Author: buildbot
Date: Fri Aug  3 09:47:31 2012
New Revision: 827795

Log:
Production update by buildbot for cxf

Modified:
    websites/production/cxf/content/cache/docs.pageCache
    websites/production/cxf/content/docs/ws-securitypolicy.html

Modified: websites/production/cxf/content/cache/docs.pageCache
==============================================================================
Binary files - no diff available.

Modified: websites/production/cxf/content/docs/ws-securitypolicy.html
==============================================================================
--- websites/production/cxf/content/docs/ws-securitypolicy.html (original)
+++ websites/production/cxf/content/docs/ws-securitypolicy.html Fri Aug  3 
09:47:31 2012
@@ -158,22 +158,27 @@ Apache CXF -- WS-SecurityPolicy
 </div>
 
 
-<h4><a shape="rect" 
name="WS-SecurityPolicy-Booleanconfigurationtags%2Ce.g.thevalueshouldbe%22true%22or%22false%22."></a>Boolean
 configuration tags, e.g. the value should be "true" or "false".</h4>
+<p><b>Note:</b> for Symmetric bindings that specify a protection token, the 
ws-security-encryption properties are used.</p>
+
+<h4><a shape="rect" 
name="WS-SecurityPolicy-BooleanWSSecurityconfigurationtags%2Ce.g.thevalueshouldbe%22true%22or%22false%22."></a>Boolean
 WS-Security configuration tags, e.g. the value should be "true" or 
"false".</h4>
 
 <div class="table-wrap">
 <table class="confluenceTable"><tbody><tr><td colspan="1" rowspan="1" 
class="confluenceTd"> ws-security.validate.token </td><td colspan="1" 
rowspan="1" class="confluenceTd"> Whether to validate the password of a 
received UsernameToken or not. The default is true.</td></tr><tr><td 
colspan="1" rowspan="1" class="confluenceTd"> ws-security.enableRevocation 
</td><td colspan="1" rowspan="1" class="confluenceTd"> Whether to enable 
Certificate Revocation List (CRL) checking or not when verifying trust in a 
certificate. The default value is "false".</td></tr><tr><td colspan="1" 
rowspan="1" class="confluenceTd"> ws-security.username-token.always.encrypted 
</td><td colspan="1" rowspan="1" class="confluenceTd"> Whether to always 
encrypt UsernameTokens whenever possible. The default is true.</td></tr><tr><td 
colspan="1" rowspan="1" class="confluenceTd"> ws-security.is-bsp-compliant 
</td><td colspan="1" rowspan="1" class="confluenceTd"> Whether to ensure 
compliance with the Basic Securit
 y Profile (BSP) 1.1 or not. The default value is "true". </td></tr><tr><td 
colspan="1" rowspan="1" class="confluenceTd"> 
ws-security.self-sign-saml-assertion </td><td colspan="1" rowspan="1" 
class="confluenceTd"> Whether to self-sign a SAML Assertion or not. If this is 
set to true, then an enveloped signature will be generated when the SAML 
Assertion is constructed. The default is false. </td></tr><tr><td colspan="1" 
rowspan="1" class="confluenceTd"> ws-security.enable.nonce.cache </td><td 
colspan="1" rowspan="1" class="confluenceTd"> Whether to cache UsernameToken 
nonces. See <a shape="rect" 
href="http://cxf.apache.org/javadoc/latest/org/apache/cxf/ws/security/SecurityConstants.html#ENABLE_NONCE_CACHE";>here</a>
 for more information.</td></tr><tr><td colspan="1" rowspan="1" 
class="confluenceTd"> ws-security.enable.timestamp.cache </td><td colspan="1" 
rowspan="1" class="confluenceTd"> Whether to cache Timestamp Created Strings. 
See <a shape="rect" href="http://cxf.apache.org/
 
javadoc/latest/org/apache/cxf/ws/security/SecurityConstants.html#ENABLE_TIMESTAMP_CACHE">here</a>
 for more information.</td></tr></tbody></table>
 </div>
 
 
-<h4><a shape="rect" name="WS-SecurityPolicy-Otherproperties"></a>Other 
properties</h4>
+<h4><a shape="rect" 
name="WS-SecurityPolicy-NonbooleanWSSecurityConfigurationparameters"></a>Non-boolean
 WS-Security Configuration parameters</h4>
 
 <div class="table-wrap">
-<table class="confluenceTable"><tbody><tr><td colspan="1" rowspan="1" 
class="confluenceTd"> ws-security.subject.cert.constraints </td><td colspan="1" 
rowspan="1" class="confluenceTd"> This configuration tag is a comma separated 
String of regular expressions which will be applied to the subject DN of the 
certificate used for signature validation, after trust verification of the 
certificate chain associated with the  certificate. These constraints are not 
used when the certificate is contained in the keystore (direct trust). 
</td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd"> 
ws-security.timestamp.futureTimeToLive </td><td colspan="1" rowspan="1" 
class="confluenceTd"> This configuration tag specifies the time in seconds in 
the future within which the Created time of an incoming Timestamp is valid. 
WSS4J rejects by default any timestamp which is "Created" in the future, and so 
there could potentially be<br clear="none" class="atl-forced-newline">
- problems in a scenario where a client's clock is slightly askew. The default 
value for this parameter is "0", meaning that no future-created Timestamps are 
allowed. </td></tr></tbody></table>
+<table class="confluenceTable"><tbody><tr><td colspan="1" rowspan="1" 
class="confluenceTd"> ws-security.timestamp.timeToLive </td><td colspan="1" 
rowspan="1" class="confluenceTd"> The time in seconds after Creation that an 
incoming Timestamp is valid for. The default value is 300 seconds (5 
minutes).</td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd"> 
ws-security.timestamp.futureTimeToLive </td><td colspan="1" rowspan="1" 
class="confluenceTd"> The time in seconds in the future within which the 
Created time of an incoming Timestamp is valid. The default value is "60". See 
<a shape="rect" 
href="http://cxf.apache.org/javadoc/latest/org/apache/cxf/ws/security/SecurityConstants.html#TIMESTAMP_FUTURE_TTL";>here</a>
 for more information.</td></tr><tr><td colspan="1" rowspan="1" 
class="confluenceTd"> ws-security.saml-role-attributename </td><td colspan="1" 
rowspan="1" class="confluenceTd"> The attribute URI of the SAML 
AttributeStatement where the role information is store
 d. The default is 
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/role";.</td></tr><tr><td 
colspan="1" rowspan="1" class="confluenceTd"> ws-security.kerberos.client 
</td><td colspan="1" rowspan="1" class="confluenceTd"> A reference to the 
KerberosClient class used to obtain a service ticket.</td></tr><tr><td 
colspan="1" rowspan="1" class="confluenceTd"> ws-security.spnego.client.action 
</td><td colspan="1" rowspan="1" class="confluenceTd"> The SpnegoClientAction 
implementation to use for SPNEGO. This allows the user to plug in a different 
implementation to obtain a service ticket.</td></tr><tr><td colspan="1" 
rowspan="1" class="confluenceTd"> ws-security.kerberos.jaas.context </td><td 
colspan="1" rowspan="1" class="confluenceTd"> The JAAS Context name to use for 
Kerberos. This is currently only supported for SPNEGO.</td></tr><tr><td 
colspan="1" rowspan="1" class="confluenceTd"> ws-security.kerberos.spn </td><td 
colspan="1" rowspan="1" class="confluenceTd"> The Kerberos
  Service Provider Name (spn) to use. This is currently only supported for 
SPNEGO.</td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd"> 
ws-security.nonce.cache.instance </td><td colspan="1" rowspan="1" 
class="confluenceTd"> This holds a reference to a ReplayCache instance used to 
cache UsernameToken nonces. The default instance that is used is the 
EHCacheReplayCache.</td></tr><tr><td colspan="1" rowspan="1" 
class="confluenceTd"> ws-security.timestamp.cache.instance </td><td colspan="1" 
rowspan="1" class="confluenceTd"> This holds a reference to a ReplayCache 
instance used to cache Timestamp Created Strings. The default instance that is 
used is the EHCacheReplayCache.</td></tr><tr><td colspan="1" rowspan="1" 
class="confluenceTd"> ws-security.cache.config.file </td><td colspan="1" 
rowspan="1" class="confluenceTd"> Set this property to point to a configuration 
file for the underlying caching implementation. The default configuration file 
that is used is cxf-ehcache.xml
  in the cxf-rt-ws-security module.</td></tr><tr><td colspan="1" rowspan="1" 
class="confluenceTd"> org.apache.cxf.ws.security.tokenstore.TokenStore </td><td 
colspan="1" rowspan="1" class="confluenceTd">  The TokenStore instance to use 
to cache security tokens. By default this uses the EHCacheTokenStore if EhCache 
is available. Otherwise it uses the MemoryTokenStore.</td></tr><tr><td 
colspan="1" rowspan="1" class="confluenceTd"> 
ws-security.subject.cert.constraints </td><td colspan="1" rowspan="1" 
class="confluenceTd"> A comma separated String of regular expressions which 
will be applied to the subject DN of the certificate used for signature 
validation, after trust verification of the certificate chain associated with 
the  certificate. These constraints are not used when the certificate is 
contained in the keystore (direct trust). </td></tr></tbody></table>
 </div>
 
 
-<p><b>Note:</b> for Symmetric bindings that specify a protection token, the 
ws-security-encryption properties are used.</p>
+<h4><a shape="rect" 
name="WS-SecurityPolicy-Validatorimplementationsforvalidatingreceivedsecuritytokens"></a>Validator
 implementations for validating received security tokens</h4>
+
+<div class="table-wrap">
+<table class="confluenceTable"><tbody><tr><td colspan="1" rowspan="1" 
class="confluenceTd"> ws-security.ut.validator </td><td colspan="1" rowspan="1" 
class="confluenceTd"> The WSS4J Validator instance to use to validate 
UsernameTokens. The default value is the <a shape="rect" class="external-link" 
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/UsernameTokenValidator.html";>UsernameTokenValidator</a>.</td></tr><tr><td
 colspan="1" rowspan="1" class="confluenceTd"> ws-security.saml1.validator 
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J Validator 
instance to use to validate SAML 1.1 Tokens. The default value is the <a 
shape="rect" class="external-link" 
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/SamlAssertionValidator.html";>SamlAssertionValidator</a>.</td></tr><tr><td
 colspan="1" rowspan="1" class="confluenceTd"> ws-security.saml2.validator 
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J 
 Validator instance to use to validate SAML 2.0 Tokens. The default value is 
the <a shape="rect" class="external-link" 
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/SamlAssertionValidator.html";>SamlAssertionValidator</a>.</td></tr><tr><td
 colspan="1" rowspan="1" class="confluenceTd"> ws-security.timestamp.validator 
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J Validator 
instance to use to validate Timestamps. The default value is the <a 
shape="rect" class="external-link" 
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/TimestampValidator.html";>TimestampValidator</a>.</td></tr><tr><td
 colspan="1" rowspan="1" class="confluenceTd"> ws-security.signature.validator 
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J Validator 
instance to use to validate trust in credentials used in Signature 
verification. The default value is the <a shape="rect" class="external-link" 
href="http://ws.apache.org/wss4j
 
/apidocs/org/apache/ws/security/validate/SignatureTrustValidator.html">SignatureTrustValidator</a>.</td></tr><tr><td
 colspan="1" rowspan="1" class="confluenceTd"> ws-security.bst.validator 
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J Validator 
instance to use to validate BinarySecurityTokens. The default value is the <a 
shape="rect" class="external-link" 
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/NoOpValidator.html";>NoOpValidator</a>.</td></tr><tr><td
 colspan="1" rowspan="1" class="confluenceTd"> ws-security.sct.validator 
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J Validator 
instance to use to validate SecurityContextTokens. The default value is the <a 
shape="rect" class="external-link" 
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/NoOpValidator.html";>NoOpValidator</a>.</td></tr></tbody></table>
+</div>
 
 
 <h4><a shape="rect" 
name="WS-SecurityPolicy-ConfiguringviaSpring"></a>Configuring via Spring</h4>


Reply via email to