Hi Oliver,
Thanks for your response.

>OK, didn't know that the URL is the same in ADFS. The reason for
WS-Federation is that it's >security token agnostic (like the STS). This
means that you can use SAML 1.1, SAML 2.0 or any >other security token
format. The Fediz Plugin component provides extension points add support
for >other token types. SAML 1.1 and 2.0 are supported out-of-the-box.

Do you have any place to configure to request either SAML1.1 or SAML2.0
token format?

I am looking at FederationProcessorImpl.java class and you have following
lines. I don't see you caching URL parameters. My application is REST
based, and I have URL parameters. requestUrl from following code is only
include URL, not parameters.


            String contextPath = request.getContextPath();
            String requestUrl = request.getRequestURL().toString();
            String requestPath = new URL(requestUrl).getPath();
            // Cut request path of request url and add context path if not
ROOT
            if (requestPath != null && requestPath.length() > 0) {
                int lastIndex = requestUrl.lastIndexOf(requestPath);
                realm = requestUrl.substring(0, lastIndex);
            } else {
                realm = requestUrl;
            }
            if (contextPath != null && contextPath.length() > 0) {
                // contextPath contains starting slash
                realm = realm + contextPath + "/";
            } else {
                realm = realm + "/";
            }
            LOG.debug("wtrealm=" + realm);


On Tue, May 15, 2012 at 12:17 PM, Oliver Wulff <owu...@talend.com> wrote:

>  Hi Gina
>
> OK, didn't know that the URL is the same in ADFS. The reason for
> WS-Federation is that it's security token agnostic (like the STS). This
> means that you can use SAML 1.1, SAML 2.0 or any other security token
> format. The Fediz Plugin component provides extension points add support
> for other token types. SAML 1.1 and 2.0 are supported out-of-the-box.
>
> The other issue is the SAML-P based solutions usually sign the SAML
> response but not the SAML token itself which makes it more difficult to
> request a token "OnBehalfOf" or "ActAs" as in your case as the STS is not
> able to validate this token.
>
>
> Thanks
> Oli
>
>
>
> ------
>
> Oliver Wulff
>
> Blog: http://owulff.blogspot.com
> Solution Architect
> http://coders.talend.com
>
> <http://coders.talend.com>Talend Application Integration Division
> http://www.talend.com
>   ------------------------------
> *From:* Gina Choi [ginacho...@gmail.com]
> *Sent:* 15 May 2012 17:02
>
> *To:* Oliver Wulff
> *Cc:* users@cxf.apache.org
> *Subject:* Re: CXF supporting scope
>
>   Hi Oliver,
>
> >Ask the ADFS administrator to provide you the url for the WS-Fed PRP
> endpoint in ADFS. This >URL must be configured in Fediz.
>
> ADFS2.0 support both WS-Federation and SAML2.0 Web SSO protocol and and
> the URLs are the same. I used SAML2.0 Web SSO while Fediz is using
> WS-Federation. That's why I couldn't recognize URL parameters of the
> WS-Federation. You must have some reason choose WS-Federation over SAML2.0
> Web SSO. I have heard that WS-Federation is limited to SAML1.1 token.
>
> >Step 4 in the following links describes how to configure the relying
> party in ADFS:
> I know how to configure relying parties in ADFS2.0.
>
> Thanks.
>
> Gina
>
>  On Mon, May 14, 2012 at 5:29 PM, Oliver Wulff <owu...@talend.com> wrote:
>
>>  Hi Gina
>>
>>
>>
>> Ask the ADFS administrator to provide you the url for the WS-Fed PRP
>> endpoint in ADFS. This URL must be configured in Fediz.
>>
>>
>>
>> >>>
>>
>>
>> https://strts01.ams.dev/adfs/services/trust/13/usernamemixed?wa=wsignin1.0&wreply=https%3A%2F%2Flocalhost%3A8443%2Ffedizhelloworld%2Fsecureservlet%2Ffed&wtrealm=https%3A%2F%2Flocalhost%3A8443%2Ffedizhelloworld%2F
>>
>> >>>
>>
>> This is the SignIn request of WS-Fed PRP which is supported by ADFS.
>>
>>
>>
>> Do you have the url of the Metadata document? If yes, there you should
>> see the PassiveRequestorUrl.
>>
>>
>>
>> Step 4 in the following links describes how to configure the relying
>> party in ADFS:
>>
>>
>> http://technet.microsoft.com/en-us/library/adfs2-federation-wif-application-step-by-step-guide(v=ws.10).aspx
>>
>>
>>
>> HTH
>>
>>
>>
>> Oli
>>
>>
>>
>>
>>
>>
>>
>> ------
>>
>> Oliver Wulff
>>
>> Blog: http://owulff.blogspot.com
>> Solution Architect
>> http://coders.talend.com
>>
>> <http://coders.talend.com>Talend Application Integration Division
>> http://www.talend.com
>>   ------------------------------
>> *From:* Gina Choi [ginacho...@gmail.com]
>> *Sent:* 14 May 2012 22:44
>>
>> *To:* users@cxf.apache.org
>> *Cc:* Oliver Wulff
>>  *Subject:* Re: CXF supporting scope
>>
>>    Hi Oliver,
>>
>> ADFS2.0 have many end points and depends on request or profile that we
>> use, we have to use different end points. When I test helloworld, I see
>> username token sent to STS as a security header, so I used 
>> *adfs/services/trust/13/usernamemixed
>> endpoint of ADFS, but when I see URL on the browser, it looks like SP
>> initiated redirect post bindings, but I don't see  base 64 encoded
>> SAMLRequest. That's why I am confused.*
>>
>> **
>> Gina
>>
>>
>>  On Mon, May 14, 2012 at 4:27 PM, Gina Choi <ginacho...@gmail.com> wrote:
>>
>>>
>>>  >Neither the RST nor the RSTR are encrypted. It's planned for the next
>>> release of the Fediz plugin >to support encrypted token which are embedded
>>> in RSTR.
>>>  Ok. Just verifying with you.
>>>
>>> >Is it required to support encrypted tokens initially? I should have
>>> this functionality by end of may.
>>>  encryption doesn't matter at this time.
>>>
>>> >You have to export the signing cert from ADFS and import into a java
>>> keystore. Don't import it into >stsstore.jks as this should be used for
>>> this demo IDP only.
>>>  when I import ADFS signing cert to java keystore, what alias name
>>> should I use? You must reference alias name from somewhere.
>>>
>>> I also need to import Service Provider signing cert to ADFS. How do I
>>> export it?
>>>
>>> I was trying to poing helloworld to ADFS, but it seems not simple. *wreply
>>> vs *RelayState. What is *wa=wsignin1.0 and wtrealm? Without deep
>>> change, it wouldn't work with ADFS.*
>>> Based on following url, I couldn't tell what kind of profile do you use?
>>> I couldn't really tell. Please see oasis link.
>>>
>>> http://www.oasis-open.org/committees/download.php/27819/sstc-saml-tech-overview-2.0-cd-02.pdf
>>> .
>>>
>>> Fediz
>>>
>>>
>>> https://strts01.ams.dev/adfs/services/trust/13/usernamemixed?wa=wsignin1.0&wreply=https%3A%2F%2Flocalhost%3A8443%2Ffedizhelloworld%2Fsecureservlet%2Ffed&wtrealm=https%3A%2F%2Flocalhost%3A8443%2Ffedizhelloworld%2F
>>>
>>> SP initiated redirect post bindig:
>>>
>>> GET
>>> /adfs/ls/?SAMLRequest=pZJPa9wwEMXv%2FRRG99U%2F73ptsXbYNoQGUrpknRR6KbI9TtTKkquR3Xz8Opss5FQKOQ7MvPd4v9ldPA02mSGg8a4kgnKSgGt9Z9xDSe7qq1VOLqoPO9SDHdV%2Bio%2FuFn5PgDHZI0KIy9kn73AaIBwhzKaFu9ubkjzGOKJi7M8vcDjzlGf0wfpGW4qdpa0Po8rX65TtTbDGAVscgX0D2%2FoB6E8cSXK5eBin4ynXWQ5jiMgF1QPSDmamux6ZRUaSKx9aOOUrSQwTkOT6siQ%2F0qLXfSZyyLs0K%2Fi24SKVXd%2B1hWw2a5GKrMi2siv6LMubPFuu8KARzQwl6bXFZx3ECa4dRu1iSSQXcsU3K7GuJVciVxtJt7n4TpJD8NG33n407qW9KTjlNRpUTg%2BAKrbquP9yoyTlqnlZQvW5rg%2Brw9djTZL7MwX5TGHh4lCdev%2B31PjqS6pXSqfA4f8F9Bkkqd6LbcfeRqjO49u%2Fqf4C&RelayState=
>>> https://wkensv0306.global.sdl.corp:8443/Airline/code/Welcome.jspHTTP/1.1
>>>
>>>
>>> On Mon, May 14, 2012 at 3:51 PM, Oliver Wulff <owu...@talend.com> wrote:
>>>
>>>> Hi Gina
>>>>
>>>> >>>
>>>> It looks like that you don't encrypt RST and RSTR, but you said that
>>>> both RST and RSTR are signed. I need to import signing cert from ADFS to
>>>> stsstore.jks keystore. Which one is key alias for RP? You have
>>>> clientkey,
>>>> myservicekey and mystskey. Vise versa, I need to export signing cert
>>>> from
>>>> RP to import it to ADFS. Do you have signing cert somewhere or I have to
>>>> export it myself?
>>>> >>>
>>>>  Neither the RST nor the RSTR are encrypted. It's planned for the next
>>>> release of the Fediz plugin to support encrypted token which are embedded
>>>> in RSTR.
>>>>
>>>> Is it required to support encrypted tokens initially? I should have
>>>> this functionality by end of may.
>>>>
>>>> You have to export the signing cert from ADFS and import into a java
>>>> keystore. Don't import it into stsstore.jks as this should be used for this
>>>> demo IDP only.
>>>>
>>>> Thanks
>>>> Oli
>>>>
>>>>
>>>>
>>>> ------
>>>>
>>>> Oliver Wulff
>>>>
>>>> Blog: http://owulff.blogspot.com
>>>> Solution Architect
>>>> http://coders.talend.com
>>>>
>>>>  Talend Application Integration Division http://www.talend.com
>>>>
>>>> ________________________________________
>>>> From: Gina Choi [ginacho...@gmail.com]
>>>>  Sent: 14 May 2012 21:23
>>>> To: users@cxf.apache.org
>>>>  Subject: Re: CXF supporting scope
>>>>
>>>> Hi Oliver,
>>>>
>>>> >You're right - this is confusing. The STS signs the SAML token with the
>>>> private which correlates to >the STS certificate. The RP requires the CA
>>>> certificates and the STS certificate (if self-signed as in >this demo
>>>> case)
>>>> to validate the SAML token.
>>>>
>>>> Thanks for response. I looked request and response message between RP
>>>> and
>>>> STS. It looks like that you don't encrypt RST and RSTR, but you said
>>>> that
>>>> both RST and RSTR are signed. I need to import signing cert from ADFS to
>>>> stsstore.jks keystore. Which one is key alias for RP? You have
>>>> clientkey,
>>>> myservicekey and mystskey. Vise versa, I need to export signing cert
>>>> from
>>>> RP to import it to ADFS. Do you have signing cert somewhere or I have to
>>>> export it myself?
>>>>
>>>> Thanks.
>>>>
>>>> Gina
>>>>
>>>>
>>>> On Mon, May 14, 2012 at 2:19 PM, Oliver Wulff <owu...@talend.com>
>>>> wrote:
>>>>
>>>> > Hi Gina
>>>> >
>>>> > >>>
>>>> > But I still don't understand why I have to copy stsstore.jks file
>>>> into RP.
>>>> > stsstore.jks is the keystore file of STS and it should be sitting on
>>>> > somewhere on tomcat-idp not tomcat-rp. And ttomcat-rp should have
>>>> it's own
>>>> > keystore file, for example clientstore.jks.
>>>> > When client issue AuthnRequest to STS, it will sign AuthnRequest with
>>>> STS
>>>> > signing certificate. Vise versa, when STS issue Assertion token, it
>>>> will be
>>>> > signed by client signing certificate.
>>>> > In fediz project senario, RP will be the client and it will never have
>>>> > keystore file of STS.
>>>> > I just looked at content of stsstore.jks and it looks like that you
>>>> > combined sts, client and service keystore file into one -
>>>> stsstore.jks. In
>>>> > other words, stsstore.jks is being used as a keystore file for all
>>>> three -
>>>> > client, service and sts. Is that correct? I think that they should be
>>>> > separated. Kind of confusing until list content of stsstore.jks.
>>>> > >>>
>>>> > You're right - this is confusing. The STS signs the SAML token with
>>>> the
>>>> > private which correlates to the STS certificate. The RP requires the
>>>> CA
>>>> > certificates and the STS certificate (if self-signed as in this demo
>>>> case)
>>>> > to validate the SAML token.
>>>> >
>>>> > I was too lazy in creating two keystores (I just copied the keystore
>>>> used
>>>> > by the CXF STS distribution). In a production environment, one
>>>> keystore
>>>> > contains the private key and the certificate for the STS and the other
>>>> > contains the certificate only for the RP.
>>>> >
>>>> > I've started documentating fediz here:
>>>> > http://cxf.apache.org/fediz.html
>>>> >
>>>> > It would make sense to add a section what to consider for production
>>>> > implementation. I'll add that.
>>>> >
>>>> > Thanks
>>>> >
>>>> > ------
>>>> >
>>>> > Oliver Wulff
>>>> >
>>>> > Blog: http://owulff.blogspot.com
>>>> > Solution Architect
>>>> > http://coders.talend.com
>>>> >
>>>> > Talend Application Integration Division http://www.talend.com
>>>> >
>>>> > ________________________________________
>>>> > From: Gina Choi [ginacho...@gmail.com]
>>>> > Sent: 14 May 2012 18:00
>>>> > To: Oliver Wulff
>>>> > Cc: users@cxf.apache.org
>>>> > Subject: Re: CXF supporting scope
>>>> >
>>>> > Hi Oliver,
>>>> >
>>>> > Thanks for your response. I copied over stsstore.jks into tomcat rp
>>>> and I
>>>> > am seeing saml token now.
>>>> >
>>>> > >The SAML token issued by the IDP/STS is signed and the used
>>>> certificate
>>>> > must be referenced to >validate the signature:
>>>> >
>>>> >  ><trustedIssuerItem provider=".*CN=www.sts.com.*">
>>>> > >< keyStore file="/projects/fediz/tomcat-rp2/conf/stsstore.jks"
>>>> > password="stsspass" type="file" />
>>>> > >< /trustedIssuerItem>
>>>> >
>>>> > >In this example, I used a self-signed certificate and I was too lazy
>>>> in
>>>> > separating the keystore into >one with the private key and into one
>>>> > without.
>>>> >
>>>> > >You find the stsstore.jks in fedizidpsts.war. Just copy it to the RP.
>>>> >
>>>> > But I still don't understand why I have to copy stsstore.jks file
>>>> into RP.
>>>> > stsstore.jks is the keystore file of STS and it should be sitting on
>>>> > somewhere on tomcat-idp not tomcat-rp. And ttomcat-rp should have
>>>> it's own
>>>> > keystore file, for example clientstore.jks.
>>>> >
>>>> > When client issue AuthnRequest to STS, it will sign AuthnRequest with
>>>> STS
>>>> > signing certificate. Vise versa, when STS issue Assertion token, it
>>>> will be
>>>> > signed by client signing certificate.
>>>> >
>>>> > In fediz project senario, RP will be the client and it will never have
>>>> > keystore file of STS.
>>>> >
>>>> > I just looked at content of stsstore.jks and it looks like that you
>>>> > combined sts, client and service keystore file into one -
>>>> stsstore.jks. In
>>>> > other words, stsstore.jks is being used as a keystore file for all
>>>> three -
>>>> > client, service and sts. Is that correct? I think that they should be
>>>> > separated. Kind of confusing until list content of stsstore.jks.
>>>> >
>>>> > Thanks.
>>>> >
>>>> > Gina
>>>> >
>>>> >
>>>> > On Fri, May 11, 2012 at 2:55 AM, Oliver Wulff <owu...@talend.com>
>>>> wrote:
>>>> >
>>>> > >  Hi Gina
>>>> > >
>>>> > >
>>>> > >
>>>> > > The SAML token issued by the IDP/STS is signed and the used
>>>> certificate
>>>> > > must be referenced to validate the signature:
>>>> > >
>>>> > >
>>>> > >
>>>> > >  <trustedIssuerItem provider=".*CN=www.sts.com.*">
>>>> > > <keyStore file="/projects/fediz/tomcat-rp2/conf/stsstore.jks"
>>>> > > password="stsspass" type="file" />
>>>> > > </trustedIssuerItem>
>>>> > >
>>>> > > In this example, I used a self-signed certificate and I was too
>>>> lazy in
>>>> > > separating the keystore into one with the private key and into one
>>>> > without.
>>>> > >
>>>> > >
>>>> > >
>>>> > > You find the stsstore.jks in fedizidpsts.war. Just copy it to the
>>>> RP.
>>>> > >
>>>> > >
>>>> > >
>>>> > > In your scenario with ADFS. You must import the CA certs which
>>>> signed the
>>>> > > ADFS cert into a keystore and configure the CN name as a regular
>>>> > expression
>>>> > > in the attribute "provider". (The name provider is misleaing, will
>>>> fix
>>>> > that)
>>>> > >
>>>> > >
>>>> > >
>>>> > > Thanks
>>>> > >
>>>> > >
>>>> > >
>>>> > >
>>>> > >
>>>> > > ------
>>>> > >
>>>> > > Oliver Wulff
>>>> > >
>>>> > > Blog: http://owulff.blogspot.com
>>>> > > Solution Architect
>>>> > > http://coders.talend.com
>>>> > >
>>>> > > <http://coders.talend.com>Talend Application Integration Division
>>>> > > http://www.talend.com
>>>> > >   ------------------------------
>>>> > > *From:* Gina Choi [ginacho...@gmail.com]
>>>> > > *Sent:* 11 May 2012 00:44
>>>> > >
>>>> > > *To:* Oliver Wulff
>>>> > > *Cc:* users@cxf.apache.org
>>>> > > *Subject:* Re: CXF supporting scope
>>>> > >
>>>> > >   Hi Oliver,
>>>> > >
>>>> > > Until this afternoon, I didn't have time to work with Fediz.
>>>> Finally I
>>>> > > have successfully deployed idp, sts and simpleWebapp on
>>>> Tomcat7.0.27.
>>>> > > Everything went well. I guess that on the other day, I thought
>>>> doing some
>>>> > > thing, but I probably did something else. :)
>>>> > > After type https://localhost:8443/fedizhelloworld/secureservlet/fedon
>>>> > > the browser, I inputed test user name and password, but it failed.
>>>> > >
>>>> > >
>>>> > > org.apache.ws.security.components.crypto.CredentialException: Proxy
>>>> file
>>>> > (/projects/fediz/tomcat-rp2/conf/stsstore.jks) not found.
>>>> > >
>>>> > >
>>>> > > In your fediz_config.xml, you have following lines. Why do we put
>>>> sts key
>>>> > > store file on RP server? Does web application need to know where is
>>>> sts
>>>> > > keystore file?
>>>> > >
>>>> > >   <trustedIssuers>
>>>> > >    <trustedIssuerItem provider=".*CN=www.sts.com.*">
>>>> > >     <keyStore file="/projects/fediz/tomcat-rp2/conf/stsstore.jks"
>>>> > > password="stsspass" type="file" />
>>>> > >    </trustedIssuerItem>
>>>> > >   </trustedIssuers>
>>>> > >
>>>> > >
>>>> > > Thanks.
>>>> > >
>>>> > > Gina
>>>> > >
>>>> > >  On Wed, May 9, 2012 at 1:45 AM, Oliver Wulff <owu...@talend.com>
>>>> wrote:
>>>> > >
>>>> > >>  Hi Gina
>>>> > >>
>>>> > >> The steps are absolutely correct. Not sure about the failing
>>>> deployment
>>>> > >> step for the application. Have you also updated tomcat-users.xml
>>>> of the
>>>> > >> second tomcat instance? Or was the application already deployed
>>>> once and
>>>> > >> you must run "mvn clean install tomcat:redeploy"? Is anything
>>>> logged on
>>>> > >> catalina.out?
>>>> > >> Otherwise, just copy the war manually from
>>>> target/fedizhelloworld.war to
>>>> > >> <tomcat-dir>/webapps.
>>>> > >>
>>>> > >> I've checked in fediz_config.xml in
>>>> > examples/simpleWebapp/src/main/config
>>>> > >> (sorry for that). Please manually copy it to the location you've
>>>> > configured
>>>> > >> in the context.xml. Ensure that the IDP url (later ADFS):
>>>> > >> <issuer>https://localhost:9443/fedizidp/</issuer>
>>>> > >> and the location of the trusted keystore is updated:
>>>> > >> <keyStore file="/projects/fediz/tomcat-rp2/conf/stsstore.jks"
>>>> > >> password="stsspass" type="file" />
>>>> > >>
>>>> > >> It will be supported in the next days to also configure a relative
>>>> > >> location to catalina.home.
>>>> > >>
>>>> > >>
>>>> > >> Thanks
>>>> > >> Oli
>>>> > >>
>>>> > >>
>>>> > >>
>>>> > >> ------
>>>> > >>
>>>> > >> Oliver Wulff
>>>> > >>
>>>> > >> Blog: http://owulff.blogspot.com
>>>> > >> Solution Architect
>>>> > >> http://coders.talend.com
>>>> > >>
>>>> > >> <http://coders.talend.com>Talend Application Integration Division
>>>> > >> http://www.talend.com
>>>> > >>   ------------------------------
>>>> > >> *From:* Gina Choi [ginacho...@gmail.com]
>>>> > >> *Sent:* 09 May 2012 00:55
>>>> > >>
>>>> > >> *To:* Oliver Wulff
>>>> > >> *Cc:* users@cxf.apache.org
>>>> > >> *Subject:* Re: CXF supporting scope
>>>> > >>
>>>> > >>   By the way I checked out head version fediz project from SVN.
>>>> > >>
>>>> > >> On Tue, May 8, 2012 at 6:36 PM, Gina Choi <ginacho...@gmail.com>
>>>> wrote:
>>>> > >>
>>>> > >>> Hi Oliver,
>>>> > >>>
>>>> > >>> I am using seperate Tomcat instance for IDP and application and I
>>>> set
>>>> > up
>>>> > >>> https. Following is what I did.
>>>> > >>>
>>>> > >>> I checked out Fediz project into my local machine. As you
>>>> explained on
>>>> > >>> your post
>>>> > >>>
>>>> >
>>>> http://owulff.blogspot.com/2011/11/configure-tomcat-for-federation-part.html
>>>> > ,
>>>> > >>> I run mvn clean install in plugins/core, pligins/tomcat and
>>>> > >>> examples/simpleWebapp/. I configued maven's settings.xml and
>>>> updated
>>>> > >>> tomca-users.xml. I ran mvn tomcat:deploy under
>>>> fediz\trunk\plugins,
>>>> > and I
>>>> > >>> am seeing both IDP and STS are deployed.
>>>> > >>>
>>>> > >>> I am just having problem with deloying sample application in
>>>> another
>>>> > >>> Tomcat instance.
>>>> > >>>
>>>> > >>> 1. I created  sub-directory fediz in ${catalina.home}/lib of the
>>>> > >>> tomcat-rp.
>>>> > >>> 2. I have following line in the  calatina.properties in
>>>> > >>> ${catalina.home}/conf.
>>>> > >>>
>>>> > >>>
>>>> >
>>>> common.loader=${catalina.base}/lib,${catalina.base}/lib/*.jar,${catalina.home}/lib,${catalina.home}/lib/*.jar,${catalina.home}/lib/fediz/*.jar
>>>> > >>> 3. I deployed the built libraries and dependencies to the
>>>> directory
>>>> > >>> created in (1)
>>>> > >>> I got the built libraries from
>>>> >
>>>> fediz-tomcat/target/fediz-tomcat-0.6-SNAPSHOT-zip-with-dependencies.zip.
>>>> > >>> After this, I am getting error messages when start Tomcat. This
>>>> > preventing
>>>> > >>> me step5 for deploying applicaitons properly.
>>>> > >>>  If I replace generated lib/fediz jar files with old jar files
>>>> that I
>>>> > >>> downloaded from your post, I am able to start tomcat without
>>>> error and
>>>> > able
>>>> > >>> to deploy application, but couldn't run properly.
>>>> > >>> 4. since I can't find fediz_config.xml, so I configured
>>>> > *META-INF/context.xml
>>>> > >>> as follow.
>>>> > >>>
>>>> > >>> *  <Context>
>>>> > >>> <Valve className="org.apache<
>>>> >
>>>> http://owulff.blogspot.com/2011/11/configure-tomcat-for-federation-part.html#
>>>> > >
>>>> > >>> .cxf.fediz.tomcat.FederationAuthenticator"
>>>> > >>>  issuerURL="https://localhost:9443/fedizidp/";
>>>> > >>> truststoreFile="conf/stsstore.jks"
>>>> > >>> truststorePassword="stsspass"
>>>> > >>> trustedIssuer=".*CN=www.sts.com.*" />
>>>> > >>>  </Context>
>>>> > >>> 5. If I run mvn tomcat:deploy under
>>>> fediz\trunk\examples\simpleWebapp,
>>>> > I
>>>> > >>> am getting following error message.
>>>> > >>>
>>>> > >>> Failed to execute goal
>>>> org.codehaus.mojo:tomcat-maven-plugin:1.1:deploy
>>>> > >>> (default-cli) on project simpleWebapp: Cannot invoke Tomcat
>>>> manager:
>>>> > FAIL -
>>>> > >>> Failed to deploy application at context path /fedizhelloworld ->
>>>> [Help
>>>> > 1]
>>>> > >>>
>>>> > >>> So, I couldn't get your application run. I hope that all these
>>>> problem
>>>> > >>> caused because of missing fediz_config.xml.
>>>> > >>>
>>>> > >>> Thanks.
>>>> > >>>
>>>> > >>> Gina
>>>> > >>>   On Tue, May 8, 2012 at 2:46 PM, Oliver Wulff <owu...@talend.com
>>>> > >wrote:
>>>> > >>>
>>>> > >>>>  Hi Gina
>>>> > >>>>
>>>> > >>>>
>>>> > >>>>
>>>> > >>>> I'll send you and checkin the fediz_config.xml as soon as I can
>>>> - I'm
>>>> > >>>> on the way right now.
>>>> > >>>>
>>>> > >>>>
>>>> > >>>>
>>>> > >>>> This STS URL is fine, the Mock IDP uses the CXF STS. When the
>>>> > >>>> application works you will change in your application
>>>> > (fediz_config.xml)
>>>> > >>>> the issuerUrl of ADFS.
>>>> > >>>>
>>>> > >>>>
>>>> > >>>>
>>>> > >>>> Have you configured HTTPS for the IDP Tomcat instance and your
>>>> > >>>> application Tomcat instance?
>>>> > >>>>
>>>> > >>>> I recommend to use a separate instance of the IDP and your
>>>> > application.
>>>> > >>>>
>>>> > >>>> Do you use the port 9443?
>>>> > >>>>
>>>> > >>>>
>>>> > >>>>
>>>> > >>>> Thanks
>>>> > >>>>
>>>> > >>>>
>>>> > >>>>
>>>> > >>>>
>>>> > >>>>
>>>> > >>>> ------
>>>> > >>>>
>>>> > >>>> Oliver Wulff
>>>> > >>>>
>>>> > >>>> Blog: http://owulff.blogspot.com
>>>> > >>>> Solution Architect
>>>> > >>>> http://coders.talend.com
>>>> > >>>>
>>>> > >>>> <http://coders.talend.com>Talend Application Integration
>>>> Division
>>>> > >>>> http://www.talend.com
>>>> > >>>>   ------------------------------
>>>> > >>>> *From:* Gina Choi [ginacho...@gmail.com]
>>>> > >>>> *Sent:* 08 May 2012 20:20
>>>> > >>>>
>>>> > >>>> *To:* Oliver Wulff
>>>> > >>>> *Cc:* users@cxf.apache.org
>>>> > >>>> *Subject:* Re: CXF supporting scope
>>>> > >>>>
>>>> > >>>>    Hi Oliver
>>>> > >>>>
>>>> > >>>> >I'd recommend to successfully deploy the wsclientWebapp sample
>>>> and
>>>> > the
>>>> > >>>> IDP. When this works, rip&replace >one piece after the other. I'd
>>>> > recommend
>>>> > >>>> to choose the following approach.
>>>> > >>>>
>>>> > >>>> >1) Replace the Fediz IDP by ADFS
>>>> > >>>> >      + configure the ADFS issuerUrl (context.xml)
>>>> > >>>> >      + ensure that ADFS supports WS-Federation Passive
>>>> Requestor
>>>> > >>>> Profile
>>>> > >>>> >      + configure the certificate used by ADFS to sign the SAML
>>>> token
>>>> > >>>> >
>>>> > >>>> >(the most recent version of fediz uses a separate xml file for
>>>> the
>>>> > >>>> configuration)
>>>> > >>>>
>>>> > >>>> Somehow I couldn't deploy both fediz\trunk\services and
>>>> > >>>> fediz\trunk\examples\wsclientWebapp on Tomcat7.0.27, so I
>>>> deployed
>>>> > them on
>>>> > >>>> Tomcat 7.0.21. I checked tomcat user name and Maven's settings
>>>> file
>>>> > all,
>>>> > >>>> but couldn't find reason. It just said that can't involke Tomcat
>>>> > Manager.
>>>> > >>>> But since I was able to deploy it on tomcat 7.0.21, I decided to
>>>> > figure it
>>>> > >>>> out later.
>>>> > >>>>
>>>> > >>>> In the context.xml, I have following content. So, It lookis like
>>>> that
>>>> > >>>> issuerURL defined inside fediz_config.xml, but I searched all
>>>> > directories,
>>>> > >>>> but couldn't find a file called fediz_config.xml.
>>>> > >>>>
>>>> > >>>> <Context>
>>>> > >>>>         <Valve
>>>> > >>>> className="org.apache.cxf.fediz.tomcat.FederationAuthenticator"
>>>> > >>>> configFile="conf/fediz_config.xml" />
>>>> > >>>>         <!--<Valve
>>>> > >>>> className="org.apache.cxf.fediz.tomcat.FederationAuthenticator"
>>>> > issuerURL="
>>>> > >>>> https://localhost:9443/fedizidp/";
>>>> truststoreFile="conf/stsstore.jks"
>>>> > >>>> truststorePassword="stsspass" trustedIssuer=".*CN=www.sts.com.*"
>>>> />-->
>>>> > >>>>         <!--Valve
>>>> > >>>> className="org.apache.cxf.fediz.tomcat.FederationAuthenticator"
>>>> > >>>>
>>>> >
>>>> issuerCallbackHandler="org.apache.cxf.fediz.tomcat.DummyIDPCallbackHandler"
>>>> > >>>> truststoreFile="conf/stsstore.jks" truststorePassword="stsspass"
>>>> > >>>> />-->
>>>> > >>>> </Context>
>>>> > >>>>
>>>> > >>>> In the web.xml file of the idp, you have following content. ADFS
>>>> has
>>>> > >>>> mex address. so, I assume that I need to replace value of
>>>> > sts.wsdl.url with
>>>> > >>>> ADFS mex address.
>>>> > >>>>
>>>> > >>>>
>>>> > >>>>  <servlet>
>>>> > >>>>   <servlet-name>FederationServlet</servlet-name>
>>>> > >>>>
>>>> > >>>>
>>>> >
>>>> <servlet-class>org.apache.cxf.fediz.service.idp.IdpServlet</servlet-class>
>>>> > >>>>   <init-param>
>>>> > >>>>    <param-name>sts.wsdl.url</param-name>
>>>> > >>>>    <param-value>
>>>> https://localhost:9443/fedizidpsts/STSService?wsdl
>>>> > >>>> </param-value>
>>>> > >>>>   </init-param>
>>>> > >>>>   <init-param>
>>>> > >>>>    <param-name>sts.wsdl.service</param-name>
>>>> > >>>>    <param-value>SecurityTokenService</param-value>
>>>> > >>>>   </init-param>
>>>> > >>>>
>>>> > >>>> Thanks.
>>>> > >>>>
>>>> > >>>> Gina
>>>> > >>>>  On Tue, May 8, 2012 at 2:26 AM, Oliver Wulff <owu...@talend.com
>>>> > >wrote:
>>>> > >>>>
>>>> > >>>>>  Hi Gina
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>> >>>
>>>> > >>>>>
>>>> > >>>>> I don't mind giving up existing implementation as long as I find
>>>> > >>>>> better solution. I was hoping that Fediz project
>>>> > >>>>>
>>>> > >>>>> uses only Apache CXF instead of introducing another FrameWork -
>>>> > >>>>> OpenSAML.
>>>> > >>>>>
>>>> > >>>>> >>>
>>>> > >>>>>
>>>> > >>>>> Apache CXF uses OpenSAML too for all SAML processing for SOAP
>>>> and
>>>> > REST
>>>> > >>>>> based service communication. OpenSAML is widely used and bundled
>>>> > into other
>>>> > >>>>> frameworks like CXF and Fediz.
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>> >>>
>>>> > >>>>>
>>>> > >>>>> If I only consider passive profile at this moment, what changes
>>>> are
>>>> > >>>>> need to Fediz project to point to ADFS(STS) intead of Apach CXF
>>>> STS?
>>>> > Where
>>>> > >>>>> did you define your stsActionURL? I like to start with passive
>>>> > profile
>>>> > >>>>> since it is easier to start with. I can use your sample
>>>> application.
>>>> > It
>>>> > >>>>> doesn't matter if I use Airline or not since it is a just
>>>> prototype
>>>> > >>>>>
>>>> > >>>>> >>>
>>>> > >>>>>
>>>> > >>>>> I'd recommend to successfully deploy the wsclientWebapp sample
>>>> and
>>>> > the
>>>> > >>>>> IDP. When this works, rip&replace one piece after the other. I'd
>>>> > recommend
>>>> > >>>>> to choose the following approach.
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>> 1) Replace the Fediz IDP by ADFS
>>>> > >>>>>
>>>> > >>>>>       + configure the ADFS issuerUrl (context.xml)
>>>> > >>>>>
>>>> > >>>>>       + ensure that ADFS supports WS-Federation Passive
>>>> Requestor
>>>> > >>>>> Profile
>>>> > >>>>>
>>>> > >>>>>       + configure the certificate used by ADFS to sign the SAML
>>>> token
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>> (the most recent version of fediz uses a separate xml file for
>>>> the
>>>> > >>>>> configuration)
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>> 2) Update the webapp to generate and use the stubs of the
>>>> > >>>>> BookingService in the FederationServlet (just a test - call the
>>>> > simplest
>>>> > >>>>> method). Configure the ASP.NET wsdl location (usually
>>>> url?wsdl).
>>>> > >>>>> Configure the ADFS STS url in the STSClient bean in the
>>>> beans.xml
>>>> > >>>>> configuration. Change the property onbehalfof to actas.
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>> HTH
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>> ------
>>>> > >>>>>
>>>> > >>>>> Oliver Wulff
>>>> > >>>>>
>>>> > >>>>> Blog: http://owulff.blogspot.com
>>>> > >>>>> Solution Architect
>>>> > >>>>> http://coders.talend.com
>>>> > >>>>>
>>>> > >>>>> <http://coders.talend.com>Talend Application Integration
>>>> Division
>>>> > >>>>> http://www.talend.com
>>>> > >>>>>   ------------------------------
>>>> > >>>>> *From:* Gina Choi [ginacho...@gmail.com]
>>>> > >>>>> *Sent:* 08 May 2012 01:05
>>>> > >>>>> *To:* Oliver Wulff
>>>> > >>>>> *Cc:* users@cxf.apache.org
>>>> > >>>>>
>>>> > >>>>> *Subject:* Re: CXF supporting scope
>>>> > >>>>>
>>>> > >>>>>    Hi Oliver,
>>>> > >>>>>
>>>> > >>>>> I am not responsible for BookingService(.NET). The other guys
>>>> who
>>>> > >>>>> implemented it using WIF. You know that Microsoft created WIF
>>>> and
>>>> > tested
>>>> > >>>>> with ADFS, so it it doesn't work, I would be surprised.
>>>> > >>>>>  >Which Servlet container do you use?
>>>> > >>>>> I am using Tomcat7.
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>> >In your current setup, how does the samlp:Response look like?
>>>> > >>>>> I sent you decoded SAML response token in seperate email. I am
>>>> > >>>>> sretrieving based64 encoded saml response token using following
>>>> code.
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>> String encodedSamlResponseTokenStr =
>>>> > >>>>> request.getParameter("SAMLResponse");
>>>> > >>>>>
>>>> > >>>>> I don't mind giving up existing implementation as long as I find
>>>> > >>>>> better solution. I was hoping that Fediz project uses only
>>>> Apache CXF
>>>> > >>>>> instead of introducing another FrameWork - OpenSAML.
>>>> > >>>>>
>>>> > >>>>> I loaded
>>>> > >>>>>
>>>> >
>>>> http://svn.apache.org/viewvc/cxf/fediz/trunk/examples/wsclientWebapp/webapp/to
>>>> > >>>>> the Eclipse today.
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>> Basically I need following three URL for ADFS(STS). First two
>>>> is for
>>>> > >>>>> active profile and third one is for passive profile(SP initiated
>>>> > Redirect
>>>> > >>>>> POST bindings). If I only consider passive profile at this
>>>> moment,
>>>> > what
>>>> > >>>>> changes are need to Fediz project to point to ADFS(STS) intead
>>>> of
>>>> > Apach CXF
>>>> > >>>>> STS? Where did you define your stsActionURL? I like to start
>>>> with
>>>> > passive
>>>> > >>>>> profile since it is easier to start with. I can use your sample
>>>> > >>>>> application. It doesn't matter if I use Airline or not since it
>>>> is a
>>>> > just
>>>> > >>>>> prototype.
>>>> > >>>>>
>>>> > >>>>> *private* *static* *final* String *stsEndpoint* = "
>>>> > >>>>> https://strts01.ams.dev/adfs/services/trust/13/usernamemixed";;
>>>> > >>>>>
>>>> > >>>>> *private* *static* *final* String *stsMEXAddress* =
>>>> > >>>>> https://strts01.ams.dev/adfs/services/trust/mex;
>>>> > >>>>>
>>>> > >>>>> private static final String stsActionURL =
>>>> > >>>>> https://strts01.ams.dev/adfs/ls/;
>>>> > >>>>>
>>>> > >>>>>
>>>> > >>>>>  Thanks again for your guidance.
>>>> > >>>>>
>>>> > >>>>> Gina
>>>> > >>>>>
>>>> > >>>>> On Mon, May 7, 2012 at 3:36 PM, Oliver Wulff <owu...@talend.com
>>>> > >wrote:
>>>> > >>>>>
>>>> > >>>>>>  Hi Gina
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>> The fediz project is used to protect your web application
>>>> where the
>>>> > >>>>>> client is a browser. Right now, Fediz supports WS-Federation
>>>> Passive
>>>> > >>>>>> Requestor Profile which is supported by ADFS and usually used
>>>> in
>>>> > the .NET
>>>> > >>>>>> world as a the default mechanism. You don't have to implement
>>>> that
>>>> > in
>>>> > >>>>>> your application - that's done by the Fediz plugin. Fediz uses
>>>> > opensaml for
>>>> > >>>>>> SAML processing.
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>> The original URL is stored in the wreply parameter. .NET uses a
>>>> > >>>>>> combination of the wtrealm and wctx parameter.
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>> Your Airline application can use CXF for the web services
>>>> > >>>>>> communication (for the REST communication also, if you like).
>>>> The
>>>> > built-in
>>>> > >>>>>> support in CXF for the IssuedToken assertion
>>>> (WS-SecurityPolicy)
>>>> > supports
>>>> > >>>>>> to get a token from ADFS using actas. In my example, just use
>>>> actas
>>>> > instead
>>>> > >>>>>> of onbehalfof property.
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>> >>>
>>>> > >>>>>>
>>>> > >>>>>>  ADFS generate SAMLtoken and this SAML token is sent back to
>>>> > >>>>>> Airline(Airline does all validation work) and cached in the
>>>> > session. - This
>>>> > >>>>>> part is implemented.
>>>> > >>>>>>
>>>> > >>>>>> >>>
>>>> > >>>>>>
>>>> > >>>>>> The validation work is already done by Fediz. Session
>>>> management is
>>>> > >>>>>> then done by the JEE container. Your application is called
>>>> after
>>>> > the SAML
>>>> > >>>>>> token issued by ADFS is successfully validated. The container
>>>> will
>>>> > create
>>>> > >>>>>> the session and check every incoming request whether the used
>>>> token
>>>> > is
>>>> > >>>>>> still valid - otherwise, the browser is redirected again to
>>>> ADFS.
>>>> > You could
>>>> > >>>>>> also configure some roles in ADFS to protect your web
>>>> application
>>>> > as the
>>>> > >>>>>> fediz plugin tells the container the userid as well as its
>>>> roles.
>>>> > You could
>>>> > >>>>>> even use claims if you like.
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>> Which Servlet container do you use?
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>> In your current setup, how does the samlp:Response look like?
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>> Thanks
>>>> > >>>>>>
>>>> > >>>>>> Oli
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>> ------
>>>> > >>>>>>
>>>> > >>>>>> Oliver Wulff
>>>> > >>>>>>
>>>> > >>>>>> Blog: http://owulff.blogspot.com
>>>> > >>>>>> Solution Architect
>>>> > >>>>>> http://coders.talend.com
>>>> > >>>>>>
>>>> > >>>>>> <http://coders.talend.com>Talend Application Integration
>>>> Division
>>>> > >>>>>> http://www.talend.com
>>>> > >>>>>>   ------------------------------
>>>> > >>>>>> *From:* Gina Choi [ginacho...@gmail.com]
>>>> > >>>>>> *Sent:* 07 May 2012 20:24
>>>> > >>>>>> *To:* users@cxf.apache.org
>>>> > >>>>>> *Cc:* Oliver Wulff
>>>> > >>>>>> *Subject:* Re: CXF supporting scope
>>>> > >>>>>>
>>>> > >>>>>>    Hi Oliver,
>>>> > >>>>>>
>>>> > >>>>>> I did notice that your sample application used both opensaml
>>>> and
>>>> > >>>>>> openws libraries. Are they used by Apache CXF or just by Frediz
>>>> > project?
>>>> > >>>>>>
>>>> > >>>>>> I need to clarify my environment further to give you better
>>>> picture.
>>>> > >>>>>>
>>>> > >>>>>> 1. All web services in my application are REST. The only
>>>> reason that
>>>> > >>>>>> I use SOAP is to create a soap client to call .NET SOAP web
>>>> service
>>>> > which
>>>> > >>>>>> resides on another application. I am working with a .NET guy to
>>>> > prove some
>>>> > >>>>>> prototypes. His sample application is BookingService which I
>>>> > provided you
>>>> > >>>>>> wsdl. I am working on Airline.
>>>> > >>>>>>
>>>> > >>>>>> BookingService: .NET4.0 SOAP
>>>> > >>>>>> Airline: Java with REST
>>>> > >>>>>>
>>>> > >>>>>> 2. Both BookingService and Airline use same ADFS as STS. We
>>>> have set
>>>> > >>>>>> up relying parties for BookingService and Airline in ADFS.
>>>> > >>>>>>
>>>> > >>>>>> 3. SSO:  A user will be using both Airline and BookingService.
>>>> So,
>>>> > >>>>>> she/he should be able to log on once for both applications. In
>>>> > Airline(my
>>>> > >>>>>> application), I used SP initialed POST redirect bindings. So,
>>>> when
>>>> > a user
>>>> > >>>>>> make a request to Airline at first time, the user will be
>>>> > redirected to
>>>> > >>>>>> ADFS and asked credentials. After user provide
>>>> username/password,
>>>> > ADFS
>>>> > >>>>>> generate SAMLtoken and this SAML token is sent back to
>>>> > Airline(Airline does
>>>> > >>>>>> all validation work) and cached in the session. - This part is
>>>> > implemented.
>>>> > >>>>>>
>>>> > >>>>>> 4. Now a user call BookingService which is claim aware. So, I
>>>> need
>>>> > to
>>>> > >>>>>> inject Assertion token get from previous step inside actas
>>>> element
>>>> > to call
>>>> > >>>>>> STS(ADFS2.0) to get a new token. With that new token, I will be
>>>> > calling
>>>> > >>>>>> Booking service.
>>>> > >>>>>>
>>>> > >>>>>> So, I don't think that I am able to use Apach CXF STS part
>>>> since my
>>>> > >>>>>> STS will be ADFS. So, I am hoping that Apache CXF can work with
>>>> > ADFS(STS)
>>>> > >>>>>> to support my prototypes.
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>> Thanks.
>>>> > >>>>>>
>>>> > >>>>>> Gina
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>>
>>>> > >>>>>> On Sat, May 5, 2012 at 6:22 AM, Oliver Wulff <
>>>> owu...@talend.com
>>>> > >wrote:
>>>> > >>>>>>
>>>> > >>>>>>> Hi Gina
>>>> > >>>>>>>
>>>> > >>>>>>> >>>
>>>> > >>>>>>> So, what I need is after user log on using Web SSO, the SAML
>>>> token
>>>> > >>>>>>> should be cached in web context and being used as actas token
>>>> when
>>>> > making a
>>>> > >>>>>>> call to .NET web service.
>>>> > >>>>>>> >>>
>>>> > >>>>>>>  This is supported by CXF without writing any single line of
>>>> code.
>>>> > I
>>>> > >>>>>>> do have a sample web application here:
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> >
>>>> http://svn.apache.org/viewvc/cxf/fediz/trunk/examples/wsclientWebapp/webapp/
>>>> > >>>>>>>
>>>> > >>>>>>> This example illustrates:
>>>> > >>>>>>> - fediz is configured for web sso
>>>> > >>>>>>> - SAML token is cached in the session and used to request a
>>>> new
>>>> > >>>>>>> token from the STS
>>>> > >>>>>>>
>>>> > >>>>>>> The code to call the web service is in
>>>> FederationServlet.doPost():
>>>> > >>>>>>> ...
>>>> > >>>>>>> Greeter service =
>>>> > >>>>>>>
>>>> >
>>>> (Greeter)ApplicationContextProvider.getContext().getBean("HelloServiceClient");
>>>> > >>>>>>> String reply = service.greetMe();
>>>> > >>>>>>> ...
>>>> > >>>>>>>
>>>> > >>>>>>> The magic is in the configuration I used here:
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> >
>>>> http://svn.apache.org/viewvc/cxf/fediz/trunk/examples/wsclientWebapp/webapp/src/main/webapp/WEB-INF/beans.xml?view=markup
>>>> > >>>>>>>
>>>> > >>>>>>> The following property registers a callback handler to
>>>> provide the
>>>> > >>>>>>> STSClient the token of the Web Login:
>>>> > >>>>>>> <property name="onBehalfOf" ref="delegationCallbackHandler" />
>>>> > >>>>>>>
>>>> > >>>>>>> (There is also a property for actAs)
>>>> > >>>>>>>
>>>> > >>>>>>> The above example should exactly do what you need. You just
>>>> have to
>>>> > >>>>>>> change the above property to use ActAs instead of OnBehalfOf.
>>>> The
>>>> > details
>>>> > >>>>>>> for this example are described here:
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> >
>>>> http://owulff.blogspot.com/2012/04/sso-across-web-applications-and-web_16.html
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> > >>>>>>> To test this easily, you can use the Mock IDP as part of
>>>> Fediz for
>>>> > >>>>>>> the authentication. You could also attach Active Directory in
>>>> the
>>>> > Mock if
>>>> > >>>>>>> you like. See here:
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> >
>>>> http://owulff.blogspot.com/2011/10/configure-ldap-directory-for-cxf-sts.html
>>>> > >>>>>>>
>>>> > >>>>>>> I use that within a customer set up to connect the CXF STS to
>>>> > Active
>>>> > >>>>>>> Directory.
>>>> > >>>>>>>
>>>> > >>>>>>> >>>
>>>> > >>>>>>> What is Spring role in CXF?
>>>> > >>>>>>> >>>
>>>> > >>>>>>>  You can use Spring to configure your services. The above
>>>> example
>>>> > is
>>>> > >>>>>>> based on spring. As you see, all security related stuff is
>>>> enabled
>>>> > by
>>>> > >>>>>>> configuration (Convention of Configuration). You can also
>>>> write an
>>>> > >>>>>>> application without spring but I wouldn't write an application
>>>> > without
>>>> > >>>>>>> spring nowadays but this is up to you.
>>>> > >>>>>>>
>>>> > >>>>>>> >>>
>>>> > >>>>>>> I don't know much LDAP, but it should be used as an attribute
>>>> > store.
>>>> > >>>>>>> I consider it as an alternative of Active Directory. Please
>>>> > correct me if I
>>>> > >>>>>>> am wrong.
>>>> > >>>>>>> >>>
>>>> > >>>>>>>  Active Directory provides different interfaces. One of them
>>>> is
>>>> > >>>>>>> LDAP. You can use the LDAPLoginModule of the JDK for
>>>> > authentication. But
>>>> > >>>>>>> you don't have to care that much as ADFS (and maybe the Fediz
>>>> Mock
>>>> > for
>>>> > >>>>>>> testing) will access ActiveDirectory to read the claims to add
>>>> > them to the
>>>> > >>>>>>> SAML token.
>>>> > >>>>>>>
>>>> > >>>>>>> Could you zip the wsdl before attaching?
>>>> > >>>>>>>
>>>> > >>>>>>> Thanks
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> > >>>>>>> ------
>>>> > >>>>>>>
>>>> > >>>>>>> Oliver Wulff
>>>> > >>>>>>>
>>>> > >>>>>>> Blog: http://owulff.blogspot.com<http://owulff.blogspot.com/>
>>>> > >>>>>>> Solution Architect
>>>> > >>>>>>> http://coders.talend.com
>>>> > >>>>>>>
>>>> > >>>>>>> <http://coders.talend.com>Talend Application Integration
>>>> Division
>>>> > >>>>>>> http://www.talend.com
>>>> > >>>>>>>
>>>> > >>>>>>> ________________________________
>>>> > >>>>>>>  Von: Gina Choi [ginacho...@gmail.com]
>>>> > >>>>>>> Gesendet: Freitag, 4. Mai 2012 20:54
>>>> > >>>>>>> Bis: users@cxf.apache.org
>>>> > >>>>>>> Betreff: Re: CXF supporting scope
>>>> > >>>>>>>
>>>> > >>>>>>> Hi Oliver,
>>>> > >>>>>>>
>>>> > >>>>>>> Thanks for your response.
>>>> > >>>>>>>
>>>> > >>>>>>>  >You mean that WIF is deployed in the ASP.NET<
>>>> http://asp.net/>
>>>> > web
>>>> > >>>>>>> service using the Active Requestor Profile?
>>>> > >>>>>>> >The SAML token should contain the claims as an
>>>> AttributeStatement?
>>>> > >>>>>>> >Can you share with us the WS-SecurityPolicy of this Web
>>>> Service?
>>>> > >>>>>>> I have attached two wsdl file. BookingService.wsdl and
>>>> > >>>>>>> BookingService_imported.wsdl. BookingService.wsdl  is
>>>> importing
>>>> > >>>>>>> BookingService_imported.wsdl and if you open
>>>> BookingService.wsdl,
>>>> > in line
>>>> > >>>>>>> 10 there is a importing statement like bellow. This .NET4.0
>>>> > service is not
>>>> > >>>>>>> owned by me and I don't know if separating wsdl file is common
>>>> > practice. Is
>>>> > >>>>>>> there anyway to combin them into one when generate artifact
>>>> using
>>>> > wsimport?
>>>> > >>>>>>> I will be calling CheckIn operation.
>>>> > >>>>>>>
>>>> > >>>>>>> <wsdl:import location="
>>>> > >>>>>>>
>>>> >
>>>> http://mecdevapp02.global.sdl.corp/BookingService/BookingService.svc?wsdl=wsdl0
>>>> > "
>>>> > >>>>>>> namespace="http://tempuri.org/"/>
>>>> > >>>>>>>
>>>> > >>>>>>> >I haven't used ADFS using WS-Trust so far. Usually, it uses a
>>>> > >>>>>>> Symmetric and Asymmetric binding.
>>>> > >>>>>>> >What roles does ADFS 2.0 play?
>>>> > >>>>>>> >Once as the IDP for the Web application SSO and once to let
>>>> issue
>>>> > a
>>>> > >>>>>>> token onbehalfof/actas the original token >from the Web SSO?
>>>> (this
>>>> > is
>>>> > >>>>>>> supported by CXF-Fediz)
>>>> > >>>>>>> >
>>>> > >>>>>>>
>>>> >
>>>> http://owulff.blogspot.com/2012/04/sso-across-web-applications-and-web_16.html
>>>> > >>>>>>> I am using Active Directory as an attribute store. So, I
>>>> could say
>>>> > >>>>>>> ADFS role should be IDP. So, what I need is after user log on
>>>> > using Web
>>>> > >>>>>>> SSO, the SAML token should be cached in web context and being
>>>> used
>>>> > as actas
>>>> > >>>>>>> token when making a call to .NET web service.
>>>> > >>>>>>>
>>>> > >>>>>>> > Yes, the passive profile is supported by Fediz. Is ADFS the
>>>> IDP?
>>>> > >>>>>>> In which application server is your web >application deployed?
>>>> > >>>>>>> ADFS is IDP and my Java web application is Service Provider.
>>>> > >>>>>>>
>>>> > >>>>>>> >What do you mean exactly? Is LDAP used for authentication by
>>>> the
>>>> > >>>>>>> STS? Or should the service provider retrieve >the claims/roles
>>>> > from LDAP?
>>>> > >>>>>>> I don't know much LDAP, but it should be used as an attribute
>>>> > store.
>>>> > >>>>>>> I consider it as an alternative of Active Directory. Please
>>>> > correct me if I
>>>> > >>>>>>> am wrong. I have been reading many specifications, but I am
>>>> still
>>>> > having
>>>> > >>>>>>> hard time to straiten up correct terms.
>>>> > >>>>>>>
>>>> > >>>>>>> >No, Spring is not a requirement.
>>>> > >>>>>>> What is Spring role in CXF?
>>>> > >>>>>>>
>>>> > >>>>>>> Thanks.
>>>> > >>>>>>>
>>>> > >>>>>>> Gina
>>>> > >>>>>>>  On Thu, May 3, 2012 at 2:24 PM, Oliver Wulff <
>>>> owu...@talend.com
>>>> > >>>>>>> <mailto:owu...@talend.com>> wrote:
>>>> > >>>>>>> >>>
>>>> > >>>>>>> 1. I have to create a client for .NET4.0 web service which
>>>> claim
>>>> > >>>>>>> aware. So,
>>>> > >>>>>>> how is CXF interoperability with .NET?
>>>> > >>>>>>> >>>
>>>> > >>>>>>>  You mean that WIF is deployed in the ASP.NET<http://ASP.NET>
>>>> web
>>>> > >>>>>>> service using the Active Requestor Profile?
>>>> > >>>>>>> The SAML token should contain the claims as an
>>>> AttributeStatement?
>>>> > >>>>>>> Can you share with us the WS-SecurityPolicy of this Web
>>>> Service?
>>>> > >>>>>>>
>>>> > >>>>>>> >>>
>>>> > >>>>>>> 2. If CXF support ADFS2.0 as STS.
>>>> > >>>>>>> >>>
>>>> > >>>>>>> I haven't used ADFS using WS-Trust so far. Usually, it uses a
>>>> > >>>>>>> Symmetric and Asymmetric binding.
>>>> > >>>>>>> What roles does ADFS 2.0 play?
>>>> > >>>>>>> Once as the IDP for the Web application SSO and once to let
>>>> issue a
>>>> > >>>>>>> token onbehalfof/actas the original token from the Web SSO?
>>>> (this
>>>> > is
>>>> > >>>>>>> supported by CXF-Fediz)
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> >
>>>> http://owulff.blogspot.com/2012/04/sso-across-web-applications-and-web_16.html
>>>> > >>>>>>>
>>>> > >>>>>>> >>>
>>>> > >>>>>>> 3. If CXF support passive profile. Especially SP initiated
>>>> Redirect
>>>> > >>>>>>> ->  POST
>>>> > >>>>>>> binding.
>>>> > >>>>>>> >>>
>>>> > >>>>>>> Yes, the passive profile is supported by Fediz. Is ADFS the
>>>> IDP? In
>>>> > >>>>>>> which application server is your web application deployed?
>>>> > >>>>>>>
>>>> > >>>>>>> >>>
>>>> > >>>>>>> 4. If CXF can work with LDAP.
>>>> > >>>>>>> >>>
>>>> > >>>>>>> What do you mean exactly? Is LDAP used for authentication by
>>>> the
>>>> > >>>>>>> STS? Or should the service provider retrieve the claims/roles
>>>> from
>>>> > LDAP?
>>>> > >>>>>>>
>>>> > >>>>>>> >>>>
>>>> > >>>>>>> 5. My application doesn't use Spring frame work. Do I have to
>>>> use
>>>> > >>>>>>> Spring
>>>> > >>>>>>> Frame work to use CXF.
>>>> > >>>>>>> >>>
>>>> > >>>>>>> No, Spring is not a requirement.
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> > >>>>>>> ------
>>>> > >>>>>>>
>>>> > >>>>>>> Oliver Wulff
>>>> > >>>>>>>
>>>> > >>>>>>> Blog: http://owulff.blogspot.com
>>>> > >>>>>>> Solution Architect
>>>> > >>>>>>> http://coders.talend.com
>>>> > >>>>>>>
>>>> > >>>>>>> Talend Application Integration Division http://www.talend.com
>>>> > >>>>>>>
>>>> > >>>>>>> ________________________________________
>>>> > >>>>>>>  Von: gchoi [gc...@sdl.com<mailto:gc...@sdl.com>]
>>>> > >>>>>>> Gesendet: Mittwoch, 2. Mai 2012 17:29
>>>> > >>>>>>>  Bis: users@cxf.apache.org<mailto:users@cxf.apache.org>
>>>> > >>>>>>>  Betreff: CXF supporting scope
>>>> > >>>>>>>
>>>> > >>>>>>> Hi All,
>>>> > >>>>>>>
>>>> > >>>>>>> So far, I evaluated several frame works, but they seem don't
>>>> do
>>>> > what
>>>> > >>>>>>> I
>>>> > >>>>>>> expect. Several people suggested me that I should consider
>>>> CXF.
>>>> > >>>>>>> Before I dig
>>>> > >>>>>>> into CXF, I would like know if CXF support following things.
>>>> By the
>>>> > >>>>>>> way, I
>>>> > >>>>>>> just joined this user group.
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> > >>>>>>> 1. I have to create a client for .NET4.0 web service which
>>>> claim
>>>> > >>>>>>> aware. So,
>>>> > >>>>>>> how is CXF interoperability with .NET?
>>>> > >>>>>>>
>>>> > >>>>>>> 2. If CXF support ADFS2.0 as STS.
>>>> > >>>>>>>
>>>> > >>>>>>> 3. If CXF support passive profile. Especially SP initiated
>>>> Redirect
>>>> > >>>>>>> ->  POST
>>>> > >>>>>>> binding.
>>>> > >>>>>>>
>>>> > >>>>>>> 4. If CXF can work with LDAP.
>>>> > >>>>>>>
>>>> > >>>>>>> 5. My application doesn't use Spring frame work. Do I have to
>>>> use
>>>> > >>>>>>> Spring
>>>> > >>>>>>> Frame work to use CXF.
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> > >>>>>>> Thank in advance.
>>>> > >>>>>>>
>>>> > >>>>>>> --
>>>> > >>>>>>> View this message in context:
>>>> > >>>>>>>
>>>> > http://cxf.547215.n5.nabble.com/CXF-supporting-scope-tp5680855.html
>>>> > >>>>>>> Sent from the cxf-user mailing list archive at Nabble.com.
>>>> > >>>>>>>
>>>> > >>>>>>>
>>>> > >>>>>>
>>>> > >>>>>
>>>> > >>>>
>>>> > >>>
>>>> > >>
>>>> > >
>>>> >
>>>>
>>>
>>>
>>
>

Reply via email to