Author: buildbot
Date: Sun Jul  8 17:47:50 2012
New Revision: 825051

Log:
Production update by buildbot for cxf

Modified:
    websites/production/cxf/content/cache/docs.pageCache
    websites/production/cxf/content/docs/jax-rs-saml.html
    websites/production/cxf/content/docs/jax-rs.html
    websites/production/cxf/content/docs/saml-web-sso.html

Modified: websites/production/cxf/content/cache/docs.pageCache
==============================================================================
Binary files - no diff available.

Modified: websites/production/cxf/content/docs/jax-rs-saml.html
==============================================================================
--- websites/production/cxf/content/docs/jax-rs-saml.html (original)
+++ websites/production/cxf/content/docs/jax-rs-saml.html Sun Jul  8 17:47:50 
2012
@@ -705,7 +705,7 @@ If the assertion signature is verified l
 
 <h1><a shape="rect" name="JAX-RSSAML-SAMLWebSSOProfile"></a>SAML Web SSO 
Profile</h1>
 
-<p>Please see <a shape="rect" class="external-link" 
href="https://cwiki.apache.org/confluence/display/CXF20DOC/SAML+Web+SSO";>this 
page</a> for more information</p></div>
+<p>Please see <a shape="rect" href="saml-web-sso.html" title="SAML Web 
SSO">this page</a> for more information</p></div>
            </div>
            <!-- Content -->
          </td>

Modified: websites/production/cxf/content/docs/jax-rs.html
==============================================================================
--- websites/production/cxf/content/docs/jax-rs.html (original)
+++ websites/production/cxf/content/docs/jax-rs.html Sun Jul  8 17:47:50 2012
@@ -375,7 +375,7 @@ Please see the configuration sections be
 <h2><a shape="rect" name="JAX-RS-Testing"></a>Testing</h2>
 
 <p>JAX-RS services can be easily tested using the embedded Jetty or CXF Local 
Transport.<br clear="none">
-Please see the <span class="error">[JAXRS Testing]</span> page for more 
information.</p>
+Please see the <a shape="rect" class="external-link" 
href="https://cwiki.apache.org/confluence/display/CXF20DOC/JAXRS+Testing";>JAXRS 
Testing</a> page for more information.</p>
 
 <h2><a shape="rect" name="JAX-RS-Debugging"></a>Debugging</h2>
 

Modified: websites/production/cxf/content/docs/saml-web-sso.html
==============================================================================
--- websites/production/cxf/content/docs/saml-web-sso.html (original)
+++ websites/production/cxf/content/docs/saml-web-sso.html Sun Jul  8 17:47:50 
2012
@@ -125,7 +125,7 @@ Apache CXF -- SAML Web SSO
 
 
 <div>
-<ul><li><a shape="rect" 
href="#SAMLWebSSO-Introduction">Introduction</a></li><ul><li><a shape="rect" 
href="#SAMLWebSSO-TypicalFlow">Typical Flow</a></li></ul><li><a shape="rect" 
href="#SAMLWebSSO-Mavendependencies">Maven dependencies</a></li><li><a 
shape="rect" href="#SAMLWebSSO-IdentityProvider">Identity 
Provider</a></li><li><a shape="rect" 
href="#SAMLWebSSO-ServiceProviderSecurityFilter">Service Provider Security 
Filter</a></li><ul><li><a shape="rect" 
href="#SAMLWebSSO-RedirectBindingFilter">Redirect Binding Filter</a></li><li><a 
shape="rect" href="#SAMLWebSSO-POSTBindingFilter">POST Binding 
Filter</a></li><li><a shape="rect" 
href="#SAMLWebSSO-SigningSAMLAuthenticationRequests">Signing SAML 
Authentication Requests</a></li><li><a shape="rect" 
href="#SAMLWebSSO-FiltersandStateManagement">Filters and State 
Management</a></li></ul><li><a shape="rect" 
href="#SAMLWebSSO-RequestAssertionSecurityService">Request Assertion Security 
Service</a></li><ul><li><a shape="rect" href="#SAM
 LWebSSO-DealingwithsignedSAMLResponses">Dealing with signed SAML 
Responses</a></li></ul><li><a shape="rect" 
href="#SAMLWebSSO-SSOStateProvider">SSO State Provider</a></li></ul></div>
+<ul><li><a shape="rect" 
href="#SAMLWebSSO-Introduction">Introduction</a></li><ul><li><a shape="rect" 
href="#SAMLWebSSO-TypicalFlow">Typical Flow</a></li></ul><li><a shape="rect" 
href="#SAMLWebSSO-Mavendependencies">Maven dependencies</a></li><li><a 
shape="rect" href="#SAMLWebSSO-IdentityProvider">Identity 
Provider</a></li><li><a shape="rect" 
href="#SAMLWebSSO-ServiceProviderSecurityFilter">Service Provider Security 
Filter</a></li><ul><li><a shape="rect" 
href="#SAMLWebSSO-RedirectBindingFilter">Redirect Binding Filter</a></li><li><a 
shape="rect" href="#SAMLWebSSO-POSTBindingFilter">POST Binding 
Filter</a></li><li><a shape="rect" 
href="#SAMLWebSSO-SigningSAMLAuthenticationRequests">Signing SAML 
Authentication Requests</a></li><li><a shape="rect" 
href="#SAMLWebSSO-FiltersandStateManagement">Filters and State 
Management</a></li></ul><li><a shape="rect" 
href="#SAMLWebSSO-RequestAssertionConsumerService">Request Assertion Consumer 
Service</a></li><ul><li><a shape="rect" href="#SAM
 LWebSSO-DealingwithsignedSAMLResponses">Dealing with signed SAML 
Responses</a></li></ul><li><a shape="rect" 
href="#SAMLWebSSO-SSOStateProvider">SSO State Provider</a></li></ul></div>
 
 <h1><a shape="rect" name="SAMLWebSSO-Introduction"></a>Introduction</h1>
 
@@ -364,9 +364,9 @@ If the custom SP application is 'spread'
 
 <p>Note that the stateTimeToLive property affects a Cookie 'Expires' property 
but also used by filters and RACS to enforce that the internal state has not 
expired.</p>
 
-<h1><a shape="rect" 
name="SAMLWebSSO-RequestAssertionSecurityService"></a>Request Assertion 
Security Service</h1>
+<h1><a shape="rect" 
name="SAMLWebSSO-RequestAssertionConsumerService"></a>Request Assertion 
Consumer Service</h1>
 
-<p>Request Assertion Security Service receives a SAML Authentication Response 
and RelayState token from IDP, uses the token to validate the response against 
the data available in the original SAML Authentication Request, creates a 
security context if it does not already exists for<br clear="none">
+<p>Request Assertion Consumer Service receives a SAML Authentication Response 
and RelayState token from IDP, uses the token to validate the response against 
the data available in the original SAML Authentication Request, creates a 
security context if it does not already exists for<br clear="none">
 the current user, persists it and redirect the user back to the original 
endpoint. </p>
 
 <p>The RACS processes the SAML Response, and validates it in a number of 
ways:</p>


Reply via email to