Dear Wiki user,

You have subscribed to a wiki page or wiki category on "Ws Wiki" for change 
notification.

The following page has been changed by RichardUnger:
http://wiki.apache.org/ws/FrontPage/Axis/DynamicSSLConfig

------------------------------------------------------------------------------
- 
  The following describes a setup for dynamically choosing the client 
certificate used for SSL Authentication from an Axis Client.
  
  This method has been tested using Axis 1.4 and Java 1.5 under Tomcat 5.5.20 
and WebSphere 6.1.
@@ -11, +10 @@

  
  Sometimes this model is insufficient:
  
- * Perhaps more than one service needs to be accessed by the client, and the 
client is not free to choose the certificates used for access. In this case the 
client will need to work with the (multiple) certificates provided.
+  * Perhaps more than one service needs to be accessed by the client, and the 
client is not free to choose the certificates used for access. In this case the 
client will need to work with the (multiple) certificates provided.
- * In some cases the client will be acting "on behalf" of more than one user, 
and will want to employ the different user's different certificates to 
authenticate against backend systems.
+  * In some cases the client will be acting "on behalf" of more than one user, 
and will want to employ the different user's different certificates to 
authenticate against backend systems.
  
  Whatever the reason, sometimes the "one client, one certificate" model is not 
applicable. In this case, the client has to work, dynamically at run-time, with 
more than one certificate at a time.
  
@@ -20, +19 @@

  
  In its current implementation, the SSL Transport for Axis has several 
shortcomings:
  
- * The base SecureSocketFactory cannot be configured dynamically. It is 
configured using environment variables, which is not suitable if it is desired 
to change the client certificate at run-time.
+  * The base SecureSocketFactory (JSSESocketFactory) cannot be configured 
dynamically. It is configured using environment variables, which is not 
suitable if it is desired to change the client certificate at run-time.
- * The SunJSSESecureSocketFactory is more configurable, accepting a keyfile 
parameter from the Axis configuration at run-time. However, this 
+  * The SunJSSESocketFactory is more configurable, accepting a keyfile 
parameter from the Axis configuration at run-time. This is the one to use, 
however, by itself it does not do all that we need, so we have provided an 
extension of this class (see below)...
+  * Even the SunJSSESocketFactory does not accept all the configurations we 
need (eg: truststore config)
+  * Even were the SocketFactory fully configurable to our desires, dynamic 
configuration at runtime would not be possible. This is beacause Axis caches 
the instantiated SocketFactories, meaning settings are applied only once. 
+  * The cacheing of SocketFactories occurs in a component called 
SocketFactoryFactory, the cache remembers one entry per protocol. So, the 
moment you make the first call over https, a SocketFactory is created for the 
protocol https using the currently configured parameters. After this no new 
SocketFactories are created for https, even if the parameters (eg keystore 
name) change.
  
+ So, it seems we are in a bind if we want to enable dynamic runtime selection 
of the client certificate.
  
  === The Solution ===
  
+ The solution depends on a few modified classes for Apache Axis. In particular 
the solution consists of:
+  * A modified SocketFactoryFactory, which implements a cacheing scheme in 
which the keystore name is considered
+  * An extension to SunJSSESocketFactory which allows more configuration from 
Axis
+  * An Axis EngineConfiguration class, '''SSLClientAxisConfig''', which holds 
the SSL paramters, and sets everything up
+ 
+ Together, use of these components allows the desired dynamic configuration.
+ 
+ === Usage / Configuration ===
+ 
+ To set up dynamic certificates for your axis client, proceed as follows:
+ 
+  1. Replace the SocketFactoryFactory class with your new version. This can be 
done in one of three ways (method 1 is safest):
+    1. Find the original class file within axis.jar (it lives in 
org/apache/axis/components/net) and delete it, replace it with the modified 
class file
+    1. Place the modified class file in a new JAR, and make sure this JAR 
loads before axis.jar (eg call it _axis.jar)
+    1. For webapps, place the modified class file within your WEB-INF/classes 
folder. It seems tomcat loads these before axis.jar
+  1. Add the remaining classes to your application
+  1. Use the SSLClientAxisConfig class to initialize your Axis client before 
making a call (see example below)
+  1. When you want to use a different certificate, create a new 
SSLClientAxisConfig, with updated paramters, and use it to create a new Axis 
client. This client will use the new certificate.
+ 
+ Example usage of the SSLClientAxisConfig:
+ {{{
+ // create config
+ boolean logging = false; // no logging
+ SSLClientAxisEngineConfig axisConfig = new SSLClientAxisEngineConfig();
+ axisConfig.setKeystore("/path/to/clientkey.p12");
+ axisConfig.setKeystoreType("PKCS12");
+ axisConfig.setKeystorePassword("changeit");
+ axisConfig.setTruststore("/path/to/truststore.jks");
+ axisConfig.setTruststoreType("JKS");
+ axisConfig.setTruststorePassword("changeit");
+ if (logging)
+     axisConfig.setDebugBaseDir("/path/to/logs");
+ axisConfig.initialize(logging);
+ // initialize service
+ URL soapURL = new URL("https://myserver.com/myapp/services/mywebserviceport";);
+ MyWebServiceServiceLocator locator = new MyServiceLocator(axisConfig);
+ MyWebServicePort port = locator.getMyWebServicePort(soapURL);
+ MyWebServiceBindingStub stub = (MyWebServiceBindingStub) port;
+ // make a call to the webservice (assume no params for this operation)
+ MyResultType result = stub.myoperation1();
+ }}}
+ 
+ Note: In the example above it is assumed that you have created the client 
stubs for the web service "MyWebService" using the Axis WSDL2Java tool.
+ 
+ Note: For an explanation of the logging features, please see 
["FrontPage/Axis/Logging/Logging with SSL"] and ["FrontPage/Axis/Logging/In 
Memory Logging"]
+ 
+ /!\ Note: Don't use the logging features in production setups, they are aides 
for development, and not implemented in sufficient quality to use in production.
+ 
+ === Getting the code ===
+ 
+  * The code can be downloaded in compiled form (Java 1.5, Sun compiler) as a 
JAR archive:
+  * The source code can be downloaded from the following link, also as a JAR 
archive:
+ 
+ Note that both JARs contain all the classes described above, as well as the 
classes needed for the logging features.
+ 
+ Note that the SocketFactoryFactory replacement class is also included in the 
JARs, but may need to be moved elsewhere depending on your setup (see above) to 
ensure it loads before the original class in axis.jar.
+ 
+ === Shortcomings ===
+ 
+  * Because the SocketFactoryFactory is not a "exchangeable component" of 
Axis, the class from the original Axis distribution must be replaced with the 
new version. This can be inconvenient.
+  * Currently there is no limit to the number of SocketFactories cached in the 
SocketFactoryFactory. Thus, for setups running a long time without restarts, 
and using very many different client certificates, out-of-memory related 
problems might occur as the cache grows too large.
+  * Currently the cacheing is implemented using the keystore name as a key for 
the cache. If you replace the certificate in the keystore, the new certificate 
will not be picked up, as the old cache entry will be used (filename is the 
same).
+  * For the same reason, changeing only the truststore or other parameters of 
the SSL connection will not result in a new SocketFactory being created. New 
SocketFactories are only created in the cache when the keystore name changes.
+  * The classes more or less assume software certificates, stored in files of 
the usual formats (JKS, PKCS12, etc). Usage of Hardware certificates or other 
advanced JSSE features may require modifications to the code.
+ 

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to