I can't see the assertion in the header of the message. Could it be because
this information is encryptied?


The soap message is the following:


<soapenv:Envelope
xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"xmlns:xenc
="http://www.w3.org/2001/04/xmlenc#";>

<soapenv:Header xmlns:wsa="http://www.w3.org/2005/08/addressing";>

<wsse:Security xmlns:wsse="
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
" soapenv:mustUnderstand="1">

<wsu:Timestamp xmlns:wsu="
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
" wsu:Id="Timestamp-18655235">

<wsu:Created>2008-02-11T08:29:14.629Z</wsu:Created>

<wsu:Expires>2008-02-11T08:34:14.629Z</wsu:Expires>

</wsu:Timestamp>

<xenc:EncryptedKey Id="EncKeyId-9949215">

<xenc:EncryptionMethod Algorithm="
http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"/>

<ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#";>

<wsse:SecurityTokenReference>

<wsse:KeyIdentifier EncodingType="
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
" ValueType="
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
">HYL371NzoOs2+IA24VDkBGcUFQM=</wsse:KeyIdentifier>

</wsse:SecurityTokenReference>

</ds:KeyInfo>

<xenc:CipherData>

<xenc:CipherValue>
NS8hopFGnXC0p1Wma5EppZyhltrqoG/Xc6awAEYNoP8ZG7OCIbss4n9EbiKvE/Cc7qoJaJF7hbjp0fpTASStbb4/mABDSw6ZhYmS5VOgZpKnSyiX1DVeyWpXZkJmw2pFfZwXwlV0Z7zL05+TtY+fA/ofPBlUCnrBJFYOaeUYMlA=
</xenc:CipherValue>

</xenc:CipherData>

</xenc:EncryptedKey>

<xenc:ReferenceList/>

<ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"; Id="
Signature-18871350">

<ds:SignedInfo>

<ds:CanonicalizationMethod Algorithm="
http://www.w3.org/2001/10/xml-exc-c14n#"/>

<ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#hmac-sha1
"/>

<ds:Reference URI="#Id-14721926">

<ds:Transforms>

<ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>

</ds:Transforms>

<ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>

<ds:DigestValue>kTTbXVwC6Hqhw+aPoSClk+I1MQ8=</ds:DigestValue>

</ds:Reference>

<ds:Reference URI="#Timestamp-18655235">

<ds:Transforms>

<ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>

</ds:Transforms>

<ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>

<ds:DigestValue>QL1srEXsHEJxBVvISWC6qqC135Q=</ds:DigestValue>

</ds:Reference>

</ds:SignedInfo>

<ds:SignatureValue>Pl4+PwCkehIyXTKWaruQTsS7gGE=</ds:SignatureValue>

<ds:KeyInfo Id="KeyId-14301726">

<wsse:SecurityTokenReference xmlns:wsu="
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
" wsu:Id="STRId-18725445">

<wsse:Reference URI="#EncKeyId-9949215" ValueType="
http://docs.oasis-open.org/wss/2005/xx/oasis-2005xx-wss-soap-message-security-1.1#EncryptedKey
"/>

</wsse:SecurityTokenReference>

</ds:KeyInfo>

</ds:Signature>

</wsse:Security>

<wsa:To>http://localhost:8081/axis2/services/sample05?wsdl</wsa:To>

<wsa:MessageID>urn:uuid:7CD0DAE693C1E94AFF1202718554608</wsa:MessageID>

<wsa:Action>urn:echo</wsa:Action>

</soapenv:Header>

<soapenv:Body xmlns:wsu="
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
" wsu:Id="Id-14721926">

<ns1:echo xmlns:ns1="http://sample05.policy.samples.rampart.apache.org";>

<param0>Hello world1</param0>

</ns1:echo>

</soapenv:Body>

</soapenv:Envelope>



2008/2/12, Nandana Mihindukulasooriya <[EMAIL PROTECTED]>:
>
> Hi Nuria,
>
> > I've some doubts about SAML with axis2. I need to know if the sample05
> > covers all the the SAML cases.
>
> No, it covers only one scenario. For example, this uses SAML token as a
> supporting token. There is another scenarios where SAML token can be
> used as a protection token where it will be used to sign and encrypt
> messages.
>
> > We first receive the SAML token response then we indicate, in the
> options
> > the responseToken id
> > I don't know where we are sending to the server the SAML assertion in
> the
> > soapMessage
>
> When the id is set, Rampart message builders add the assertion to the
> security
> header according to the security policy. If you monitor the messages
> exchanged
> through TCPMon, then you can actually see the SAML assertion in the
> security
> header of the SOAP request to the service.
>
> > Another thing is to know what are the requestSecurityToken parameters.
>
> In the client, we set these parameters using RST template.
>
>    private static OMElement getRSTTemplate() throws Exception {
>        OMFactory fac = OMAbstractFactory.getOMFactory();
>        OMElement elem =
> fac.createOMElement(SP11Constants.REQUEST_SECURITY_TOKEN_TEMPLATE);
>        TrustUtil.createTokenTypeElement(RahasConstants.VERSION_05_02,
> elem).setText(RahasConstants.TOK_TYPE_SAML_10);
>        TrustUtil.createKeyTypeElement(RahasConstants.VERSION_05_02, elem,
> RahasConstants.KEY_TYPE_PUBLIC_KEY);
>        TrustUtil.createKeySizeElement(RahasConstants.VERSION_05_02, elem,
> 256);
>        return elem;
>    }
>
> These parameters are defined in the WS Trust specification [1].
>
> /nandana
>
> [1] - specs.xmlsoap.org/ws/2005/02/trust/WS-Trust.pdf
>
> http://nandana83.blogspot.com/
> http://nandanasm.wordpress.com/
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>

Reply via email to