Hi Colm,

Alex and I working together to get this work. I am responsible to configure
Fediz STS for him. Could you take a look following exceptions from Alex's
RST. We decided to use TransportUT_Port. I think that is being used for
WS-Federation SSO as well. Anyway, please ignore previous our emails. Could
you tell us what is wrong with his RST?


ID: 1
Address: https://wkqasv0805.global.sdl.corp:9443/fedizidpsts/STSService
Encoding: UTF-8
Http-Method: POST
Content-Type: application/soap+xml; charset=utf-8
Headers: {accept-encoding=[gzip, deflate], connection=[Keep-Alive],
Content-Length=[1908], content-type=[application/soap+xml; charset=utf-8],
expect=
[100-continue], host=[wkqasv0805.global.sdl.corp:9443]}
Payload: <s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope";
xmlns:a="http://www.w3.org/2005/08/addressing"; xmlns:u="
http://docs.oasis-open.
org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><s:Header><a:Action
s:mustUnderstand="1">http://docs.oasis-open.org/ws-sx/ws-trust/200512
/RST/Issue</a:Action><a:MessageID>urn:uuid:24a48857-71ec-466e-bfe6-675c08f84c6e</a:MessageID><a:ReplyTo><a:Address>
http://www.w3.org/2005/08/addressin
g/anonymous</a:Address></a:ReplyTo><VsDebuggerCausalityData xmlns="
http://schemas.microsoft.com/vstudio/diagnostics/servicemodelsink
">uIDPo8DHZtWXyK1J
n2JxXCS85z4AAAAAlruHm4rOAUCcZNvbjFb/PND3aSmMn0JLk9BMBxOE9WoACQAA</VsDebuggerCausalityData><a:To
s:mustUnderstand="1">https://wkqasv0805.global.sdl.cor
p:9443/fedizidpsts/STSService</a:To><o:Security s:mustUnderstand="1"
xmlns:o="
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secex
t-1.0.xsd"><u:Timestamp
u:Id="_0"><u:Created>2012-07-24T13:27:55.050Z</u:Created><u:Expires>2012-07-24T13:32:55.050Z</u:Expires></u:Timestamp><o:Usern
ameToken
u:Id="uuid-64599397-270f-4886-975c-086f44f45f27-1"><o:Username>gchoi</o:Username><o:Password
Type="http://docs.oasis-open.org/wss/2004/01/oas
is-200401-wss-username-token-profile-1.0#PasswordText">gchoi</o:Password></o:UsernameToken></o:Security></s:Header><s:Body><trust:RequestSecurityToken
 xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512";><wsp:AppliesTo
xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy";><a:EndpointRef
erence><a:Address>https://medevasarafia01.global.sdl.corp/Agency/
</a:Address></a:EndpointReference></wsp:AppliesTo><trust:KeyType>
http://docs.oasis-op
en.org/ws-sx/ws-trust/200512/Bearer</trust:KeyType><trust:RequestType>
http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue
</trust:RequestType><trust
:TokenType>urn:oasis:names:tc:SAML:1.0:assertion</trust:TokenType></trust:RequestSecurityToken></s:Body></s:Envelope>
--------------------------------------
SLF4J: Failed to load class "org.slf4j.impl.StaticLoggerBinder".
SLF4J: Defaulting to no-operation (NOP) logger implementation
SLF4J: See http://www.slf4j.org/codes.html#StaticLoggerBinder for further
details.
                [LdapLoginModule] authentication-only mode; SSL disabled
                [LdapLoginModule] user provider:
ldap://wkqasv0805.global.sdl.corp:389/ou=People,dc=maxcrc,dc=com
                [LdapLoginModule] attempting to authenticate user: gchoi
                [LdapLoginModule] authentication succeeded
                [LdapLoginModule] added LdapPrincipal
"cn=gchoi,ou=People,dc=maxcrc,dc=com" to Subject
                [LdapLoginModule] added UserPrincipal "gchoi" to Subject
Jul 24, 2012 9:28:00 AM org.apache.cxf.phase.PhaseInterceptorChain
doDefaultLogging
WARNING: Interceptor for {
http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService#{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Va
lidate has thrown exception, unwinding now
org.apache.cxf.binding.soap.SoapFault: MustUnderstand headers: [{
http://www.w3.org/2005/08/addressing}Action, {
http://www.w3.org/2005/08/addressing}To
] are not understood.
        at
org.apache.cxf.binding.soap.interceptor.MustUnderstandInterceptor.checkUltimateReceiverHeaders(MustUnderstandInterceptor.java:150)
        at
org.apache.cxf.binding.soap.interceptor.MustUnderstandInterceptor.handleMessage(MustUnderstandInterceptor.java:96)
        at
org.apache.cxf.binding.soap.interceptor.MustUnderstandInterceptor.handleMessage(MustUnderstandInterceptor.java:49)
        at
org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:262)
        at
org.apache.cxf.transport.ChainInitiationObserver.onMessage(ChainInitiationObserver.java:122)
        at
org.apache.cxf.transport.http.AbstractHTTPDestination.invoke(AbstractHTTPDestination.java:211)
        at
org.apache.cxf.transport.servlet.ServletController.invokeDestination(ServletController.java:213)
        at
org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:193)
        at
org.apache.cxf.transport.servlet.CXFNonSpringServlet.invoke(CXFNonSpringServlet.java:129)
        at
org.apache.cxf.transport.servlet.AbstractHTTPServlet.handleRequest(AbstractHTTPServlet.java:187)
        at
org.apache.cxf.transport.servlet.AbstractHTTPServlet.doPost(AbstractHTTPServlet.java:110)
        at javax.servlet.http.HttpServlet.service(HttpServlet.java:641)
        at
org.apache.cxf.transport.servlet.AbstractHTTPServlet.service(AbstractHTTPServlet.java:166)
        at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:305)
        at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:210)
        at
org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:225)
        at
org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:169)
        at
org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:472)
        at
org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:168)
        at
org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:98)
        at
org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:927)
        at
org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:118)
        at
org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:407)
        at
org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:999)
        at
org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:565)
        at
org.apache.tomcat.util.net.JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:307)
        at java.util.concurrent.ThreadPoolExecutor$Worker.runTask(Unknown
Source)
        at java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown
Source)
        at java.lang.Thread.run(Unknown Source)
Jul 24, 2012 9:28:00 AM
org.apache.cxf.binding.soap.interceptor.Soap12FaultOutInterceptor$Soap12FaultOutInterceptorInternal
handleMessage
INFO: class
org.apache.cxf.binding.soap.interceptor.Soap12FaultOutInterceptor$Soap12FaultOutInterceptorInternalapplication/soap+xml
Jul 24, 2012 9:28:00 AM
org.apache.cxf.services.SecurityTokenService.TransportUT_Port.STS
INFO: Outbound Message
---------------------------
ID: 1
Response-Code: 500
Encoding: UTF-8
Content-Type: application/soap+xml
Headers: {}
Payload: <soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope
"><soap:Body><soap:Fault><soap:Code><soap:Value>soap:MustUnderstand</soap:V
alue></soap:Code><soap:Reason><soap:Text xml:lang="en">MustUnderstand
headers: [{http://www.w3.org/2005/08/addressing}Action, {
http://www.w3.org/2005/
08/addressing}To] are not
understood.</soap:Text></soap:Reason></soap:Fault></soap:Body></soap:Envelope>
--------------------------------------

On Tue, Jul 24, 2012 at 8:58 AM, Gina Choi <[email protected]> wrote:

> Hi Colm,
>
> I would like to confirm if I understand you correctly. So, do we need to
> add following content to Fediz STS wsdl file to issue a token? At this
> point we mostly interested in(minimum) issuing a a token. I am not sure if
> we need to "Validate" operation to issue a RSTR.
>
>
>
> <!-- 2.1.1.3 UsernameToken with timestamp, nonce and password hash -->
> <wsp:Policy wsu:Id="DoubleItDigestPolicy">
>   <sp:SupportingTokens>
>     <wsp:Policy>
>       <sp:UsernameToken sp:IncludeToken="
> http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/AlwaysToRecipient
> ">
>         <wsp:Policy>
>           <sp:HashPassword />
>         </wsp:Policy>
>       </sp:UsernameToken>
>     </wsp:Policy>
>   </sp:SupportingTokens>
> </wsp:Policy>
> <wsdl:binding name="DoubleItDigestBinding" type="tns:DoubleItPortType">
>   <wsp:PolicyReference URI="#DoubleItDigestPolicy" />
>   <soap:binding style="document"
>   transport="http://schemas.xmlsoap.org/soap/http"; />
>   <wsdl:operation name="Issue">
>     <soap:operation soapAction="
> http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue"; />
>     <wsdl:input>
>       <soap:body use="literal" />
>     </wsdl:input>
>     <wsdl:output>
>       <soap:body use="literal" />
>     </wsdl:output>
>   </wsdl:operation>
> </wsdl:binding>
>
>
> Thanks.
>
> Gina
>
> On Tue, Jul 24, 2012 at 6:34 AM, Colm O hEigeartaigh 
> <[email protected]>wrote:
>
>> You could use a SecurityPolicy that just requires a UsernameToken without
>> a
>> binding. For example see the policy "<!-- 2.1.1.3 UsernameToken with
>> timestamp, nonce and password hash -->" starting on line 214:
>>
>>
>> http://svn.apache.org/viewvc/cxf/trunk/systests/ws-security-examples/src/test/resources/org/apache/cxf/systest/wssec/examples/ut/DoubleItUt.wsdl?view=markup
>>
>> Of course, in practise one would combine a UsernameToken with the
>> Transport
>> binding to secure the message exchange...
>>
>> Colm.
>>
>> On Mon, Jul 23, 2012 at 4:41 PM, Sarafian <[email protected]
>> >wrote:
>>
>> > I have a C# code that asks the STS for a token using username password
>> > credentials.
>> > I'm using the UT or UTEncrypted endpoints but I get this error:
>> >
>> > These policy alternatives can not be satisfied:
>> > {
>> http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}ProtectionToken
>> > {
>> >
>> http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}IncludeTimestamp
>> > :
>> > Received Timestamp does not match the requirements
>> > {
>> >
>> http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}SymmetricBinding
>> > :
>> > Received Timestamp does not match the requirements
>> > {http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}SignedParts:
>> > {http://schemas.xmlsoap.org/soap/envelope/}Body not SIGNED
>> > {
>> http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702}EncryptedParts:
>> > {http://schemas.xmlsoap.org/soap/envelope/}Body not ENCRYPTED
>> >
>> > Is there a way for the STS to be configured not to apply the above
>> > policies?
>> > Is there another endpoint for these kind of things?
>> >
>> > I simply want to use a username/password credential combination to
>> request
>> > a
>> > security token.
>> >
>> >
>> >
>> >
>> > --
>> > View this message in context:
>> >
>> http://cxf.547215.n5.nabble.com/RequestSecurityToken-without-Encrypting-and-Signing-tp5711426.html
>> > Sent from the cxf-user mailing list archive at Nabble.com.
>> >
>>
>>
>>
>> --
>> Colm O hEigeartaigh
>>
>> Talend Community Coder
>> http://coders.talend.com
>>
>
>

Reply via email to