I'm working on a use case where I need to uniquely identify (in secured
fashion, no compromise) all clients reaching my endpoint and take measures
based on it. All clients will use common TLS infrastructure; when I
configure my security policy, what would be my best options without
overdoing or complicating client side implementation.

I'm thinking in lines of signing parts of message using clients keystore,
which will be unique for each. The question' are, 

1. Would this mean I have to configure a Asym or Sym security binding in
addition to TLS policy, so as to enable the signing part?
2. If I want signing present only on the incoming message, would Asym or Sym
policy complain. Most configurations highlight both Initiator and Recepient
token sections and I am not clear if I the specs mandate signing both ways.

Any suggestions would help.

--
View this message in context: 
http://cxf.547215.n5.nabble.com/SecurityPolicy-Option-tp5456290p5456290.html
Sent from the cxf-user mailing list archive at Nabble.com.

Reply via email to