Hi Oliver,

>Ask the ADFS administrator to provide you the url for the WS-Fed PRP
endpoint in ADFS. This >URL must be configured in Fediz.

ADFS2.0 support both WS-Federation and SAML2.0 Web SSO protocol and and the
URLs are the same. I used SAML2.0 Web SSO while Fediz is using
WS-Federation. That's why I couldn't recognize URL parameters of the
WS-Federation. You must have some reason choose WS-Federation over SAML2.0
Web SSO. I have heard that WS-Federation is limited to SAML1.1 token.

>Step 4 in the following links describes how to configure the relying party
in ADFS:
I know how to configure relying parties in ADFS2.0.

Thanks.

Gina

On Mon, May 14, 2012 at 5:29 PM, Oliver Wulff <owu...@talend.com> wrote:

>  Hi Gina
>
>
>
> Ask the ADFS administrator to provide you the url for the WS-Fed PRP
> endpoint in ADFS. This URL must be configured in Fediz.
>
>
>
> >>>
>
>
> https://strts01.ams.dev/adfs/services/trust/13/usernamemixed?wa=wsignin1.0&wreply=https%3A%2F%2Flocalhost%3A8443%2Ffedizhelloworld%2Fsecureservlet%2Ffed&wtrealm=https%3A%2F%2Flocalhost%3A8443%2Ffedizhelloworld%2F
>
> >>>
>
> This is the SignIn request of WS-Fed PRP which is supported by ADFS.
>
>
>
> Do you have the url of the Metadata document? If yes, there you should see
> the PassiveRequestorUrl.
>
>
>
> Step 4 in the following links describes how to configure the relying party
> in ADFS:
>
>
> http://technet.microsoft.com/en-us/library/adfs2-federation-wif-application-step-by-step-guide(v=ws.10).aspx
>
>
>
> HTH
>
>
>
> Oli
>
>
>
>
>
>
>
> ------
>
> Oliver Wulff
>
> Blog: http://owulff.blogspot.com
> Solution Architect
> http://coders.talend.com
>
> <http://coders.talend.com>Talend Application Integration Division
> http://www.talend.com
>   ------------------------------
> *From:* Gina Choi [ginacho...@gmail.com]
> *Sent:* 14 May 2012 22:44
>
> *To:* users@cxf.apache.org
> *Cc:* Oliver Wulff
> *Subject:* Re: CXF supporting scope
>
>   Hi Oliver,
>
> ADFS2.0 have many end points and depends on request or profile that we
> use, we have to use different end points. When I test helloworld, I see
> username token sent to STS as a security header, so I used 
> *adfs/services/trust/13/usernamemixed
> endpoint of ADFS, but when I see URL on the browser, it looks like SP
> initiated redirect post bindings, but I don't see  base 64 encoded
> SAMLRequest. That's why I am confused.*
>
> **
> Gina
>
>
>  On Mon, May 14, 2012 at 4:27 PM, Gina Choi <ginacho...@gmail.com> wrote:
>
>>
>>  >Neither the RST nor the RSTR are encrypted. It's planned for the next
>> release of the Fediz plugin >to support encrypted token which are embedded
>> in RSTR.
>>  Ok. Just verifying with you.
>>
>> >Is it required to support encrypted tokens initially? I should have this
>> functionality by end of may.
>>  encryption doesn't matter at this time.
>>
>> >You have to export the signing cert from ADFS and import into a java
>> keystore. Don't import it into >stsstore.jks as this should be used for
>> this demo IDP only.
>>  when I import ADFS signing cert to java keystore, what alias name should
>> I use? You must reference alias name from somewhere.
>>
>> I also need to import Service Provider signing cert to ADFS. How do I
>> export it?
>>
>> I was trying to poing helloworld to ADFS, but it seems not simple. *wreply
>> vs *RelayState. What is *wa=wsignin1.0 and wtrealm? Without deep change,
>> it wouldn't work with ADFS.*
>> Based on following url, I couldn't tell what kind of profile do you use?
>> I couldn't really tell. Please see oasis link.
>>
>> http://www.oasis-open.org/committees/download.php/27819/sstc-saml-tech-overview-2.0-cd-02.pdf
>> .
>>
>> Fediz
>>
>>
>> https://strts01.ams.dev/adfs/services/trust/13/usernamemixed?wa=wsignin1.0&wreply=https%3A%2F%2Flocalhost%3A8443%2Ffedizhelloworld%2Fsecureservlet%2Ffed&wtrealm=https%3A%2F%2Flocalhost%3A8443%2Ffedizhelloworld%2F
>>
>> SP initiated redirect post bindig:
>>
>> GET
>> /adfs/ls/?SAMLRequest=pZJPa9wwEMXv%2FRRG99U%2F73ptsXbYNoQGUrpknRR6KbI9TtTKkquR3Xz8Opss5FQKOQ7MvPd4v9ldPA02mSGg8a4kgnKSgGt9Z9xDSe7qq1VOLqoPO9SDHdV%2Bio%2FuFn5PgDHZI0KIy9kn73AaIBwhzKaFu9ubkjzGOKJi7M8vcDjzlGf0wfpGW4qdpa0Po8rX65TtTbDGAVscgX0D2%2FoB6E8cSXK5eBin4ynXWQ5jiMgF1QPSDmamux6ZRUaSKx9aOOUrSQwTkOT6siQ%2F0qLXfSZyyLs0K%2Fi24SKVXd%2B1hWw2a5GKrMi2siv6LMubPFuu8KARzQwl6bXFZx3ECa4dRu1iSSQXcsU3K7GuJVciVxtJt7n4TpJD8NG33n407qW9KTjlNRpUTg%2BAKrbquP9yoyTlqnlZQvW5rg%2Brw9djTZL7MwX5TGHh4lCdev%2B31PjqS6pXSqfA4f8F9Bkkqd6LbcfeRqjO49u%2Fqf4C&RelayState=
>> https://wkensv0306.global.sdl.corp:8443/Airline/code/Welcome.jsp HTTP/1.1
>>
>>
>> On Mon, May 14, 2012 at 3:51 PM, Oliver Wulff <owu...@talend.com> wrote:
>>
>>> Hi Gina
>>>
>>> >>>
>>> It looks like that you don't encrypt RST and RSTR, but you said that
>>> both RST and RSTR are signed. I need to import signing cert from ADFS to
>>> stsstore.jks keystore. Which one is key alias for RP? You have clientkey,
>>> myservicekey and mystskey. Vise versa, I need to export signing cert from
>>> RP to import it to ADFS. Do you have signing cert somewhere or I have to
>>> export it myself?
>>> >>>
>>>  Neither the RST nor the RSTR are encrypted. It's planned for the next
>>> release of the Fediz plugin to support encrypted token which are embedded
>>> in RSTR.
>>>
>>> Is it required to support encrypted tokens initially? I should have this
>>> functionality by end of may.
>>>
>>> You have to export the signing cert from ADFS and import into a java
>>> keystore. Don't import it into stsstore.jks as this should be used for this
>>> demo IDP only.
>>>
>>> Thanks
>>> Oli
>>>
>>>
>>>
>>> ------
>>>
>>> Oliver Wulff
>>>
>>> Blog: http://owulff.blogspot.com
>>> Solution Architect
>>> http://coders.talend.com
>>>
>>>  Talend Application Integration Division http://www.talend.com
>>>
>>> ________________________________________
>>> From: Gina Choi [ginacho...@gmail.com]
>>>  Sent: 14 May 2012 21:23
>>> To: users@cxf.apache.org
>>>  Subject: Re: CXF supporting scope
>>>
>>> Hi Oliver,
>>>
>>> >You're right - this is confusing. The STS signs the SAML token with the
>>> private which correlates to >the STS certificate. The RP requires the CA
>>> certificates and the STS certificate (if self-signed as in >this demo
>>> case)
>>> to validate the SAML token.
>>>
>>> Thanks for response. I looked request and response message between RP and
>>> STS. It looks like that you don't encrypt RST and RSTR, but you said that
>>> both RST and RSTR are signed. I need to import signing cert from ADFS to
>>> stsstore.jks keystore. Which one is key alias for RP? You have clientkey,
>>> myservicekey and mystskey. Vise versa, I need to export signing cert from
>>> RP to import it to ADFS. Do you have signing cert somewhere or I have to
>>> export it myself?
>>>
>>> Thanks.
>>>
>>> Gina
>>>
>>>
>>> On Mon, May 14, 2012 at 2:19 PM, Oliver Wulff <owu...@talend.com> wrote:
>>>
>>> > Hi Gina
>>> >
>>> > >>>
>>> > But I still don't understand why I have to copy stsstore.jks file into
>>> RP.
>>> > stsstore.jks is the keystore file of STS and it should be sitting on
>>> > somewhere on tomcat-idp not tomcat-rp. And ttomcat-rp should have it's
>>> own
>>> > keystore file, for example clientstore.jks.
>>> > When client issue AuthnRequest to STS, it will sign AuthnRequest with
>>> STS
>>> > signing certificate. Vise versa, when STS issue Assertion token, it
>>> will be
>>> > signed by client signing certificate.
>>> > In fediz project senario, RP will be the client and it will never have
>>> > keystore file of STS.
>>> > I just looked at content of stsstore.jks and it looks like that you
>>> > combined sts, client and service keystore file into one -
>>> stsstore.jks. In
>>> > other words, stsstore.jks is being used as a keystore file for all
>>> three -
>>> > client, service and sts. Is that correct? I think that they should be
>>> > separated. Kind of confusing until list content of stsstore.jks.
>>> > >>>
>>> > You're right - this is confusing. The STS signs the SAML token with the
>>> > private which correlates to the STS certificate. The RP requires the CA
>>> > certificates and the STS certificate (if self-signed as in this demo
>>> case)
>>> > to validate the SAML token.
>>> >
>>> > I was too lazy in creating two keystores (I just copied the keystore
>>> used
>>> > by the CXF STS distribution). In a production environment, one keystore
>>> > contains the private key and the certificate for the STS and the other
>>> > contains the certificate only for the RP.
>>> >
>>> > I've started documentating fediz here:
>>> > http://cxf.apache.org/fediz.html
>>> >
>>> > It would make sense to add a section what to consider for production
>>> > implementation. I'll add that.
>>> >
>>> > Thanks
>>> >
>>> > ------
>>> >
>>> > Oliver Wulff
>>> >
>>> > Blog: http://owulff.blogspot.com
>>> > Solution Architect
>>> > http://coders.talend.com
>>> >
>>> > Talend Application Integration Division http://www.talend.com
>>> >
>>> > ________________________________________
>>> > From: Gina Choi [ginacho...@gmail.com]
>>> > Sent: 14 May 2012 18:00
>>> > To: Oliver Wulff
>>> > Cc: users@cxf.apache.org
>>> > Subject: Re: CXF supporting scope
>>> >
>>> > Hi Oliver,
>>> >
>>> > Thanks for your response. I copied over stsstore.jks into tomcat rp
>>> and I
>>> > am seeing saml token now.
>>> >
>>> > >The SAML token issued by the IDP/STS is signed and the used
>>> certificate
>>> > must be referenced to >validate the signature:
>>> >
>>> >  ><trustedIssuerItem provider=".*CN=www.sts.com.*">
>>> > >< keyStore file="/projects/fediz/tomcat-rp2/conf/stsstore.jks"
>>> > password="stsspass" type="file" />
>>> > >< /trustedIssuerItem>
>>> >
>>> > >In this example, I used a self-signed certificate and I was too lazy
>>> in
>>> > separating the keystore into >one with the private key and into one
>>> > without.
>>> >
>>> > >You find the stsstore.jks in fedizidpsts.war. Just copy it to the RP.
>>> >
>>> > But I still don't understand why I have to copy stsstore.jks file into
>>> RP.
>>> > stsstore.jks is the keystore file of STS and it should be sitting on
>>> > somewhere on tomcat-idp not tomcat-rp. And ttomcat-rp should have it's
>>> own
>>> > keystore file, for example clientstore.jks.
>>> >
>>> > When client issue AuthnRequest to STS, it will sign AuthnRequest with
>>> STS
>>> > signing certificate. Vise versa, when STS issue Assertion token, it
>>> will be
>>> > signed by client signing certificate.
>>> >
>>> > In fediz project senario, RP will be the client and it will never have
>>> > keystore file of STS.
>>> >
>>> > I just looked at content of stsstore.jks and it looks like that you
>>> > combined sts, client and service keystore file into one -
>>> stsstore.jks. In
>>> > other words, stsstore.jks is being used as a keystore file for all
>>> three -
>>> > client, service and sts. Is that correct? I think that they should be
>>> > separated. Kind of confusing until list content of stsstore.jks.
>>> >
>>> > Thanks.
>>> >
>>> > Gina
>>> >
>>> >
>>> > On Fri, May 11, 2012 at 2:55 AM, Oliver Wulff <owu...@talend.com>
>>> wrote:
>>> >
>>> > >  Hi Gina
>>> > >
>>> > >
>>> > >
>>> > > The SAML token issued by the IDP/STS is signed and the used
>>> certificate
>>> > > must be referenced to validate the signature:
>>> > >
>>> > >
>>> > >
>>> > >  <trustedIssuerItem provider=".*CN=www.sts.com.*">
>>> > > <keyStore file="/projects/fediz/tomcat-rp2/conf/stsstore.jks"
>>> > > password="stsspass" type="file" />
>>> > > </trustedIssuerItem>
>>> > >
>>> > > In this example, I used a self-signed certificate and I was too lazy
>>> in
>>> > > separating the keystore into one with the private key and into one
>>> > without.
>>> > >
>>> > >
>>> > >
>>> > > You find the stsstore.jks in fedizidpsts.war. Just copy it to the RP.
>>> > >
>>> > >
>>> > >
>>> > > In your scenario with ADFS. You must import the CA certs which
>>> signed the
>>> > > ADFS cert into a keystore and configure the CN name as a regular
>>> > expression
>>> > > in the attribute "provider". (The name provider is misleaing, will
>>> fix
>>> > that)
>>> > >
>>> > >
>>> > >
>>> > > Thanks
>>> > >
>>> > >
>>> > >
>>> > >
>>> > >
>>> > > ------
>>> > >
>>> > > Oliver Wulff
>>> > >
>>> > > Blog: http://owulff.blogspot.com
>>> > > Solution Architect
>>> > > http://coders.talend.com
>>> > >
>>> > > <http://coders.talend.com>Talend Application Integration Division
>>> > > http://www.talend.com
>>> > >   ------------------------------
>>> > > *From:* Gina Choi [ginacho...@gmail.com]
>>> > > *Sent:* 11 May 2012 00:44
>>> > >
>>> > > *To:* Oliver Wulff
>>> > > *Cc:* users@cxf.apache.org
>>> > > *Subject:* Re: CXF supporting scope
>>> > >
>>> > >   Hi Oliver,
>>> > >
>>> > > Until this afternoon, I didn't have time to work with Fediz. Finally
>>> I
>>> > > have successfully deployed idp, sts and simpleWebapp on Tomcat7.0.27.
>>> > > Everything went well. I guess that on the other day, I thought doing
>>> some
>>> > > thing, but I probably did something else. :)
>>> > > After type https://localhost:8443/fedizhelloworld/secureservlet/fedon
>>> > > the browser, I inputed test user name and password, but it failed.
>>> > >
>>> > >
>>> > > org.apache.ws.security.components.crypto.CredentialException: Proxy
>>> file
>>> > (/projects/fediz/tomcat-rp2/conf/stsstore.jks) not found.
>>> > >
>>> > >
>>> > > In your fediz_config.xml, you have following lines. Why do we put
>>> sts key
>>> > > store file on RP server? Does web application need to know where is
>>> sts
>>> > > keystore file?
>>> > >
>>> > >   <trustedIssuers>
>>> > >    <trustedIssuerItem provider=".*CN=www.sts.com.*">
>>> > >     <keyStore file="/projects/fediz/tomcat-rp2/conf/stsstore.jks"
>>> > > password="stsspass" type="file" />
>>> > >    </trustedIssuerItem>
>>> > >   </trustedIssuers>
>>> > >
>>> > >
>>> > > Thanks.
>>> > >
>>> > > Gina
>>> > >
>>> > >  On Wed, May 9, 2012 at 1:45 AM, Oliver Wulff <owu...@talend.com>
>>> wrote:
>>> > >
>>> > >>  Hi Gina
>>> > >>
>>> > >> The steps are absolutely correct. Not sure about the failing
>>> deployment
>>> > >> step for the application. Have you also updated tomcat-users.xml of
>>> the
>>> > >> second tomcat instance? Or was the application already deployed
>>> once and
>>> > >> you must run "mvn clean install tomcat:redeploy"? Is anything
>>> logged on
>>> > >> catalina.out?
>>> > >> Otherwise, just copy the war manually from
>>> target/fedizhelloworld.war to
>>> > >> <tomcat-dir>/webapps.
>>> > >>
>>> > >> I've checked in fediz_config.xml in
>>> > examples/simpleWebapp/src/main/config
>>> > >> (sorry for that). Please manually copy it to the location you've
>>> > configured
>>> > >> in the context.xml. Ensure that the IDP url (later ADFS):
>>> > >> <issuer>https://localhost:9443/fedizidp/</issuer>
>>> > >> and the location of the trusted keystore is updated:
>>> > >> <keyStore file="/projects/fediz/tomcat-rp2/conf/stsstore.jks"
>>> > >> password="stsspass" type="file" />
>>> > >>
>>> > >> It will be supported in the next days to also configure a relative
>>> > >> location to catalina.home.
>>> > >>
>>> > >>
>>> > >> Thanks
>>> > >> Oli
>>> > >>
>>> > >>
>>> > >>
>>> > >> ------
>>> > >>
>>> > >> Oliver Wulff
>>> > >>
>>> > >> Blog: http://owulff.blogspot.com
>>> > >> Solution Architect
>>> > >> http://coders.talend.com
>>> > >>
>>> > >> <http://coders.talend.com>Talend Application Integration Division
>>> > >> http://www.talend.com
>>> > >>   ------------------------------
>>> > >> *From:* Gina Choi [ginacho...@gmail.com]
>>> > >> *Sent:* 09 May 2012 00:55
>>> > >>
>>> > >> *To:* Oliver Wulff
>>> > >> *Cc:* users@cxf.apache.org
>>> > >> *Subject:* Re: CXF supporting scope
>>> > >>
>>> > >>   By the way I checked out head version fediz project from SVN.
>>> > >>
>>> > >> On Tue, May 8, 2012 at 6:36 PM, Gina Choi <ginacho...@gmail.com>
>>> wrote:
>>> > >>
>>> > >>> Hi Oliver,
>>> > >>>
>>> > >>> I am using seperate Tomcat instance for IDP and application and I
>>> set
>>> > up
>>> > >>> https. Following is what I did.
>>> > >>>
>>> > >>> I checked out Fediz project into my local machine. As you
>>> explained on
>>> > >>> your post
>>> > >>>
>>> >
>>> http://owulff.blogspot.com/2011/11/configure-tomcat-for-federation-part.html
>>> > ,
>>> > >>> I run mvn clean install in plugins/core, pligins/tomcat and
>>> > >>> examples/simpleWebapp/. I configued maven's settings.xml and
>>> updated
>>> > >>> tomca-users.xml. I ran mvn tomcat:deploy under fediz\trunk\plugins,
>>> > and I
>>> > >>> am seeing both IDP and STS are deployed.
>>> > >>>
>>> > >>> I am just having problem with deloying sample application in
>>> another
>>> > >>> Tomcat instance.
>>> > >>>
>>> > >>> 1. I created  sub-directory fediz in ${catalina.home}/lib of the
>>> > >>> tomcat-rp.
>>> > >>> 2. I have following line in the  calatina.properties in
>>> > >>> ${catalina.home}/conf.
>>> > >>>
>>> > >>>
>>> >
>>> common.loader=${catalina.base}/lib,${catalina.base}/lib/*.jar,${catalina.home}/lib,${catalina.home}/lib/*.jar,${catalina.home}/lib/fediz/*.jar
>>> > >>> 3. I deployed the built libraries and dependencies to the directory
>>> > >>> created in (1)
>>> > >>> I got the built libraries from
>>> >
>>> fediz-tomcat/target/fediz-tomcat-0.6-SNAPSHOT-zip-with-dependencies.zip.
>>> > >>> After this, I am getting error messages when start Tomcat. This
>>> > preventing
>>> > >>> me step5 for deploying applicaitons properly.
>>> > >>>  If I replace generated lib/fediz jar files with old jar files
>>> that I
>>> > >>> downloaded from your post, I am able to start tomcat without error
>>> and
>>> > able
>>> > >>> to deploy application, but couldn't run properly.
>>> > >>> 4. since I can't find fediz_config.xml, so I configured
>>> > *META-INF/context.xml
>>> > >>> as follow.
>>> > >>>
>>> > >>> *  <Context>
>>> > >>> <Valve className="org.apache<
>>> >
>>> http://owulff.blogspot.com/2011/11/configure-tomcat-for-federation-part.html#
>>> > >
>>> > >>> .cxf.fediz.tomcat.FederationAuthenticator"
>>> > >>>  issuerURL="https://localhost:9443/fedizidp/";
>>> > >>> truststoreFile="conf/stsstore.jks"
>>> > >>> truststorePassword="stsspass"
>>> > >>> trustedIssuer=".*CN=www.sts.com.*" />
>>> > >>>  </Context>
>>> > >>> 5. If I run mvn tomcat:deploy under
>>> fediz\trunk\examples\simpleWebapp,
>>> > I
>>> > >>> am getting following error message.
>>> > >>>
>>> > >>> Failed to execute goal
>>> org.codehaus.mojo:tomcat-maven-plugin:1.1:deploy
>>> > >>> (default-cli) on project simpleWebapp: Cannot invoke Tomcat
>>> manager:
>>> > FAIL -
>>> > >>> Failed to deploy application at context path /fedizhelloworld ->
>>> [Help
>>> > 1]
>>> > >>>
>>> > >>> So, I couldn't get your application run. I hope that all these
>>> problem
>>> > >>> caused because of missing fediz_config.xml.
>>> > >>>
>>> > >>> Thanks.
>>> > >>>
>>> > >>> Gina
>>> > >>>   On Tue, May 8, 2012 at 2:46 PM, Oliver Wulff <owu...@talend.com
>>> > >wrote:
>>> > >>>
>>> > >>>>  Hi Gina
>>> > >>>>
>>> > >>>>
>>> > >>>>
>>> > >>>> I'll send you and checkin the fediz_config.xml as soon as I can -
>>> I'm
>>> > >>>> on the way right now.
>>> > >>>>
>>> > >>>>
>>> > >>>>
>>> > >>>> This STS URL is fine, the Mock IDP uses the CXF STS. When the
>>> > >>>> application works you will change in your application
>>> > (fediz_config.xml)
>>> > >>>> the issuerUrl of ADFS.
>>> > >>>>
>>> > >>>>
>>> > >>>>
>>> > >>>> Have you configured HTTPS for the IDP Tomcat instance and your
>>> > >>>> application Tomcat instance?
>>> > >>>>
>>> > >>>> I recommend to use a separate instance of the IDP and your
>>> > application.
>>> > >>>>
>>> > >>>> Do you use the port 9443?
>>> > >>>>
>>> > >>>>
>>> > >>>>
>>> > >>>> Thanks
>>> > >>>>
>>> > >>>>
>>> > >>>>
>>> > >>>>
>>> > >>>>
>>> > >>>> ------
>>> > >>>>
>>> > >>>> Oliver Wulff
>>> > >>>>
>>> > >>>> Blog: http://owulff.blogspot.com
>>> > >>>> Solution Architect
>>> > >>>> http://coders.talend.com
>>> > >>>>
>>> > >>>> <http://coders.talend.com>Talend Application Integration Division
>>> > >>>> http://www.talend.com
>>> > >>>>   ------------------------------
>>> > >>>> *From:* Gina Choi [ginacho...@gmail.com]
>>> > >>>> *Sent:* 08 May 2012 20:20
>>> > >>>>
>>> > >>>> *To:* Oliver Wulff
>>> > >>>> *Cc:* users@cxf.apache.org
>>> > >>>> *Subject:* Re: CXF supporting scope
>>> > >>>>
>>> > >>>>    Hi Oliver
>>> > >>>>
>>> > >>>> >I'd recommend to successfully deploy the wsclientWebapp sample
>>> and
>>> > the
>>> > >>>> IDP. When this works, rip&replace >one piece after the other. I'd
>>> > recommend
>>> > >>>> to choose the following approach.
>>> > >>>>
>>> > >>>> >1) Replace the Fediz IDP by ADFS
>>> > >>>> >      + configure the ADFS issuerUrl (context.xml)
>>> > >>>> >      + ensure that ADFS supports WS-Federation Passive Requestor
>>> > >>>> Profile
>>> > >>>> >      + configure the certificate used by ADFS to sign the SAML
>>> token
>>> > >>>> >
>>> > >>>> >(the most recent version of fediz uses a separate xml file for
>>> the
>>> > >>>> configuration)
>>> > >>>>
>>> > >>>> Somehow I couldn't deploy both fediz\trunk\services and
>>> > >>>> fediz\trunk\examples\wsclientWebapp on Tomcat7.0.27, so I deployed
>>> > them on
>>> > >>>> Tomcat 7.0.21. I checked tomcat user name and Maven's settings
>>> file
>>> > all,
>>> > >>>> but couldn't find reason. It just said that can't involke Tomcat
>>> > Manager.
>>> > >>>> But since I was able to deploy it on tomcat 7.0.21, I decided to
>>> > figure it
>>> > >>>> out later.
>>> > >>>>
>>> > >>>> In the context.xml, I have following content. So, It lookis like
>>> that
>>> > >>>> issuerURL defined inside fediz_config.xml, but I searched all
>>> > directories,
>>> > >>>> but couldn't find a file called fediz_config.xml.
>>> > >>>>
>>> > >>>> <Context>
>>> > >>>>         <Valve
>>> > >>>> className="org.apache.cxf.fediz.tomcat.FederationAuthenticator"
>>> > >>>> configFile="conf/fediz_config.xml" />
>>> > >>>>         <!--<Valve
>>> > >>>> className="org.apache.cxf.fediz.tomcat.FederationAuthenticator"
>>> > issuerURL="
>>> > >>>> https://localhost:9443/fedizidp/";
>>> truststoreFile="conf/stsstore.jks"
>>> > >>>> truststorePassword="stsspass" trustedIssuer=".*CN=www.sts.com.*"
>>> />-->
>>> > >>>>         <!--Valve
>>> > >>>> className="org.apache.cxf.fediz.tomcat.FederationAuthenticator"
>>> > >>>>
>>> >
>>> issuerCallbackHandler="org.apache.cxf.fediz.tomcat.DummyIDPCallbackHandler"
>>> > >>>> truststoreFile="conf/stsstore.jks" truststorePassword="stsspass"
>>> > >>>> />-->
>>> > >>>> </Context>
>>> > >>>>
>>> > >>>> In the web.xml file of the idp, you have following content. ADFS
>>> has
>>> > >>>> mex address. so, I assume that I need to replace value of
>>> > sts.wsdl.url with
>>> > >>>> ADFS mex address.
>>> > >>>>
>>> > >>>>
>>> > >>>>  <servlet>
>>> > >>>>   <servlet-name>FederationServlet</servlet-name>
>>> > >>>>
>>> > >>>>
>>> >
>>> <servlet-class>org.apache.cxf.fediz.service.idp.IdpServlet</servlet-class>
>>> > >>>>   <init-param>
>>> > >>>>    <param-name>sts.wsdl.url</param-name>
>>> > >>>>    <param-value>
>>> https://localhost:9443/fedizidpsts/STSService?wsdl
>>> > >>>> </param-value>
>>> > >>>>   </init-param>
>>> > >>>>   <init-param>
>>> > >>>>    <param-name>sts.wsdl.service</param-name>
>>> > >>>>    <param-value>SecurityTokenService</param-value>
>>> > >>>>   </init-param>
>>> > >>>>
>>> > >>>> Thanks.
>>> > >>>>
>>> > >>>> Gina
>>> > >>>>  On Tue, May 8, 2012 at 2:26 AM, Oliver Wulff <owu...@talend.com
>>> > >wrote:
>>> > >>>>
>>> > >>>>>  Hi Gina
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> >>>
>>> > >>>>>
>>> > >>>>> I don't mind giving up existing implementation as long as I find
>>> > >>>>> better solution. I was hoping that Fediz project
>>> > >>>>>
>>> > >>>>> uses only Apache CXF instead of introducing another FrameWork -
>>> > >>>>> OpenSAML.
>>> > >>>>>
>>> > >>>>> >>>
>>> > >>>>>
>>> > >>>>> Apache CXF uses OpenSAML too for all SAML processing for SOAP and
>>> > REST
>>> > >>>>> based service communication. OpenSAML is widely used and bundled
>>> > into other
>>> > >>>>> frameworks like CXF and Fediz.
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> >>>
>>> > >>>>>
>>> > >>>>> If I only consider passive profile at this moment, what changes
>>> are
>>> > >>>>> need to Fediz project to point to ADFS(STS) intead of Apach CXF
>>> STS?
>>> > Where
>>> > >>>>> did you define your stsActionURL? I like to start with passive
>>> > profile
>>> > >>>>> since it is easier to start with. I can use your sample
>>> application.
>>> > It
>>> > >>>>> doesn't matter if I use Airline or not since it is a just
>>> prototype
>>> > >>>>>
>>> > >>>>> >>>
>>> > >>>>>
>>> > >>>>> I'd recommend to successfully deploy the wsclientWebapp sample
>>> and
>>> > the
>>> > >>>>> IDP. When this works, rip&replace one piece after the other. I'd
>>> > recommend
>>> > >>>>> to choose the following approach.
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> 1) Replace the Fediz IDP by ADFS
>>> > >>>>>
>>> > >>>>>       + configure the ADFS issuerUrl (context.xml)
>>> > >>>>>
>>> > >>>>>       + ensure that ADFS supports WS-Federation Passive Requestor
>>> > >>>>> Profile
>>> > >>>>>
>>> > >>>>>       + configure the certificate used by ADFS to sign the SAML
>>> token
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> (the most recent version of fediz uses a separate xml file for
>>> the
>>> > >>>>> configuration)
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> 2) Update the webapp to generate and use the stubs of the
>>> > >>>>> BookingService in the FederationServlet (just a test - call the
>>> > simplest
>>> > >>>>> method). Configure the ASP.NET wsdl location (usually url?wsdl).
>>> > >>>>> Configure the ADFS STS url in the STSClient bean in the beans.xml
>>> > >>>>> configuration. Change the property onbehalfof to actas.
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> HTH
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> ------
>>> > >>>>>
>>> > >>>>> Oliver Wulff
>>> > >>>>>
>>> > >>>>> Blog: http://owulff.blogspot.com
>>> > >>>>> Solution Architect
>>> > >>>>> http://coders.talend.com
>>> > >>>>>
>>> > >>>>> <http://coders.talend.com>Talend Application Integration
>>> Division
>>> > >>>>> http://www.talend.com
>>> > >>>>>   ------------------------------
>>> > >>>>> *From:* Gina Choi [ginacho...@gmail.com]
>>> > >>>>> *Sent:* 08 May 2012 01:05
>>> > >>>>> *To:* Oliver Wulff
>>> > >>>>> *Cc:* users@cxf.apache.org
>>> > >>>>>
>>> > >>>>> *Subject:* Re: CXF supporting scope
>>> > >>>>>
>>> > >>>>>    Hi Oliver,
>>> > >>>>>
>>> > >>>>> I am not responsible for BookingService(.NET). The other guys who
>>> > >>>>> implemented it using WIF. You know that Microsoft created WIF and
>>> > tested
>>> > >>>>> with ADFS, so it it doesn't work, I would be surprised.
>>> > >>>>>  >Which Servlet container do you use?
>>> > >>>>> I am using Tomcat7.
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> >In your current setup, how does the samlp:Response look like?
>>> > >>>>> I sent you decoded SAML response token in seperate email. I am
>>> > >>>>> sretrieving based64 encoded saml response token using following
>>> code.
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> String encodedSamlResponseTokenStr =
>>> > >>>>> request.getParameter("SAMLResponse");
>>> > >>>>>
>>> > >>>>> I don't mind giving up existing implementation as long as I find
>>> > >>>>> better solution. I was hoping that Fediz project uses only
>>> Apache CXF
>>> > >>>>> instead of introducing another FrameWork - OpenSAML.
>>> > >>>>>
>>> > >>>>> I loaded
>>> > >>>>>
>>> >
>>> http://svn.apache.org/viewvc/cxf/fediz/trunk/examples/wsclientWebapp/webapp/to
>>> > >>>>> the Eclipse today.
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>
>>> > >>>>> Basically I need following three URL for ADFS(STS). First two is
>>> for
>>> > >>>>> active profile and third one is for passive profile(SP initiated
>>> > Redirect
>>> > >>>>> POST bindings). If I only consider passive profile at this
>>> moment,
>>> > what
>>> > >>>>> changes are need to Fediz project to point to ADFS(STS) intead of
>>> > Apach CXF
>>> > >>>>> STS? Where did you define your stsActionURL? I like to start with
>>> > passive
>>> > >>>>> profile since it is easier to start with. I can use your sample
>>> > >>>>> application. It doesn't matter if I use Airline or not since it
>>> is a
>>> > just
>>> > >>>>> prototype.
>>> > >>>>>
>>> > >>>>> *private* *static* *final* String *stsEndpoint* = "
>>> > >>>>> https://strts01.ams.dev/adfs/services/trust/13/usernamemixed";;
>>> > >>>>>
>>> > >>>>> *private* *static* *final* String *stsMEXAddress* =
>>> > >>>>> https://strts01.ams.dev/adfs/services/trust/mex;
>>> > >>>>>
>>> > >>>>> private static final String stsActionURL =
>>> > >>>>> https://strts01.ams.dev/adfs/ls/;
>>> > >>>>>
>>> > >>>>>
>>> > >>>>>  Thanks again for your guidance.
>>> > >>>>>
>>> > >>>>> Gina
>>> > >>>>>
>>> > >>>>> On Mon, May 7, 2012 at 3:36 PM, Oliver Wulff <owu...@talend.com
>>> > >wrote:
>>> > >>>>>
>>> > >>>>>>  Hi Gina
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>> The fediz project is used to protect your web application where
>>> the
>>> > >>>>>> client is a browser. Right now, Fediz supports WS-Federation
>>> Passive
>>> > >>>>>> Requestor Profile which is supported by ADFS and usually used in
>>> > the .NET
>>> > >>>>>> world as a the default mechanism. You don't have to implement
>>> that
>>> > in
>>> > >>>>>> your application - that's done by the Fediz plugin. Fediz uses
>>> > opensaml for
>>> > >>>>>> SAML processing.
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>> The original URL is stored in the wreply parameter. .NET uses a
>>> > >>>>>> combination of the wtrealm and wctx parameter.
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>> Your Airline application can use CXF for the web services
>>> > >>>>>> communication (for the REST communication also, if you like).
>>> The
>>> > built-in
>>> > >>>>>> support in CXF for the IssuedToken assertion (WS-SecurityPolicy)
>>> > supports
>>> > >>>>>> to get a token from ADFS using actas. In my example, just use
>>> actas
>>> > instead
>>> > >>>>>> of onbehalfof property.
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>> >>>
>>> > >>>>>>
>>> > >>>>>>  ADFS generate SAMLtoken and this SAML token is sent back to
>>> > >>>>>> Airline(Airline does all validation work) and cached in the
>>> > session. - This
>>> > >>>>>> part is implemented.
>>> > >>>>>>
>>> > >>>>>> >>>
>>> > >>>>>>
>>> > >>>>>> The validation work is already done by Fediz. Session
>>> management is
>>> > >>>>>> then done by the JEE container. Your application is called after
>>> > the SAML
>>> > >>>>>> token issued by ADFS is successfully validated. The container
>>> will
>>> > create
>>> > >>>>>> the session and check every incoming request whether the used
>>> token
>>> > is
>>> > >>>>>> still valid - otherwise, the browser is redirected again to
>>> ADFS.
>>> > You could
>>> > >>>>>> also configure some roles in ADFS to protect your web
>>> application
>>> > as the
>>> > >>>>>> fediz plugin tells the container the userid as well as its
>>> roles.
>>> > You could
>>> > >>>>>> even use claims if you like.
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>> Which Servlet container do you use?
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>> In your current setup, how does the samlp:Response look like?
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>> Thanks
>>> > >>>>>>
>>> > >>>>>> Oli
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>> ------
>>> > >>>>>>
>>> > >>>>>> Oliver Wulff
>>> > >>>>>>
>>> > >>>>>> Blog: http://owulff.blogspot.com
>>> > >>>>>> Solution Architect
>>> > >>>>>> http://coders.talend.com
>>> > >>>>>>
>>> > >>>>>> <http://coders.talend.com>Talend Application Integration
>>> Division
>>> > >>>>>> http://www.talend.com
>>> > >>>>>>   ------------------------------
>>> > >>>>>> *From:* Gina Choi [ginacho...@gmail.com]
>>> > >>>>>> *Sent:* 07 May 2012 20:24
>>> > >>>>>> *To:* users@cxf.apache.org
>>> > >>>>>> *Cc:* Oliver Wulff
>>> > >>>>>> *Subject:* Re: CXF supporting scope
>>> > >>>>>>
>>> > >>>>>>    Hi Oliver,
>>> > >>>>>>
>>> > >>>>>> I did notice that your sample application used both opensaml and
>>> > >>>>>> openws libraries. Are they used by Apache CXF or just by Frediz
>>> > project?
>>> > >>>>>>
>>> > >>>>>> I need to clarify my environment further to give you better
>>> picture.
>>> > >>>>>>
>>> > >>>>>> 1. All web services in my application are REST. The only reason
>>> that
>>> > >>>>>> I use SOAP is to create a soap client to call .NET SOAP web
>>> service
>>> > which
>>> > >>>>>> resides on another application. I am working with a .NET guy to
>>> > prove some
>>> > >>>>>> prototypes. His sample application is BookingService which I
>>> > provided you
>>> > >>>>>> wsdl. I am working on Airline.
>>> > >>>>>>
>>> > >>>>>> BookingService: .NET4.0 SOAP
>>> > >>>>>> Airline: Java with REST
>>> > >>>>>>
>>> > >>>>>> 2. Both BookingService and Airline use same ADFS as STS. We
>>> have set
>>> > >>>>>> up relying parties for BookingService and Airline in ADFS.
>>> > >>>>>>
>>> > >>>>>> 3. SSO:  A user will be using both Airline and BookingService.
>>> So,
>>> > >>>>>> she/he should be able to log on once for both applications. In
>>> > Airline(my
>>> > >>>>>> application), I used SP initialed POST redirect bindings. So,
>>> when
>>> > a user
>>> > >>>>>> make a request to Airline at first time, the user will be
>>> > redirected to
>>> > >>>>>> ADFS and asked credentials. After user provide
>>> username/password,
>>> > ADFS
>>> > >>>>>> generate SAMLtoken and this SAML token is sent back to
>>> > Airline(Airline does
>>> > >>>>>> all validation work) and cached in the session. - This part is
>>> > implemented.
>>> > >>>>>>
>>> > >>>>>> 4. Now a user call BookingService which is claim aware. So, I
>>> need
>>> > to
>>> > >>>>>> inject Assertion token get from previous step inside actas
>>> element
>>> > to call
>>> > >>>>>> STS(ADFS2.0) to get a new token. With that new token, I will be
>>> > calling
>>> > >>>>>> Booking service.
>>> > >>>>>>
>>> > >>>>>> So, I don't think that I am able to use Apach CXF STS part
>>> since my
>>> > >>>>>> STS will be ADFS. So, I am hoping that Apache CXF can work with
>>> > ADFS(STS)
>>> > >>>>>> to support my prototypes.
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>> Thanks.
>>> > >>>>>>
>>> > >>>>>> Gina
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>>
>>> > >>>>>> On Sat, May 5, 2012 at 6:22 AM, Oliver Wulff <owu...@talend.com
>>> > >wrote:
>>> > >>>>>>
>>> > >>>>>>> Hi Gina
>>> > >>>>>>>
>>> > >>>>>>> >>>
>>> > >>>>>>> So, what I need is after user log on using Web SSO, the SAML
>>> token
>>> > >>>>>>> should be cached in web context and being used as actas token
>>> when
>>> > making a
>>> > >>>>>>> call to .NET web service.
>>> > >>>>>>> >>>
>>> > >>>>>>>  This is supported by CXF without writing any single line of
>>> code.
>>> > I
>>> > >>>>>>> do have a sample web application here:
>>> > >>>>>>>
>>> > >>>>>>>
>>> >
>>> http://svn.apache.org/viewvc/cxf/fediz/trunk/examples/wsclientWebapp/webapp/
>>> > >>>>>>>
>>> > >>>>>>> This example illustrates:
>>> > >>>>>>> - fediz is configured for web sso
>>> > >>>>>>> - SAML token is cached in the session and used to request a new
>>> > >>>>>>> token from the STS
>>> > >>>>>>>
>>> > >>>>>>> The code to call the web service is in
>>> FederationServlet.doPost():
>>> > >>>>>>> ...
>>> > >>>>>>> Greeter service =
>>> > >>>>>>>
>>> >
>>> (Greeter)ApplicationContextProvider.getContext().getBean("HelloServiceClient");
>>> > >>>>>>> String reply = service.greetMe();
>>> > >>>>>>> ...
>>> > >>>>>>>
>>> > >>>>>>> The magic is in the configuration I used here:
>>> > >>>>>>>
>>> > >>>>>>>
>>> >
>>> http://svn.apache.org/viewvc/cxf/fediz/trunk/examples/wsclientWebapp/webapp/src/main/webapp/WEB-INF/beans.xml?view=markup
>>> > >>>>>>>
>>> > >>>>>>> The following property registers a callback handler to provide
>>> the
>>> > >>>>>>> STSClient the token of the Web Login:
>>> > >>>>>>> <property name="onBehalfOf" ref="delegationCallbackHandler" />
>>> > >>>>>>>
>>> > >>>>>>> (There is also a property for actAs)
>>> > >>>>>>>
>>> > >>>>>>> The above example should exactly do what you need. You just
>>> have to
>>> > >>>>>>> change the above property to use ActAs instead of OnBehalfOf.
>>> The
>>> > details
>>> > >>>>>>> for this example are described here:
>>> > >>>>>>>
>>> > >>>>>>>
>>> >
>>> http://owulff.blogspot.com/2012/04/sso-across-web-applications-and-web_16.html
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>> To test this easily, you can use the Mock IDP as part of Fediz
>>> for
>>> > >>>>>>> the authentication. You could also attach Active Directory in
>>> the
>>> > Mock if
>>> > >>>>>>> you like. See here:
>>> > >>>>>>>
>>> > >>>>>>>
>>> >
>>> http://owulff.blogspot.com/2011/10/configure-ldap-directory-for-cxf-sts.html
>>> > >>>>>>>
>>> > >>>>>>> I use that within a customer set up to connect the CXF STS to
>>> > Active
>>> > >>>>>>> Directory.
>>> > >>>>>>>
>>> > >>>>>>> >>>
>>> > >>>>>>> What is Spring role in CXF?
>>> > >>>>>>> >>>
>>> > >>>>>>>  You can use Spring to configure your services. The above
>>> example
>>> > is
>>> > >>>>>>> based on spring. As you see, all security related stuff is
>>> enabled
>>> > by
>>> > >>>>>>> configuration (Convention of Configuration). You can also
>>> write an
>>> > >>>>>>> application without spring but I wouldn't write an application
>>> > without
>>> > >>>>>>> spring nowadays but this is up to you.
>>> > >>>>>>>
>>> > >>>>>>> >>>
>>> > >>>>>>> I don't know much LDAP, but it should be used as an attribute
>>> > store.
>>> > >>>>>>> I consider it as an alternative of Active Directory. Please
>>> > correct me if I
>>> > >>>>>>> am wrong.
>>> > >>>>>>> >>>
>>> > >>>>>>>  Active Directory provides different interfaces. One of them is
>>> > >>>>>>> LDAP. You can use the LDAPLoginModule of the JDK for
>>> > authentication. But
>>> > >>>>>>> you don't have to care that much as ADFS (and maybe the Fediz
>>> Mock
>>> > for
>>> > >>>>>>> testing) will access ActiveDirectory to read the claims to add
>>> > them to the
>>> > >>>>>>> SAML token.
>>> > >>>>>>>
>>> > >>>>>>> Could you zip the wsdl before attaching?
>>> > >>>>>>>
>>> > >>>>>>> Thanks
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>> ------
>>> > >>>>>>>
>>> > >>>>>>> Oliver Wulff
>>> > >>>>>>>
>>> > >>>>>>> Blog: http://owulff.blogspot.com<http://owulff.blogspot.com/>
>>> > >>>>>>> Solution Architect
>>> > >>>>>>> http://coders.talend.com
>>> > >>>>>>>
>>> > >>>>>>> <http://coders.talend.com>Talend Application Integration
>>> Division
>>> > >>>>>>> http://www.talend.com
>>> > >>>>>>>
>>> > >>>>>>> ________________________________
>>> > >>>>>>>  Von: Gina Choi [ginacho...@gmail.com]
>>> > >>>>>>> Gesendet: Freitag, 4. Mai 2012 20:54
>>> > >>>>>>> Bis: users@cxf.apache.org
>>> > >>>>>>> Betreff: Re: CXF supporting scope
>>> > >>>>>>>
>>> > >>>>>>> Hi Oliver,
>>> > >>>>>>>
>>> > >>>>>>> Thanks for your response.
>>> > >>>>>>>
>>> > >>>>>>>  >You mean that WIF is deployed in the ASP.NET<http://asp.net/
>>> >
>>> > web
>>> > >>>>>>> service using the Active Requestor Profile?
>>> > >>>>>>> >The SAML token should contain the claims as an
>>> AttributeStatement?
>>> > >>>>>>> >Can you share with us the WS-SecurityPolicy of this Web
>>> Service?
>>> > >>>>>>> I have attached two wsdl file. BookingService.wsdl and
>>> > >>>>>>> BookingService_imported.wsdl. BookingService.wsdl  is importing
>>> > >>>>>>> BookingService_imported.wsdl and if you open
>>> BookingService.wsdl,
>>> > in line
>>> > >>>>>>> 10 there is a importing statement like bellow. This .NET4.0
>>> > service is not
>>> > >>>>>>> owned by me and I don't know if separating wsdl file is common
>>> > practice. Is
>>> > >>>>>>> there anyway to combin them into one when generate artifact
>>> using
>>> > wsimport?
>>> > >>>>>>> I will be calling CheckIn operation.
>>> > >>>>>>>
>>> > >>>>>>> <wsdl:import location="
>>> > >>>>>>>
>>> >
>>> http://mecdevapp02.global.sdl.corp/BookingService/BookingService.svc?wsdl=wsdl0
>>> > "
>>> > >>>>>>> namespace="http://tempuri.org/"/>
>>> > >>>>>>>
>>> > >>>>>>> >I haven't used ADFS using WS-Trust so far. Usually, it uses a
>>> > >>>>>>> Symmetric and Asymmetric binding.
>>> > >>>>>>> >What roles does ADFS 2.0 play?
>>> > >>>>>>> >Once as the IDP for the Web application SSO and once to let
>>> issue
>>> > a
>>> > >>>>>>> token onbehalfof/actas the original token >from the Web SSO?
>>> (this
>>> > is
>>> > >>>>>>> supported by CXF-Fediz)
>>> > >>>>>>> >
>>> > >>>>>>>
>>> >
>>> http://owulff.blogspot.com/2012/04/sso-across-web-applications-and-web_16.html
>>> > >>>>>>> I am using Active Directory as an attribute store. So, I could
>>> say
>>> > >>>>>>> ADFS role should be IDP. So, what I need is after user log on
>>> > using Web
>>> > >>>>>>> SSO, the SAML token should be cached in web context and being
>>> used
>>> > as actas
>>> > >>>>>>> token when making a call to .NET web service.
>>> > >>>>>>>
>>> > >>>>>>> > Yes, the passive profile is supported by Fediz. Is ADFS the
>>> IDP?
>>> > >>>>>>> In which application server is your web >application deployed?
>>> > >>>>>>> ADFS is IDP and my Java web application is Service Provider.
>>> > >>>>>>>
>>> > >>>>>>> >What do you mean exactly? Is LDAP used for authentication by
>>> the
>>> > >>>>>>> STS? Or should the service provider retrieve >the claims/roles
>>> > from LDAP?
>>> > >>>>>>> I don't know much LDAP, but it should be used as an attribute
>>> > store.
>>> > >>>>>>> I consider it as an alternative of Active Directory. Please
>>> > correct me if I
>>> > >>>>>>> am wrong. I have been reading many specifications, but I am
>>> still
>>> > having
>>> > >>>>>>> hard time to straiten up correct terms.
>>> > >>>>>>>
>>> > >>>>>>> >No, Spring is not a requirement.
>>> > >>>>>>> What is Spring role in CXF?
>>> > >>>>>>>
>>> > >>>>>>> Thanks.
>>> > >>>>>>>
>>> > >>>>>>> Gina
>>> > >>>>>>>  On Thu, May 3, 2012 at 2:24 PM, Oliver Wulff <
>>> owu...@talend.com
>>> > >>>>>>> <mailto:owu...@talend.com>> wrote:
>>> > >>>>>>> >>>
>>> > >>>>>>> 1. I have to create a client for .NET4.0 web service which
>>> claim
>>> > >>>>>>> aware. So,
>>> > >>>>>>> how is CXF interoperability with .NET?
>>> > >>>>>>> >>>
>>> > >>>>>>>  You mean that WIF is deployed in the ASP.NET<http://ASP.NET>
>>> web
>>> > >>>>>>> service using the Active Requestor Profile?
>>> > >>>>>>> The SAML token should contain the claims as an
>>> AttributeStatement?
>>> > >>>>>>> Can you share with us the WS-SecurityPolicy of this Web
>>> Service?
>>> > >>>>>>>
>>> > >>>>>>> >>>
>>> > >>>>>>> 2. If CXF support ADFS2.0 as STS.
>>> > >>>>>>> >>>
>>> > >>>>>>> I haven't used ADFS using WS-Trust so far. Usually, it uses a
>>> > >>>>>>> Symmetric and Asymmetric binding.
>>> > >>>>>>> What roles does ADFS 2.0 play?
>>> > >>>>>>> Once as the IDP for the Web application SSO and once to let
>>> issue a
>>> > >>>>>>> token onbehalfof/actas the original token from the Web SSO?
>>> (this
>>> > is
>>> > >>>>>>> supported by CXF-Fediz)
>>> > >>>>>>>
>>> > >>>>>>>
>>> >
>>> http://owulff.blogspot.com/2012/04/sso-across-web-applications-and-web_16.html
>>> > >>>>>>>
>>> > >>>>>>> >>>
>>> > >>>>>>> 3. If CXF support passive profile. Especially SP initiated
>>> Redirect
>>> > >>>>>>> ->  POST
>>> > >>>>>>> binding.
>>> > >>>>>>> >>>
>>> > >>>>>>> Yes, the passive profile is supported by Fediz. Is ADFS the
>>> IDP? In
>>> > >>>>>>> which application server is your web application deployed?
>>> > >>>>>>>
>>> > >>>>>>> >>>
>>> > >>>>>>> 4. If CXF can work with LDAP.
>>> > >>>>>>> >>>
>>> > >>>>>>> What do you mean exactly? Is LDAP used for authentication by
>>> the
>>> > >>>>>>> STS? Or should the service provider retrieve the claims/roles
>>> from
>>> > LDAP?
>>> > >>>>>>>
>>> > >>>>>>> >>>>
>>> > >>>>>>> 5. My application doesn't use Spring frame work. Do I have to
>>> use
>>> > >>>>>>> Spring
>>> > >>>>>>> Frame work to use CXF.
>>> > >>>>>>> >>>
>>> > >>>>>>> No, Spring is not a requirement.
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>> ------
>>> > >>>>>>>
>>> > >>>>>>> Oliver Wulff
>>> > >>>>>>>
>>> > >>>>>>> Blog: http://owulff.blogspot.com
>>> > >>>>>>> Solution Architect
>>> > >>>>>>> http://coders.talend.com
>>> > >>>>>>>
>>> > >>>>>>> Talend Application Integration Division http://www.talend.com
>>> > >>>>>>>
>>> > >>>>>>> ________________________________________
>>> > >>>>>>>  Von: gchoi [gc...@sdl.com<mailto:gc...@sdl.com>]
>>> > >>>>>>> Gesendet: Mittwoch, 2. Mai 2012 17:29
>>> > >>>>>>>  Bis: users@cxf.apache.org<mailto:users@cxf.apache.org>
>>> > >>>>>>>  Betreff: CXF supporting scope
>>> > >>>>>>>
>>> > >>>>>>> Hi All,
>>> > >>>>>>>
>>> > >>>>>>> So far, I evaluated several frame works, but they seem don't do
>>> > what
>>> > >>>>>>> I
>>> > >>>>>>> expect. Several people suggested me that I should consider CXF.
>>> > >>>>>>> Before I dig
>>> > >>>>>>> into CXF, I would like know if CXF support following things.
>>> By the
>>> > >>>>>>> way, I
>>> > >>>>>>> just joined this user group.
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>> 1. I have to create a client for .NET4.0 web service which
>>> claim
>>> > >>>>>>> aware. So,
>>> > >>>>>>> how is CXF interoperability with .NET?
>>> > >>>>>>>
>>> > >>>>>>> 2. If CXF support ADFS2.0 as STS.
>>> > >>>>>>>
>>> > >>>>>>> 3. If CXF support passive profile. Especially SP initiated
>>> Redirect
>>> > >>>>>>> ->  POST
>>> > >>>>>>> binding.
>>> > >>>>>>>
>>> > >>>>>>> 4. If CXF can work with LDAP.
>>> > >>>>>>>
>>> > >>>>>>> 5. My application doesn't use Spring frame work. Do I have to
>>> use
>>> > >>>>>>> Spring
>>> > >>>>>>> Frame work to use CXF.
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>> Thank in advance.
>>> > >>>>>>>
>>> > >>>>>>> --
>>> > >>>>>>> View this message in context:
>>> > >>>>>>>
>>> > http://cxf.547215.n5.nabble.com/CXF-supporting-scope-tp5680855.html
>>> > >>>>>>> Sent from the cxf-user mailing list archive at Nabble.com.
>>> > >>>>>>>
>>> > >>>>>>>
>>> > >>>>>>
>>> > >>>>>
>>> > >>>>
>>> > >>>
>>> > >>
>>> > >
>>> >
>>>
>>
>>
>

Reply via email to