[ 
https://issues.apache.org/jira/browse/CXF-3224?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Willem Salembier updated CXF-3224:
----------------------------------

    Description: 
Currently the RST always contains a wst:KeyType and wst:KeySize field. The 
WS-Trust 1.3 specification says these tags are optional.

We like CXF to render the following simple RST to ask for a SAML v1.1 token.

 <wst:RequestSecurityToken Context="abc" 
xmlns:ns1="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd";
 xmlns:auth="http://schemas.xmlsoap.org/ws/2006/12/authorization"; 
xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512";>
         
<wst:TokenType>http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1</wst:TokenType>
         
<wst:RequestType>http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue</wst:RequestType>
         <wst:Claims 
Dialect="http://schemas.xmlsoap.org/ws/2006/12/authorization/authclaims";>
            <auth:ClaimType Uri="urn:be:my_claim_attribute">
               <auth:Value>1234</auth:Value>
            </auth:ClaimType>
         </wst:Claims>
      </wst:RequestSecurityToken>


  was:
Currently the RST always contains a wst:KeyType and wst:KeySize field. The 
WS-Trust 1.3 specification says these tags are optional.

We like to CXF to render the following simple RST to ask for a SAML v1.1 token.

 <wst:RequestSecurityToken Context="abc" 
xmlns:ns1="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd";
 xmlns:auth="http://schemas.xmlsoap.org/ws/2006/12/authorization"; 
xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512";>
         
<wst:TokenType>http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1</wst:TokenType>
         
<wst:RequestType>http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue</wst:RequestType>
         <wst:Claims 
Dialect="http://schemas.xmlsoap.org/ws/2006/12/authorization/authclaims";>
            <auth:ClaimType Uri="urn:be:my_claim_attribute">
               <auth:Value>1234</auth:Value>
            </auth:ClaimType>
         </wst:Claims>
      </wst:RequestSecurityToken>



> WS-Trust: remove current wst:KeyType and wst:KeySize defaults
> -------------------------------------------------------------
>
>                 Key: CXF-3224
>                 URL: https://issues.apache.org/jira/browse/CXF-3224
>             Project: CXF
>          Issue Type: Improvement
>          Components: WS-* Components
>    Affects Versions: 2.3.1
>            Reporter: Willem Salembier
>
> Currently the RST always contains a wst:KeyType and wst:KeySize field. The 
> WS-Trust 1.3 specification says these tags are optional.
> We like CXF to render the following simple RST to ask for a SAML v1.1 token.
>  <wst:RequestSecurityToken Context="abc" 
> xmlns:ns1="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd";
>  xmlns:auth="http://schemas.xmlsoap.org/ws/2006/12/authorization"; 
> xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512";>
>          
> <wst:TokenType>http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1</wst:TokenType>
>          
> <wst:RequestType>http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue</wst:RequestType>
>          <wst:Claims 
> Dialect="http://schemas.xmlsoap.org/ws/2006/12/authorization/authclaims";>
>             <auth:ClaimType Uri="urn:be:my_claim_attribute">
>                <auth:Value>1234</auth:Value>
>             </auth:ClaimType>
>          </wst:Claims>
>       </wst:RequestSecurityToken>

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to