... ofKerberos, 149Constrained Delegation, 158 impersonation, 155 – 158 Kerberos protocol, 146securing client application, 153 – 155 securing Web service, 151 – 152 setting up environment, 150 workings of Kerberos, ... agent, 75 76business assembly, 80–81external Web service, 78implementing SOA applicationusing service agent, 76, 78service agent, 78, 80introduction, 57 steps in building, 57 –63■INDEX240701xIndex.qxd ... 137–1 45 implementing with Kerberos, 146– 158 business assemblycalling service agent, 80–81creating, 61, 66–68importing into Web service, 62business layer, encapsulates serviceinterfaces, 7business...