Author: buildbot
Date: Tue Sep 27 09:51:46 2016
New Revision: 998367

Log:
Production update by buildbot for cxf

Modified:
    websites/production/cxf/content/cache/docs.pageCache
    websites/production/cxf/content/docs/ws-trust.html

Modified: websites/production/cxf/content/cache/docs.pageCache
==============================================================================
Binary files - no diff available.

Modified: websites/production/cxf/content/docs/ws-trust.html
==============================================================================
--- websites/production/cxf/content/docs/ws-trust.html (original)
+++ websites/production/cxf/content/docs/ws-trust.html Tue Sep 27 09:51:46 2016
@@ -211,7 +211,7 @@ org.apache.ws.security.crypto.merlin.key
     </property>
 </bean>
 </pre>
-</div></div><h3 id="WS-Trust-OnBehalfOf">OnBehalfOf</h3><p>The OnBehalfOf 
capability allows an initiator to request a security token on behalf of 
somebody else. The content of the OnBehalfOf element to be sent in the STS 
RequestSecurityToken call can be set in one of two ways:</p><ol><li>By 
specifying a value for the JAX-WS property 
SecurityConstants.STS_TOKEN_ON_BEHALF_OF 
("ws-security.sts.token.on-behalf-of")</li><li>By specifying a value for the 
STSClient.onBehalfOf property.</li></ol><p>For either case, the value can be 
one of the following:</p><ul><li>A String</li><li>A DOM Element</li><li>A 
CallbackHandler object to use to obtain the token</li></ul><h2 
id="WS-Trust-WS-TrustusingSPNego">WS-Trust using SPNego</h2><p>As of CXF 2.4.7 
and 2.5.3, CXF contains (client) support for WS-Trust using SPNego. See the 
following <a shape="rect" class="external-link" 
href="http://coheigea.blogspot.com/2012/02/ws-trust-spnego-support-in-apache-cxf.html";
 rel="nofollow">blog</a> for an explanati
 on of what this entails, and how to run some system tests in CXF for this 
feature.</p><h2 id="WS-Trust-WS-TrustusingXKMS">WS-Trust using 
XKMS</h2><p>Since CXF 2.7.7 Security Token Service (STS) can be configured to 
use <a shape="rect" href="xml-key-management-service-xkms.html">XKMS </a>Crypto 
provider. In this case X509 certificates can be located centrally and managed 
using standard XKMS interface. STS will automatically invoke XKMS client for 
locate or validate corresponded X509 certificate. See the following <a 
shape="rect" class="external-link" 
href="http://ashakirin.blogspot.de/2013/07/cxf-security-integrate-pki-to-security.html";
 rel="nofollow">blog</a> for the details and sample.</p><p>This feature can be 
especially useful for STS scenario with SymmetricKey. With this scenario, the 
STS and the WS consumer negotiate a symmetric key:</p><ol><li>The WS-Client 
authenticates himself to STS and contributes material to the creation of 
symmetric key.</li><li>The STS verifies WS-Clien
 t authentication and generates symmetric key using material received from 
WS-Client</li><li>The STS encrypts symmetric key using WS-Service public key 
and inserts the encrypted key together with security token into SAML 
assertion</li><li>The STS signs SAML assertion and sends it together with key 
material for generation symmetric key to the WS-Client.</li><li>The WS-Client 
generates short-lived symmetric key from own material and the key material from 
the STS.</li><li>The WS-Client inserts the SAML token, into the message header. 
It encrypts the message texts or/and signs the message with the generated 
symmetric key. It then sends the user's message to the WS-Service.</li><li>The 
WS-Service checks the signature in the SAML token and uses its private key to 
decrypt the symmetric key contained in the SAML token.</li><li>The WS-Service 
verifies the signature of the WS-Client (Holder-of-Key) with the decrypted 
symmetric key. In this way, the STS confirms that the Holder-of-Key is the su
 bject (the user) in the assertion.</li><li>The WS-Service uses the symmetric 
key to decrypt the message text.</li></ol><p>On the step (3) STS needs the 
public key (certificate) of target WS-Service. Normally STS servers not only 
one, but multiple services (restricted by url patterns in 
TokenServiceProvider). This can be a serious drawback to manage public 
certificates of all services into STS local keystore.</p><p>XKMS Crypto 
provider provides elegant solution of this using following 
configuration:</p><ul><li>encryptionUsername (in StaticSTSProperties or 
jaxws:endpoint properties) should be set into special value: 
<em>useEndpointAsCertAlias</em> 
(STSConstants.USE_ENDPOINT_AS_CERT_ALIAS)</li><li>encryptionCrypto should be 
set to XKMS Crypto implementation</li><li>Service certificates should be saved 
into XKMS under service endpoint (use Application <a shape="rect" 
class="external-link" href="http://urnapachecxfservice:endpoint"; 
rel="nofollow">"<em>urn:apache:cxf:service:endpoint</em>
 </a>" and service endpoint as identifier)</li></ul><p>In this case STS 
recognizes encryptionName constant and will ask XKMS Crypto for the service 
certificate using AppliesTo endpoint address.&#160;XKMS will locate service 
certificate using this endpoint address.</p><p>STS can server multiple 
WS-Services and doesn't care about services certificates locally - they are 
stored and managed in central XKMS repository.</p><p>The following <a 
shape="rect" class="external-link" 
href="http://ashakirin.blogspot.de/2013/07/cxf-security-integrate-pki-to-security.html";
 rel="nofollow">blog</a> explains the details and contains the sample 
code.</p><h2 id="WS-Trust-BlogsonWS-TrustinCXF">Blogs on WS-Trust in 
CXF</h2><p>Some blogs for up-to-date information about WS-Trust and other 
security topics in CXF:<br clear="none"> <a shape="rect" class="external-link" 
href="http://coheigea.blogspot.com/"; 
rel="nofollow">http://coheigea.blogspot.com/</a><br clear="none"> <a 
shape="rect" class="external-link" hr
 ef="http://owulff.blogspot.com/"; 
rel="nofollow">http://owulff.blogspot.com/</a></p></div>
+</div></div><h3 id="WS-Trust-OnBehalfOf">OnBehalfOf</h3><p>The OnBehalfOf 
capability allows an initiator to request a security token on behalf of 
somebody else. The content of the OnBehalfOf element to be sent in the STS 
RequestSecurityToken call can be set in one of two ways:</p><ol><li>By 
specifying a value for the JAX-WS property 
SecurityConstants.STS_TOKEN_ON_BEHALF_OF 
("ws-security.sts.token.on-behalf-of")</li><li>By specifying a value for the 
STSClient.onBehalfOf property.</li></ol><p>For either case, the value can be 
one of the following:</p><ul><li>A String</li><li>A DOM Element</li><li>A 
CallbackHandler object to use to obtain the token</li></ul><h2 
id="WS-Trust-WS-TrustusingSPNego">WS-Trust using SPNego</h2><p>As of CXF 2.4.7 
and 2.5.3, CXF contains (client) support for WS-Trust using SPNego. See the 
following <a shape="rect" class="external-link" 
href="http://coheigea.blogspot.com/2012/02/ws-trust-spnego-support-in-apache-cxf.html";
 rel="nofollow">blog</a> for an explanati
 on of what this entails, and how to run some system tests in CXF for this 
feature.</p><h2 id="WS-Trust-WS-TrustusingXKMS">WS-Trust using 
XKMS</h2><p>Since CXF 2.7.7 Security Token Service (STS) can be configured to 
use <a shape="rect" href="xml-key-management-service-xkms.html">XKMS </a>Crypto 
provider. In this case X509 certificates can be located centrally and managed 
using standard XKMS interface. STS will automatically invoke XKMS client for 
locate or validate corresponded X509 certificate. See the following <a 
shape="rect" class="external-link" 
href="http://ashakirin.blogspot.de/2013/07/cxf-security-integrate-pki-to-security.html";
 rel="nofollow">blog</a> for the details and sample.</p><p>This feature can be 
especially useful for STS scenario with SymmetricKey. With this scenario, the 
STS and the WS consumer negotiate a symmetric key:</p><ol><li>The WS-Client 
authenticates himself to STS and contributes material to the creation of 
symmetric key.</li><li>The STS verifies WS-Clien
 t authentication and generates symmetric key using material received from 
WS-Client</li><li>The STS encrypts symmetric key using WS-Service public key 
and inserts the encrypted key together with security token into SAML 
assertion</li><li>The STS signs SAML assertion and sends it together with key 
material for generation symmetric key to the WS-Client.</li><li>The WS-Client 
generates short-lived symmetric key from own material and the key material from 
the STS.</li><li>The WS-Client inserts the SAML token, into the message header. 
It encrypts the message texts or/and signs the message with the generated 
symmetric key. It then sends the user's message to the WS-Service.</li><li>The 
WS-Service checks the signature in the SAML token and uses its private key to 
decrypt the symmetric key contained in the SAML token.</li><li>The WS-Service 
verifies the signature of the WS-Client (Holder-of-Key) with the decrypted 
symmetric key. In this way, the STS confirms that the Holder-of-Key is the su
 bject (the user) in the assertion.</li><li>The WS-Service uses the symmetric 
key to decrypt the message text.</li></ol><p>On the step (3) STS needs the 
public key (certificate) of target WS-Service. Normally STS servers not only 
one, but multiple services (restricted by url patterns in 
TokenServiceProvider). This can be a serious drawback to manage public 
certificates of all services into STS local keystore.</p><p>XKMS Crypto 
provider provides elegant solution of this using following 
configuration:</p><ul><li>encryptionUsername (in StaticSTSProperties or 
jaxws:endpoint properties) should be set into special value: 
<em>useEndpointAsCertAlias</em> 
(STSConstants.USE_ENDPOINT_AS_CERT_ALIAS)</li><li>encryptionCrypto should be 
set to XKMS Crypto implementation</li><li>Service certificates should be saved 
into XKMS under service endpoint (use Application <a shape="rect" 
class="external-link" href="http://urnapachecxfserviceendpoint"; 
rel="nofollow">"<em>urn:apache:cxf:service:endpoint</em><
 /a>" and service endpoint as identifier)</li></ul><p>In this case STS 
recognizes encryptionName constant and will ask XKMS Crypto for the service 
certificate using AppliesTo endpoint address.&#160;XKMS will locate service 
certificate using this endpoint address.</p><p>STS can server multiple 
WS-Services and doesn't care about services certificates locally - they are 
stored and managed in central XKMS repository.</p><p>The following <a 
shape="rect" class="external-link" 
href="http://ashakirin.blogspot.de/2013/07/cxf-security-integrate-pki-to-security.html";
 rel="nofollow">blog</a> explains the details and contains the sample 
code.</p><h2 id="WS-Trust-BlogsonWS-TrustinCXF">Blogs on WS-Trust in 
CXF</h2><p>Some blogs for up-to-date information about WS-Trust and other 
security topics in CXF:<br clear="none"> <a shape="rect" class="external-link" 
href="http://coheigea.blogspot.com/"; 
rel="nofollow">http://coheigea.blogspot.com/</a><br clear="none"> <a 
shape="rect" class="external-link" hre
 f="http://owulff.blogspot.com/"; 
rel="nofollow">http://owulff.blogspot.com/</a><br clear="none"><a shape="rect" 
class="external-link" href="http://janbernhardt.blogspot.com/"; 
rel="nofollow">http://janbernhardt.blogspot.com/</a></p></div>
            </div>
            <!-- Content -->
          </td>


Reply via email to