[ 
https://issues.apache.org/jira/browse/WSS-509?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Colm O hEigeartaigh closed WSS-509.
-----------------------------------

    Resolution: Won't Fix

> SecurityToken::isExpired: add clock skew option
> -----------------------------------------------
>
>                 Key: WSS-509
>                 URL: https://issues.apache.org/jira/browse/WSS-509
>             Project: WSS4J
>          Issue Type: Improvement
>          Components: WSS4J Core
>    Affects Versions: 1.6.16
>            Reporter: Willem Salembier
>            Assignee: Colm O hEigeartaigh
>             Fix For: 1.6.17
>
>
> We notice race conditions with some of our clients when CXF verifies if 
> SecurityTokens cached locally are still valid or expired. One reason could be 
> clock desynchronization, another reason is that while the token was still 
> valid at the moment of request construction, it isn't when the SOAP message 
> arrives on the server (1s difference suffices).
> Is it possible to add a clock skew option to 
> org.apache.cxf.ws.security.tokenstore.SecurityToken.isExpired() cfr whats 
> been done in 
> org.apache.ws.security.validate.SamlAssertionValidator.checkConditions(AssertionWrapper)
>  with the futureTTL property. In SamlAssertionValidator the futureTTl is only 
> used in the validFrom comparison, but in our case it should be considered 
> also in the validTill comparison.
> A possible workaround is to configure our STS to initialize Lifetime>Expires 
> in the RSTR response to SAMLAssertion > Conditions > NotOnOrAfter - clock 
> skew.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to