First, did you also follow these instructions from the docs? >>>
Controlling Access to the ServiceManager Although the SOAP interface for deploying/undeploying services can be very useful during development, it is not always desirable to expose such capabilities in a runtime environment. Apache SOAP provides the ability to enable/disable the SOAP interface to the ServiceManager by setting a boolean flag in the configuration file. If the flag is set to true, or if it is not present, then the SOAP interface is enabled. If it is set to false, then the ServiceManagerClient, as well as any other client which uses that interface, will not be able to communicate with the ServiceManager. However, anything which communicates with the ServiceManager directly, such as the admin JSP pages, will still be able to alter the state of the ServiceManager. ------------------------------------------------------------------------ -------- <<< Frankly, I don't understand how you could use catalina.policy to control access to the admin pages. I thought the policy controlled what the code in the JSP/class/jar could do, not who could access it. One way to control access is by defining a security constraint in the web.xml file. I've used this to force a login for the admin pages: <!-- Define a Security Constraint on the Admin pages --> <security-constraint> <web-resource-collection> <web-resource-name>Apache SOAP Administrator</web-resource-name> <url-pattern>/admin/*</url-pattern> </web-resource-collection> <auth-constraint> <!-- NOTE: This role is not present in the default users file --> <role-name>manager</role-name> </auth-constraint> </security-constraint> <!-- Define the Login Configuration for this Application --> <login-config> <auth-method>BASIC</auth-method> <realm-name>Apache SOAP</realm-name> </login-config> Scott Nichol ----- Original Message ----- From: "Ladwig, Mike" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Tuesday, October 15, 2002 3:24 PM Subject: Restricting access to the SOAP administration client > Hi! > > I've gotten a soap service working nicely, and now I want to try it out in > the real world. Unfortunately, by default soap installs a gaping security > hole as the administrative client. I badly want to make it impossible to > access this from anywhere other than the localhost. > > I found this in the FAQ: > >Modify your servlet container's security settings so that only certain IP > addresses can access the admin page. If you >are running Tomcat with its > security manager, you can add an entry for the soap webapp in the .policy > file located in >the conf directory, and then you can control which IP > addresses the webapp will accept connections from. > > This would be great advice, and would work pretty well for me. > Unfortunately, I am unable to find any details on how to accomplish this in > the /etc/tomcat4/catalina.policy file. I am running tomcat 4.04 with the > soap.war file dumped in the webapps directory, and as far as I can tell, by > the time this .policy file gets included, there isn't a way to restrict the > IP addresses soap will talk to. > > Has anyone ever been able to actually get the FAQ advice to work? If so, > could you point me in the right direction? > > Thanks, > mike. > > -- > To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]> > For additional commands, e-mail: <mailto:[EMAIL PROTECTED]> > > -- To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]> For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>