Author: buildbot
Date: Fri Aug 3 09:47:31 2012
New Revision: 827795
Log:
Production update by buildbot for cxf
Modified:
websites/production/cxf/content/cache/docs.pageCache
websites/production/cxf/content/docs/ws-securitypolicy.html
Modified: websites/production/cxf/content/cache/docs.pageCache
==============================================================================
Binary files - no diff available.
Modified: websites/production/cxf/content/docs/ws-securitypolicy.html
==============================================================================
--- websites/production/cxf/content/docs/ws-securitypolicy.html (original)
+++ websites/production/cxf/content/docs/ws-securitypolicy.html Fri Aug 3
09:47:31 2012
@@ -158,22 +158,27 @@ Apache CXF -- WS-SecurityPolicy
</div>
-<h4><a shape="rect"
name="WS-SecurityPolicy-Booleanconfigurationtags%2Ce.g.thevalueshouldbe%22true%22or%22false%22."></a>Boolean
configuration tags, e.g. the value should be "true" or "false".</h4>
+<p><b>Note:</b> for Symmetric bindings that specify a protection token, the
ws-security-encryption properties are used.</p>
+
+<h4><a shape="rect"
name="WS-SecurityPolicy-BooleanWSSecurityconfigurationtags%2Ce.g.thevalueshouldbe%22true%22or%22false%22."></a>Boolean
WS-Security configuration tags, e.g. the value should be "true" or
"false".</h4>
<div class="table-wrap">
<table class="confluenceTable"><tbody><tr><td colspan="1" rowspan="1"
class="confluenceTd"> ws-security.validate.token </td><td colspan="1"
rowspan="1" class="confluenceTd"> Whether to validate the password of a
received UsernameToken or not. The default is true.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.enableRevocation
</td><td colspan="1" rowspan="1" class="confluenceTd"> Whether to enable
Certificate Revocation List (CRL) checking or not when verifying trust in a
certificate. The default value is "false".</td></tr><tr><td colspan="1"
rowspan="1" class="confluenceTd"> ws-security.username-token.always.encrypted
</td><td colspan="1" rowspan="1" class="confluenceTd"> Whether to always
encrypt UsernameTokens whenever possible. The default is true.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.is-bsp-compliant
</td><td colspan="1" rowspan="1" class="confluenceTd"> Whether to ensure
compliance with the Basic Securit
y Profile (BSP) 1.1 or not. The default value is "true". </td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd">
ws-security.self-sign-saml-assertion </td><td colspan="1" rowspan="1"
class="confluenceTd"> Whether to self-sign a SAML Assertion or not. If this is
set to true, then an enveloped signature will be generated when the SAML
Assertion is constructed. The default is false. </td></tr><tr><td colspan="1"
rowspan="1" class="confluenceTd"> ws-security.enable.nonce.cache </td><td
colspan="1" rowspan="1" class="confluenceTd"> Whether to cache UsernameToken
nonces. See <a shape="rect"
href="http://cxf.apache.org/javadoc/latest/org/apache/cxf/ws/security/SecurityConstants.html#ENABLE_NONCE_CACHE">here</a>
for more information.</td></tr><tr><td colspan="1" rowspan="1"
class="confluenceTd"> ws-security.enable.timestamp.cache </td><td colspan="1"
rowspan="1" class="confluenceTd"> Whether to cache Timestamp Created Strings.
See <a shape="rect" href="http://cxf.apache.org/
javadoc/latest/org/apache/cxf/ws/security/SecurityConstants.html#ENABLE_TIMESTAMP_CACHE">here</a>
for more information.</td></tr></tbody></table>
</div>
-<h4><a shape="rect" name="WS-SecurityPolicy-Otherproperties"></a>Other
properties</h4>
+<h4><a shape="rect"
name="WS-SecurityPolicy-NonbooleanWSSecurityConfigurationparameters"></a>Non-boolean
WS-Security Configuration parameters</h4>
<div class="table-wrap">
-<table class="confluenceTable"><tbody><tr><td colspan="1" rowspan="1"
class="confluenceTd"> ws-security.subject.cert.constraints </td><td colspan="1"
rowspan="1" class="confluenceTd"> This configuration tag is a comma separated
String of regular expressions which will be applied to the subject DN of the
certificate used for signature validation, after trust verification of the
certificate chain associated with the certificate. These constraints are not
used when the certificate is contained in the keystore (direct trust).
</td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd">
ws-security.timestamp.futureTimeToLive </td><td colspan="1" rowspan="1"
class="confluenceTd"> This configuration tag specifies the time in seconds in
the future within which the Created time of an incoming Timestamp is valid.
WSS4J rejects by default any timestamp which is "Created" in the future, and so
there could potentially be<br clear="none" class="atl-forced-newline">
- problems in a scenario where a client's clock is slightly askew. The default
value for this parameter is "0", meaning that no future-created Timestamps are
allowed. </td></tr></tbody></table>
+<table class="confluenceTable"><tbody><tr><td colspan="1" rowspan="1"
class="confluenceTd"> ws-security.timestamp.timeToLive </td><td colspan="1"
rowspan="1" class="confluenceTd"> The time in seconds after Creation that an
incoming Timestamp is valid for. The default value is 300 seconds (5
minutes).</td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd">
ws-security.timestamp.futureTimeToLive </td><td colspan="1" rowspan="1"
class="confluenceTd"> The time in seconds in the future within which the
Created time of an incoming Timestamp is valid. The default value is "60". See
<a shape="rect"
href="http://cxf.apache.org/javadoc/latest/org/apache/cxf/ws/security/SecurityConstants.html#TIMESTAMP_FUTURE_TTL">here</a>
for more information.</td></tr><tr><td colspan="1" rowspan="1"
class="confluenceTd"> ws-security.saml-role-attributename </td><td colspan="1"
rowspan="1" class="confluenceTd"> The attribute URI of the SAML
AttributeStatement where the role information is store
d. The default is
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/role".</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.kerberos.client
</td><td colspan="1" rowspan="1" class="confluenceTd"> A reference to the
KerberosClient class used to obtain a service ticket.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.spnego.client.action
</td><td colspan="1" rowspan="1" class="confluenceTd"> The SpnegoClientAction
implementation to use for SPNEGO. This allows the user to plug in a different
implementation to obtain a service ticket.</td></tr><tr><td colspan="1"
rowspan="1" class="confluenceTd"> ws-security.kerberos.jaas.context </td><td
colspan="1" rowspan="1" class="confluenceTd"> The JAAS Context name to use for
Kerberos. This is currently only supported for SPNEGO.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.kerberos.spn </td><td
colspan="1" rowspan="1" class="confluenceTd"> The Kerberos
Service Provider Name (spn) to use. This is currently only supported for
SPNEGO.</td></tr><tr><td colspan="1" rowspan="1" class="confluenceTd">
ws-security.nonce.cache.instance </td><td colspan="1" rowspan="1"
class="confluenceTd"> This holds a reference to a ReplayCache instance used to
cache UsernameToken nonces. The default instance that is used is the
EHCacheReplayCache.</td></tr><tr><td colspan="1" rowspan="1"
class="confluenceTd"> ws-security.timestamp.cache.instance </td><td colspan="1"
rowspan="1" class="confluenceTd"> This holds a reference to a ReplayCache
instance used to cache Timestamp Created Strings. The default instance that is
used is the EHCacheReplayCache.</td></tr><tr><td colspan="1" rowspan="1"
class="confluenceTd"> ws-security.cache.config.file </td><td colspan="1"
rowspan="1" class="confluenceTd"> Set this property to point to a configuration
file for the underlying caching implementation. The default configuration file
that is used is cxf-ehcache.xml
in the cxf-rt-ws-security module.</td></tr><tr><td colspan="1" rowspan="1"
class="confluenceTd"> org.apache.cxf.ws.security.tokenstore.TokenStore </td><td
colspan="1" rowspan="1" class="confluenceTd"> The TokenStore instance to use
to cache security tokens. By default this uses the EHCacheTokenStore if EhCache
is available. Otherwise it uses the MemoryTokenStore.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd">
ws-security.subject.cert.constraints </td><td colspan="1" rowspan="1"
class="confluenceTd"> A comma separated String of regular expressions which
will be applied to the subject DN of the certificate used for signature
validation, after trust verification of the certificate chain associated with
the certificate. These constraints are not used when the certificate is
contained in the keystore (direct trust). </td></tr></tbody></table>
</div>
-<p><b>Note:</b> for Symmetric bindings that specify a protection token, the
ws-security-encryption properties are used.</p>
+<h4><a shape="rect"
name="WS-SecurityPolicy-Validatorimplementationsforvalidatingreceivedsecuritytokens"></a>Validator
implementations for validating received security tokens</h4>
+
+<div class="table-wrap">
+<table class="confluenceTable"><tbody><tr><td colspan="1" rowspan="1"
class="confluenceTd"> ws-security.ut.validator </td><td colspan="1" rowspan="1"
class="confluenceTd"> The WSS4J Validator instance to use to validate
UsernameTokens. The default value is the <a shape="rect" class="external-link"
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/UsernameTokenValidator.html">UsernameTokenValidator</a>.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.saml1.validator
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J Validator
instance to use to validate SAML 1.1 Tokens. The default value is the <a
shape="rect" class="external-link"
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/SamlAssertionValidator.html">SamlAssertionValidator</a>.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.saml2.validator
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J
Validator instance to use to validate SAML 2.0 Tokens. The default value is
the <a shape="rect" class="external-link"
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/SamlAssertionValidator.html">SamlAssertionValidator</a>.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.timestamp.validator
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J Validator
instance to use to validate Timestamps. The default value is the <a
shape="rect" class="external-link"
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/TimestampValidator.html">TimestampValidator</a>.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.signature.validator
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J Validator
instance to use to validate trust in credentials used in Signature
verification. The default value is the <a shape="rect" class="external-link"
href="http://ws.apache.org/wss4j
/apidocs/org/apache/ws/security/validate/SignatureTrustValidator.html">SignatureTrustValidator</a>.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.bst.validator
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J Validator
instance to use to validate BinarySecurityTokens. The default value is the <a
shape="rect" class="external-link"
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/NoOpValidator.html">NoOpValidator</a>.</td></tr><tr><td
colspan="1" rowspan="1" class="confluenceTd"> ws-security.sct.validator
</td><td colspan="1" rowspan="1" class="confluenceTd"> The WSS4J Validator
instance to use to validate SecurityContextTokens. The default value is the <a
shape="rect" class="external-link"
href="http://ws.apache.org/wss4j/apidocs/org/apache/ws/security/validate/NoOpValidator.html">NoOpValidator</a>.</td></tr></tbody></table>
+</div>
<h4><a shape="rect"
name="WS-SecurityPolicy-ConfiguringviaSpring"></a>Configuring via Spring</h4>