If your clients are signing their requests, why not just use the public key you used to verify the signature on the request to encrypt the response? I can't see a need for SAML or WS-Trust in a scenario like this.

On Nov 28, 2008, at 1:14 AM, Mayank Mishra <[EMAIL PROTECTED]> wrote:

Hi,

I have a similar query for X.509 based cryptography. In the development or testing environment, we can manually put client's X. 509 public key into the server's truststore and server's X.509 public key into the client's truststore. Whereas, in the production, we can safely assume putting server's public key into the client's truststore, but not the otherway (making server trust on all client who are going to communicate).

Let's say if the response from the server requires to be encrypted. Then server requires a X.509 public certificate of the client to Encrypt the response. Assume, I have a service communicating to many clients. I guess, it is not a right behavior for the server to put all clients public certificates in the truststore. How the configuration is expected to work in the production environment?

Does WS-Trust provides a solution for this? I understand that SAML Token is generally issued from the STS to client for claiming authentication and authorization on the service. Also, I understand that in WS-Trust a shared token "proof token" is send to both client and server for securing request and response. But, can this be used for exchanging X.509 public and private keys too.

With Regards,
Mayank

Mayank Mishra wrote:
Hi,

I agree with Glen to have keystore/Truststore outside the war. Usually containers comes with their own default keystore/ truststore. For testing and development purposes, the keystore configurations are complete. However, for production environments, you may want to create a secure environment where ONLY your installations trust each other. WSS4J takes custom crypto configurations for Alias, Keystore location, TrustStore location, type of store using properties files.

With Regards,
Mayank

Mark2008 wrote:
I am looking at the online tutorials on how to use Encryption / Signature to
secure CXF web service.
The examples package the keystore / truststore into the web war file and
deploy to the some web container.

My question is, after the cxf/webservice application has been deployed to a production environment, how do we import the client certificate and update the truststore for any new client without shutting down the web server?
What's the best practice on this?

Thanks,

Mark


Reply via email to