;
    &lt;wsp:Choice wsp:minOccurs="1" wsp:maxOccurs="2"&gt;
      ...
    &lt;/wsp:Choice&gt;
    &lt;wsp:All&gt;
       ...
    &lt;/wsp:All&gt;
  &lt;/wsp:ExactlyOne&gt;
&lt;/wsp:Policy&gt;</eg>
</example>

<p>Notice that using a new namespace can result in backwards and forwards compatibility if normalization results in an optional alternative. </p>

<p>Best practice: insert new elements in an optional alternative or mark with wsp:Optional="true". </p>

<p>Incompatible versions of the Policy language may be indicated by a new namespace name for at least the new and/or incompatible elements or attributes.  Imagine that the Choice operator is required by a future version of Policy, then there will be a new namespace for the Policy element.  We use the wsp20 prefix to indicate a hypothetical Policy Language 2.0 that is intended to be incompatible with Policy Language
1.5:</p>

<example><head>Policy containing 2.0 only Policies.</head>
<eg xml:space="preserve">&lt;wsp20:Policy&gt;
  &lt;wsp20:ExactlyOne&gt;
    &lt;wsp20:Choice wsp:minOccurs="1" wsp:maxOccurs="2"&gt;
      ...
    &lt;/wsp20:Choice&gt;
    ...
  &lt;/wsp20:ExactlyOne&gt;
&lt;/wsp20:Policy&gt; </eg>
</example>

<p>The new Policy operator could be embedded inside an existing Policy
element:</p>

<example><head>Policy containing 2.0 (incompatible with 1.5) Policies embedded in wsp 1.5 Policy.</head>
<eg xml:space="preserve">&lt;wsp:Policy&gt;
    &lt;wsp20:Choice wsp:minOccurs="1" wsp:maxOccurs="2"&gt;
      ...
    &lt;/wsp20:Choice&gt;
    ...
&lt;/wsp20:Policy&gt; </eg>
</example>

<p>This will be treated as an Assertion for normalization and intersection computation.  This will result in only one alternative that requires the wsp20:Choice, the intended behaviour for incompatible changes.</p>

<p>Best practice: use a new namespace for new incompatible construct and insert inside either: new Policy element OR existing All for future incompatible policy extensions.</p>

<p>A future version of WS-Policy could support the current operators in the existing namespace, such as:</p>
<example><head>Policy containing 1.5 operator in 2.0 Policy</head>
<eg xml:space="preserve">&lt;wsp20:Policy&gt;
  &lt;wsp:ExactlyOne&gt;
    &lt;wsp20:Choice wsp:minOccurs="1" wsp:maxOccurs="2"&gt;
      ...
    &lt;/wsp20:Choice&gt;
    ...
  &lt;/wsp:ExactlyOne&gt;
&lt;/wsp20:Policy&gt; </eg>
</example>

<p>It is difficult to predict whether this functionality would be useful.  The future version of WS-Policy doesn't appear to be precluded from doing this.</p>
</div4>
<div4 id="versioning-policy-attachment"><head>Policy Attachment</head>
<p>Policy attachment provides WSDL 1.1 and UDDI attachment points.  It appears that exchange of Policy will be in the context of WSDL or UDDI.
WRT WSDL, the policy model is an extension of the WSDL definition.  As such, it is likely that future versions of Policy will be exchanged as multiple Policy expressions within a WSDL.  One alternative is that there would be a separate WSDL for each version of Policy.  The problem of how to specify and query for compound documents is very difficult, so it is more likely that each version of Policy will be exchanged within a WSDL.  </p>

<p>We show an example of a new version of policy that allows QName reference to Policies in the PolicyReference:</p>

<example><head>WSDL containing 1.5 and 2.0 (compatible with 2.0) Policy References.</head>
<eg xml:space="preserve">&lt;wsdl11:binding name="StockQuoteSoapBinding" type="fab:Quote" &gt;
       &lt;wsoap12:binding style="document"
          transport="http://schemas.xmlsoap.org/soap/http" /&gt;
	&lt;wsp:Policy&gt;
	  &lt;wsp:ExactlyOne&gt;
		&lt;wsp:All&gt;
	       	&lt;wsp:PolicyReference URI="#RmPolicy"
wsdl11:required="true" /&gt;
      	      &lt;wsp:PolicyReference URI="#X509EndpointPolicy"
wsdl11:required="true" /&gt;
		&lt;/wsp:All&gt;
		&lt;wsp:All&gt;
	       	&lt;wsp:PolicyReferenceByQName ref="rmp:RMAssertion"
wsdl11:required="true" /&gt;
      	      &lt;wsp:PolicyReferenceByQName ref="sp:AsymmetricBinding"
wsdl11:required="true" /&gt;
		&lt;/wsp:All&gt;
	 &lt;/wsp:ExactlyOne&gt;
	&lt;/wsp:Policy&gt;
  &lt;wsdl11:operation name="GetLastTradePrice" &gt; ....
  ...</eg>
 </example>   

<p>The PolicyReference element is attribute extensible.  One example of an addition is a list of backup URIs for the PolicyReference:</p>

<example><head>WSDL containing 1.5 and 2.0 (compatible with 2.0) Policy References.</head>
<eg xml:space="preserve">&lt;wsdl11:binding name="StockQuoteSoapBinding" type="fab:Quote" &gt;
       &lt;wsoap12:binding style="document"
          transport="http://schemas.xmlsoap.org/soap/http" /&gt;
	&lt;wsp:Policy&gt;
	  &lt;wsp:ExactlyOne&gt;
		&lt;wsp:All&gt;
	       	&lt;wsp:PolicyReference URI="" wsp16:alternateURIs="URI*"
wsdl11:required="true" /&gt;
      	      &lt;wsp:PolicyReference URI="" wsp16:alternateURIs="URI*"
wsdl11:required="true" /&gt;
		&lt;/wsp:All&gt;
	 &lt;/wsp:ExactlyOne&gt;
	&lt;/wsp:Policy&gt;
  &lt;wsdl11:operation name="GetLastTradePrice" &gt; ....
  ...</eg>
</example>
<p>The policy framework specification says that any unknown attributes are ignored. A Policy 1.5 processor will not understand the wsp16:alternateURI attribute, it will be ignored.  A Policy 1.6 processor will understand the alternate URIs so it won't be ignored.</p>

<p>PolicyAttachment and AppliesTo also have extensibility points.  We choose not to illustrate these at this time.</p>
</div4>
</div3>        
      </div2>
      <div2 id="describing-policy-assertions">
        <head>Describing Policy Assertions</head>
        <p>Thus far, we walked through the dimensions of a policy assertion and guidelines for
          authoring policy assertions. Let us look at what are the minimum requirements for
          describing policy assertions in specifications:</p>
        <olist>
          <item>
            <p>Description must clearly and completely specify the syntax (plus an XML Schema
              document) and semantics of a policy assertion.</p>
          </item>
          <item>
            <p>If there is a nested policy expression, description must declare it and enumerate the
              nested policy assertions that are allowed. </p>
          </item>
          <item>
            <p>A policy alternative may contain multiple instances of the same policy assertion.
              Description must specify the semantics of parameters and nested policy (if any) when
              there are multiple instances of a policy assertion in the same policy alternative.
            </p>
          </item>
          <item>
            <p>If a policy assertion is to be used with WSDL, description must specify a WSDL policy
              subject – such as service, endpoint, operation and message.</p>
          </item>
        </olist>
      </div2>
    </div1>
    <div1 id="conclusion">
      <head>Conclusion</head>
      <p>Service providers use Web Services Policy to represent combinations of behaviors
        (capabilities and requirements). Web service developers use policy-aware clients that
        understand policy expressions and engage the behaviors represented by providers
        automatically. These behaviors may include security, reliability, transaction, message
        optimization, etc. Web Services Policy is a simple language, hides complexity from
        developers, automates Web service interactions, and enables secure, reliable and transacted
        Web Services.</p>
    </div1>
  </body>
  <back>
    <div1 id="security-considerations">
      <head>Security Considerations</head>
      <p>Security considerations are discussed in the <bibref ref="WS-Policy"/> document.</p>
    </div1>
    <div1 id="xml-namespaces">
      <head>XML Namespaces</head>
      <p>The table below lists XML Namespaces that are used in this document. The choice of any
        namespace prefix is arbitrary and not semantically significant.</p>
      <table summary="Prefixes and XML Namespaces used in this specification" id="nsprefix" border="1" cellspacing="0" cellpadding="5">
        <caption>Prefixes and XML Namespaces used in this specification.</caption>
        <thead>
          <tr>
            <th rowspan="1" colspan="1">Prefix</th>
            <th rowspan="1" colspan="1">XML Namespace</th>
            <th rowspan="1" colspan="1">Specifications</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td rowspan="1" colspan="1">
              <code>mtom</code>
            </td>
            <td rowspan="1" colspan="1">
              <code>http://schemas.xmlsoap.org/ws/2004/09/policy/optimizedmimeserialization</code>
            </td>
            <td rowspan="1" colspan="1">[<loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://131.107.72.15/MTOM_Service_Indigo/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">WS-OptimizedSerializationPolicy</loc>]</td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">
              <code>soap</code>
            </td>
            <td rowspan="1" colspan="1">
              <code>http://www.w3.org/2003/05/soap-envelope</code>
            </td>
            <td rowspan="1" colspan="1">[<bibref ref="SOAP12"/>]</td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">
              <code>sp</code>
            </td>
            <td rowspan="1" colspan="1">
              <code>http://schemas.xmlsoap.org/ws/2005/07/securitypolicy</code>
            </td>
            <td rowspan="1" colspan="1">[<bibref ref="WS-SecurityPolicy"/>]</td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">
              <code>wsa</code>
            </td>
            <td rowspan="1" colspan="1">
              <code>http://www.w3.org/2005/08/addressing</code>
            </td>
            <td rowspan="1" colspan="1">[<bibref ref="WS-Addressing"/>]</td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">
              <code>wsap</code>
            </td>
            <td rowspan="1" colspan="1">
              <code>http://www.w3.org/2006/05/addressing/wsdl</code>
            </td>
            <td rowspan="1" colspan="1">[<bibref ref="WS-AddressingWSDL"/>]</td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">
              <code>wsdl</code>
            </td>
            <td rowspan="1" colspan="1">
              <code>http://schemas.xmlsoap.org/wsdl/</code>
            </td>
            <td rowspan="1" colspan="1">[<bibref ref="WSDL11"/>]</td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">
              <code>wsp</code>
            </td>
            <td rowspan="1" colspan="1">
              <code>http://www.w3.org/2006/07/ws-policy</code>
            </td>
            <td rowspan="1" colspan="1">[<bibref ref="WS-Policy"/>, <bibref ref="WS-PolicyAttachment"/>]</td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">
              <code>wss</code>
            </td>
            <td rowspan="1" colspan="1">
              <code>http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd</code>
            </td>
            <td rowspan="1" colspan="1">[<bibref ref="WS-Security2004"/>]</td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">
              <code>wst</code>
            </td>
            <td rowspan="1" colspan="1">
              <code>http://schemas.xmlsoap.org/ws/2005/02/trust</code>
            </td>
            <td rowspan="1" colspan="1">[<bibref ref="WS-Trust"/>]</td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">
              <code>wsu</code>
            </td>
            <td rowspan="1" colspan="1">
              <code>http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd</code>
            </td>
            <td rowspan="1" colspan="1">[<bibref ref="WS-Security2004"/>]</td>
          </tr>
        </tbody>
      </table>
    </div1>
    <div1 id="references">
      <head>References</head>
      <blist>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" key="MTOM" id="MTOM" href="http://www.w3.org/TR/2005/REC-soap12-mtom-20050125/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">SOAP Message Transmission Optimization Mechanism</titleref>, M. Gudgin, N.
          Mendelsohn, M. Nottingham and H. Ruellan, Editors. World Wide Web Consortium, 25 January
          2005. This version of the SOAP Message Transmission Optimization Mechanism Recommendation
          is http://www.w3.org/TR/2005/REC-soap12-mtom-20050125/. The <loc href="http://www.w3.org/TR/soap12-mtom/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">latest version of SOAP Message Transmission
            Optimization Mechanism</loc> is available at http://www.w3.org/TR/soap12-mtom/. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="SOAP11" key="SOAP 1.1" href="http://www.w3.org/TR/2000/NOTE-SOAP-20000508/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Simple Object Access Protocol (SOAP) 1.1</titleref>, D. Box, et al, Editors.
          World Wide Web Consortium, 8 May 2000. Available at
          http://www.w3.org/TR/2000/NOTE-SOAP-20000508/. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="SOAP12" key="SOAP 1.2 Messaging Framework" href="http://www.w3.org/TR/2003/REC-soap12-part1-20030624/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">SOAP Version 1.2 Part 1: Messaging Framework</titleref>, M. Gudgin, M. Hadley,
          N. Mendelsohn, J-J. Moreau, H. Frystyk Nielsen, Editors. World Wide Web Consortium, 24
          June 2003. This version of the SOAP Version 1.2 Part 1: Messaging Framework Recommendation
          is http://www.w3.org/TR/2003/REC-soap12-part1-20030624/. The <loc href="http://www.w3.org/TR/soap12-part1/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">latest version of SOAP Version 1.2 Part 1:
            Messaging Framework</loc> is available at http://www.w3.org/TR/soap12-part1/. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" key="XOP" id="XOP" href="http://www.w3.org/TR/2005/REC-xop10-20050125/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">XML-binary Optimized Packaging</titleref>, M. Gudgin, N. Mendelsohn, M.
          Nottingham and H. Ruellan, Editors. World Wide Web Consortium, 25 January 2005. This
          version of the XML-binary Optimized Packaging Recommendation is
          http://www.w3.org/TR/2005/REC-xop10-20050125/. The <loc href="http://www.w3.org/TR/xop10/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">latest version of XML-binary Optimized Packaging</loc> is available at
          http://www.w3.org/TR/xop10/. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" key="WS-Addressing Core" id="WS-Addressing" href="http://www.w3.org/TR/2006/REC-ws-addr-core-20060509/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Addressing 1.0 - Core</titleref>, M. Gudgin, M. Hadley, and T.
          Rogers, Editors. World Wide Web Consortium, 9 May 2006. This version of the Web Services
          Addressing 1.0 - Core Recommendation is
          http://www.w3.org/TR/2006/REC-ws-addr-core-20060509/. The <loc href="http://www.w3.org/TR/ws-addr-core/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">latest version of Web Services Addressing 1.0
            - Core</loc> is available at http://www.w3.org/TR/ws-addr-core. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" key="WS-Addressing WSDL Binding" id="WS-AddressingWSDL" href="http://www.w3.org/TR/2006/CR-ws-addr-wsdl-20060529/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Addressing 1.0 - WSDL Binding</titleref>, M. Gudgin, M. Hadley, T.
          Rogers and Ü. Yalçinalp, Editors. World Wide Web Consortium, 29 May 2006. This version of
          the Web Services Addressing 1.0 - WSDL Binding is
          http://www.w3.org/TR/2006/CR-ws-addr-wsdl-20060529/. The <loc href="http://www.w3.org/TR/ws-addr-wsdl" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">latest version of Web Services Addressing 1.0 -
            WSDL Binding</loc> is available at http://www.w3.org/TR/ws-addr-wsdl. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-Atomic" key="Web Services Atomic Transaction" href="http://schemas.xmlsoap.org/ws/2004/10/wsat/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Atomic Transaction</titleref>, L. P. Cabrera, et al, Authors.
          Arjuna Technologies, Inc., BEA Systems, Inc., Hitachi Software, Inc., IONA Technologies, Inc., 
          International Business Machines Corporation, and Microsoft Corporation,
          February 2005. Available at http://schemas.xmlsoap.org/ws/2004/10/wsat/.</bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-BA" key="Web Services Business Activity Framework" href="http://schemas.xmlsoap.org/ws/2004/10/wsba/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Business Activity Framework</titleref>, L. P. Cabrera, et al, Authors.
          Arjuna Technologies, Inc., BEA Systems, Inc., Hitachi Software, Inc., IONA Technologies, Inc., 
          International Business Machines Corporation, and Microsoft Corporation,
          February 2005. Available at http://schemas.xmlsoap.org/ws/2004/10/wsba/.</bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-Device" key="Devices Profile for Web Services" href="http://schemas.xmlsoap.org/ws/2006/02/devprof/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Devices Profile for Web Services</titleref>, S. Chan, et al, Authors.
          Intel Corporation, Lexmark, Inc., Microsoft Corporation, and Richo Software, Inc.,
          February 2006. Available at http://schemas.xmlsoap.org/ws/2006/02/devprof/.</bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-WinCard" key="A Technical Reference for Windows CardSpace" href="http://download.microsoft.com/download/5/4/0/54091e0b-464c-4961-a934-d47f91b66228/infocard-techref-beta2-published.pdf" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">A Technical Reference for Windows CardSpace</titleref>, Authors, 
          Microsoft Corporation,
          August 2005. Available at http://download.microsoft.com/download/5/4/0/54091e0b-464c-4961-a934-d47f91b66228/infocard-techref-beta2-published.pdf.</bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-MetadataExchange" key="WS-MetadataExchange" href="http://schemas.xmlsoap.org/ws/2004/09/mex/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Metadata Exchange (WS-MetadataExchange)</titleref>, K. Ballinger,
          et al, Authors. BEA Systems Inc., Computer Associates International, Inc., International
          Business Machines Corporation, Microsoft Corporation, Inc., SAP AG, Sun Microsystems, and
          webMethods, September 2004. Available at http://schemas.xmlsoap.org/ws/2004/09/mex/ </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WSDL11" key="WSDL 1.1" href="http://www.w3.org/TR/2001/NOTE-wsdl-20010315" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Description Language (WSDL) 1.1</titleref>, E. Christensen, et al,
          Authors. World Wide Web Consortium, March 2001. Available at
          http://www.w3.org/TR/2001/NOTE-wsdl-20010315. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" key="WSDL 2.0 Core Language" id="WSDL20" href="http://www.w3.org/TR/2006/CR-wsdl20-20060327/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Description Language (WSDL) Version 2.0 Part 1: Core
          Language</titleref>, R. Chinnici, J. J. Moreau, A. Ryman, S. Weerawarana, Editors. World
          Wide Web Consortium, 27 March 2006. This version of the WSDL 2.0 specification is
          http://www.w3.org/TR/2006/CR-wsdl20-20060327. The <loc href="http://www.w3.org/TR/wsdl20/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">latest version of WSDL 2.0</loc> is available at http://www.w3.org/TR/wsdl20. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-Policy" key="Web Services Policy Framework" href="http://www.w3.org/TR/2006/WD-ws-policy-20060927/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Policy 1.5 - Framework</titleref>, A. S. Vedamuthu, D. Orchard, M. Hondo, T.
          Boubez and P. Yendluri, Editors. World Wide Web Consortium, 18,
          October 2006. This version of the 
          Web Services Policy 1.5 - Framework specification is at http://www.w3.org/TR/2006/WD-ws-policy-20060927/ . The <loc href="http://www.w3.org/TR/ws-policy/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">latest version of
            Web Services Policy 1.5 - Framework</loc> is available at http://www.w3.org/TR/ws-policy/. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-PolicyAttachment" key="Web Services Policy Attachment" href="http://www.w3.org/TR/2006/WD-ws-policy-attach-20060927/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Policy 1.5 - Attachment</titleref>, A. S. Vedamuthu, D. Orchard, M. Hondo, T.
          Boubez and P. Yendluri, Editors. World Wide Web Consortium, 18,
          October 2006. This version of the 
          Web Services Policy 1.5 - Attachment specification is at http://www.w3.org/TR/2006/WD-ws-policy-attach-20060927/ . The <loc href="http://www.w3.org/TR/ws-policy-attach/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">latest version of
            Web Services Policy 1.5 - Attachment</loc> is available at
          http://www.w3.org/TR/ws-policy-attach/. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-RM-Policy" key="Web Services Reliable Messaging Policy" href="http://schemas.xmlsoap.org/ws/2005/02/rm/policy/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Reliable Messaging Policy</titleref>, S. Bates, et al, Authors.
          BEA Systems, Inc., International Business Machines Corporation, Microsoft Corporation,
          and TIBCO Software Inc., February 2005. Available at
          http://schemas.xmlsoap.org/ws/2005/02/rm/policy/. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-Security2004" key="WS-Security 2004" href="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Security: SOAP Message Security 1.0</titleref>, A. Nadalin, C.
          Kaler, P. Hallam-Baker and R. Monzillo, Editors. Organization for the Advancement of
          Structured Information Standards, March 2004. Available at
          http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-SecurityPolicy" key="WS-SecurityPolicy" href="http://www.oasis-open.org/committees/download.php/15979/oasis-wssx-ws-securitypolicy-1.0.pdf" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">WS-SecurityPolicy v1.0</titleref>, A. Nadalin, M. Gudgin, A. Barbir, and H.
          Granqvist, Editors. Organization for the Advancement of Structured Information Standards,
          8 December 2005. Available at
          http://www.oasis-open.org/committees/download.php/15979/oasis-wssx-ws-securitypolicy-1.0.pdf. </bibl>
        <bibl xmlns:xlink="http://www.w3.org/1999/xlink" id="WS-Trust" key="WS-Trust" href="http://schemas.xmlsoap.org/ws/2005/02/trust" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">
          <titleref xlink:type="simple" xlink:show="new" xlink:actuate="onRequest">Web Services Trust Language (WS-Trust)</titleref>, S. Anderson, et al, Authors.
          Actional Corporation, BEA Systems, Inc., Computer Associates International, Inc.,
          International Business Machines Corporation, Layer 7 Technologies, Microsoft Corporation,
          Oblix Inc., OpenNetwork Technologies Inc., Ping Identity Corporation, Reactivity Inc., RSA
          Security Inc., and VeriSign Inc., February 2005. Available at
          http://schemas.xmlsoap.org/ws/2005/02/trust. </bibl>
      </blist>
    </div1> 
<inform-div1 id="acknowledgments">
  <head>Acknowledgements</head>

  <p>This document is the work of the <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/2002/ws/policy/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">W3C Web Services Policy
  Working Group</loc>.</p>

  <p>
    Members of the Working Group are (at the time of writing, and by
    alphabetical order):
      Dimitar Angelov (SAP AG), Abbie Barbir (Nortel Networks), Charlton Barreto (Adobe Systems Inc.), Sergey Beryozkin (IONA Technologies, Inc.), Vladislav Bezrukov (SAP AG), Toufic Boubez (Layer 7 Technologies), Paul Cotton (Microsoft Corporation), Jeffrey Crump (Sonic Software), Glen Daniels (Sonic Software), Ruchith Fernando (WSO2), Christopher Ferris (IBM Corporation), William Henry (IONA Technologies, Inc.), Frederick Hirsch (Nokia), Maryann Hondo (IBM Corporation), Tom Jordahl (Adobe Systems Inc.), Philippe Le Hégaret (W3C/MIT), Jong Lee (BEA Systems, Inc.), Mark Little (JBoss Inc.), Ashok Malhotra (Oracle Corporation), Monica Martin (Sun Microsystems, Inc.), Jeff Mischkinsky (Oracle Corporation), Dale Moberg (Cyclone Commerce, Inc.), Anthony Nadalin (IBM Corporation), David Orchard (BEA Systems, Inc.), Fabian Ritzmann (Sun Microsystems, Inc.), Daniel Roth (Microsoft Corporation), Sanka Samaranayake (WSO2), Felix Sasaki (W3C/Keio), Skip Snow (Citigroup), Yakov Sverdlov (Computer Associates), Mark Temple-Raston (Citigroup), Asir Vedamuthu (Microsoft Corporation), Sanjiva Weerawarana (WSO2), Ümit Yalçinalp (SAP AG), Prasad Yendluri (webMethods, Inc.).
  </p>

  <p>
    Previous members of the Working Group were:
       Bijan Parsia (University of Manchester), Seumas Soltysik (IONA Technologies, Inc.)
  </p>

  <p>
    The people who have contributed to <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://lists.w3.org/Archives/Public/public-ws-policy/" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">discussions
    on public-ws-policy@w3.org</loc> are also gratefully
    acknowledged.
  </p>
</inform-div1>
 <inform-div1 id="change-description">
      <head>Changes in this Version of the Document</head>
      <p>A list of substantive changes since the previous publication is below:</p>
      <ulist>
        <item><p>Replaced URI with IRI.</p></item>
        <item><p>Added a new section - Versioning Policy Language.</p></item>
        <item><p>Moved 'Security Considerations' section to the Web Services Policy 1.5 - Framework.</p></item>
      </ulist>
    </inform-div1>
    <inform-div1 id="change-log">
      <head>Web Services Policy 1.5 - Primer Change Log</head>
      <table id="ws-policy-primer-changelog-table" border="1">
        <tbody>
          <tr>
            <th rowspan="1" colspan="1">Date</th>
            <th rowspan="1" colspan="1">Author</th>
            <th rowspan="1" colspan="1">Description</th>
          </tr>
          <!-- template
          <tr>
          <td>200505</td>
          <td></td>
          <td></td>
          </tr>
        -->
          <tr>
            <td rowspan="1" colspan="1">20060816</td>
            <td rowspan="1" colspan="1">ASV</td>
            <td rowspan="1" colspan="1">Created first draft per action item <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/2006/07/12-ws-policy-minutes.html#action02" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">2</loc> from the
              Austin F2F. This draft is based on a <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://lists.w3.org/Archives/Public/public-ws-policy/2006Jul/0001.html" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">contribution</loc> from Microsoft.</td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">20060829</td>
            <td rowspan="1" colspan="1">ASV</td>
            <td rowspan="1" colspan="1">Implemented the 
              <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/2006/08/23-ws-policy-minutes.html#action06" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">resolution</loc> 
              for issue 
              <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/Bugs/Public/show_bug.cgi?id=3561" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">3561</loc>: replaced URI with IRI.                	
            </td>
          </tr>   
            <tr>
            <td rowspan="1" colspan="1">20060919</td>
            <td rowspan="1" colspan="1">DBO</td>
            <td rowspan="1" colspan="1">Implemented the 
              <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/2005/06/tracker/wspolicyeds/actions/26" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">action 26</loc> 
             to add versioning material to primer.             	
            </td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">20060924</td>
            <td rowspan="1" colspan="1">TIB</td>
            <td rowspan="1" colspan="1">Implemented the 
              <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/2005/06/tracker/wspolicyeds/actions/35" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">editorial action 35</loc> 
              to move the Security Considerations section to the Framework document.
            </td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">20060924</td>
            <td rowspan="1" colspan="1">TIB</td>
            <td rowspan="1" colspan="1">Implemented the 
              <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://www.w3.org/2005/06/tracker/wspolicyeds/actions/36" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">editorial action 36</loc> 
              to insert a reference to the Security Considerations section from the Framework document.
            </td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">20060926</td>
            <td rowspan="1" colspan="1">PY</td>
            <td rowspan="1" colspan="1">Made a first pass at the changes to address issues
              <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://lists.w3.org/Archives/Public/public-ws-policy/2006Sep/0165.html" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">reported by Paul Cotton.</loc>
            </td>
          </tr>
          <tr>
            <td rowspan="1" colspan="1">20060928</td>
            <td rowspan="1" colspan="1">PY</td>
            <td rowspan="1" colspan="1">Completed making remaining changes to address issues
              <loc xmlns:xlink="http://www.w3.org/1999/xlink" href="http://lists.w3.org/Archives/Public/public-ws-policy/2006Sep/0165.html" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">reported by Paul Cotton.</loc>
              Fixing up the Acknowledgements is pending
            </td>
          </tr>
        </tbody>
      </table>
    </inform-div1>
  </back>
</spec>
