Thanks for enlightening me on those properties. I have few more questions. What should be the configuration for a SYMMETRIC KEYTYPE? How do I pass the issued token which I have already? In totality, how do I go about if I were to access this endpoint?
On Wed, Sep 24, 2014 at 7:45 PM, coheigea [via CXF] < [email protected]> wrote: > > Question: what should be the expected value of 'ws-security.username' & > > 'ws-security.sts.token.username'? > > Assuming that the STS has a UsernameToken policy requirement, the > 'ws-security.username' is used to used as the "username". Alternatively, > it > is used as the keystore alias if this is required by the security policy. > 'ws-security.sts.token.username' is the keystore alias to use if you are > sending a certificate to the STS as part of "UseKey" (required if the > KeyType is PublicKey). As the security policy you are using is > "SymmetricKey" you don't need any of the "ws-security.sts.token.*" > properties. > > Colm. > > On Wed, Sep 24, 2014 at 10:54 AM, niranjana.murthy < > [hidden email] <http://user/SendEmail.jtp?type=node&node=5749172&i=0>> > wrote: > > > The problem still exists. > > > > *Here is the bean configuration: I did not have the properties mapping > > earlier, added it on your suggestion > > * > > <bean id="stsClientFederation" > > class="org.apache.cxf.ws.security.trust.STSClient" scope="prototype"> > > <constructor-arg ref="cxf" /> > > <property name="wsdlLocation" value="adfs.wsdl" /> > > <property name="sendRenewing" value="false" /> > > <property name="serviceName" > > value="{ > > http://schemas.microsoft.com/ws/2008/06/identity/securitytokenservice}SecurityTokenService > > > "/> > > <property name="endpointName" > > value="{ > > http://schemas.microsoft.com/ws/2008/06/identity/securitytokenservice}IssuedTokenWSTrustBinding_IWSTrust13Async1 > > > "/> > > <property name="addressingNamespace" > > value="http://www.w3.org/2005/08/addressing" /> > > <property name="enableAppliesTo" value="true" /> > > <property name="properties"> > > <map> > > <entry key="ws-security.username" value="username"/> > > <entry key="ws-security.callback-handler" > > value="clientKeystore.PasswordCallbackHandler"/> > > <entry key="ws-security.sts.token.username" > > value="clientstskey"/> > > <entry key="ws-security.sts.token.properties" > > value="clientKeystore.properties"/> > > <entry key="ws-security.sts.token.usecert" > value="true"/> > > </map> > > </property> > > </bean> > > > > > > Question: > > what should be the expected value of 'ws-security.username' & > > 'ws-security.sts.token.username'? > > > > > > > ------------------------------------------------------------------------------------------------------------------ > > > *Security policy, binding.. from the wsdl* > > > > <wsp:Policy wsu:Id="IssuedTokenWSTrustBinding_IWSTrust13Async1_policy"> > > <wsp:ExactlyOne> > > <wsp:All> > > <sp:TransportBinding > > xmlns:sp=" > > http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"> > > <wsp:Policy> > > <sp:TransportToken> > > <wsp:Policy> > > > > <sp:HttpsToken /> > > </wsp:Policy> > > </sp:TransportToken> > > <sp:AlgorithmSuite> > > <wsp:Policy> > > > > <sp:Basic256 /> > > </wsp:Policy> > > </sp:AlgorithmSuite> > > <sp:Layout> > > <wsp:Policy> > > > <sp:Strict > > /> > > </wsp:Policy> > > </sp:Layout> > > <sp:IncludeTimestamp /> > > </wsp:Policy> > > </sp:TransportBinding> > > <sp:EndorsingSupportingTokens > > xmlns:sp=" > > http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"> > > <wsp:Policy> > > <sp:IssuedToken > > > > sp:IncludeToken=" > > > http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/AlwaysToRecipient > > "> > > > > <sp:RequestSecurityTokenTemplate> > > > > <trust:KeyType> > > http://docs.oasis-open.org/ws-sx/ws-trust/200512/SymmetricKey > > > > </trust:KeyType> > > > > <trust:KeySize>256</trust:KeySize> > > > > <trust:KeyWrapAlgorithm>http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p > > > > </trust:KeyWrapAlgorithm> > > > > <trust:EncryptWith>http://www.w3.org/2001/04/xmlenc#aes256-cbc > > > > </trust:EncryptWith> > > > > <trust:SignatureAlgorithm>http://www.w3.org/2000/09/xmldsig#hmac-sha1 > > > > </trust:SignatureAlgorithm> > > > > <trust:CanonicalizationAlgorithm>http://www.w3.org/2001/10/xml-exc-c14n# > > > > </trust:CanonicalizationAlgorithm> > > > > <trust:EncryptionAlgorithm>http://www.w3.org/2001/04/xmlenc#aes256-cbc > > > > </trust:EncryptionAlgorithm> > > > > </sp:RequestSecurityTokenTemplate> > > <wsp:Policy> > > > > <sp:RequireInternalReference /> > > </wsp:Policy> > > </sp:IssuedToken> > > <sp:SignedParts> > > <sp:Header > > Name="To" Namespace="http://www.w3.org/2005/08/addressing" > > /> > > </sp:SignedParts> > > <KeyValueToken > > IncludeToken="" Optional=""> > > <Policy /> > > </KeyValueToken> > > </wsp:Policy> > > </sp:EndorsingSupportingTokens> > > <sp:Wss11 > > xmlns:sp=" > > http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"> > > <wsp:Policy> > > > > <sp:MustSupportRefKeyIdentifier /> > > > > <sp:MustSupportRefIssuerSerial /> > > > > <sp:MustSupportRefThumbprint /> > > > > <sp:MustSupportRefEncryptedKey /> > > </wsp:Policy> > > </sp:Wss11> > > <sp:Trust13 > > xmlns:sp=" > > http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702"> > > <wsp:Policy> > > > > <sp:MustSupportIssuedTokens /> > > <sp:RequireClientEntropy > /> > > <sp:RequireServerEntropy > /> > > </wsp:Policy> > > </sp:Trust13> > > <wsaw:UsingAddressing /> > > </wsp:All> > > </wsp:ExactlyOne> > > </wsp:Policy> > > > > > > > ---------------------------------------------------------------------------------------------- > > > > > <wsdl:binding name="IssuedTokenWSTrustBinding_IWSTrust13Async1" > > type="tns:IWSTrust13Async"> > > <wsp:PolicyReference > > > > URI="#IssuedTokenWSTrustBinding_IWSTrust13Async1_policy" /> > > <soap12:binding transport=" > > http://schemas.xmlsoap.org/soap/http" /> > > <wsdl:operation name="Trust13IssueAsync"> > > <soap12:operation > > soapAction=" > > http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue" > > style="document" /> > > <wsdl:input> > > <soap12:body use="literal" /> > > </wsdl:input> > > <wsdl:output> > > <soap12:body use="literal" /> > > </wsdl:output> > > </wsdl:operation> > > </wsdl:binding> > > > > > > > -------------------------------------------------------------------------------------------------------------- > > > Here is my code snippet to get the token > > > > public SecurityToken getFederatedToken(TokenInputs tokenInputVo, > > SecurityToken issuedToken) { > > SecurityToken securityToken = null; > > try { > > stsClient = (STSClient) > > ctx.getBean("stsClientFederation"); > > stsClient.setEnableAppliesTo(true); > > stsClient.setTokenType(SAML2_TOKEN_TYPE); > > > > //Next two lines are necessary as ADFS will throw unrecognized Policy > > otherwise > > stsClient.setAddressingNamespace(" > > http://schemas.xmlsoap.org/ws/2004/08/addressing"); > > > > stsClient.setWspNamespace("http://schemas.xmlsoap.org/ws/2004/09/policy"); > > > > > > stsClient.getProperties().put("ws-security.token", > > issuedToken); > > > > securityToken = > > stsClient.requestSecurityToken(tokenInputVo.getAdfsRelyingParty()); > > } catch (Exception exp) { throw new > > RuntimeException("Error occured while > > requesting a federation security token from ADFS", exp); > > } > > return securityToken; > > } > > > > What do you suggest. Is it the right way to get an issuedToken? > > > > > > > > -- > > View this message in context: > > > http://cxf.547215.n5.nabble.com/IssuedToken-nullpointer-exception-tp5749119p5749157.html > > Sent from the cxf-user mailing list archive at Nabble.com. > > > > > > -- > Colm O hEigeartaigh > > Talend Community Coder > http://coders.talend.com > > > ------------------------------ > If you reply to this email, your message will be added to the discussion > below: > > http://cxf.547215.n5.nabble.com/IssuedToken-nullpointer-exception-tp5749119p5749172.html > To unsubscribe from IssuedToken nullpointer exception, click here > <http://cxf.547215.n5.nabble.com/template/NamlServlet.jtp?macro=unsubscribe_by_code&node=5749119&code=bmlyYW5qYW5hLmJpbGxhcHBhQGdtYWlsLmNvbXw1NzQ5MTE5fC0xNzgyMzM0NzQ4> > . > NAML > <http://cxf.547215.n5.nabble.com/template/NamlServlet.jtp?macro=macro_viewer&id=instant_html%21nabble%3Aemail.naml&base=nabble.naml.namespaces.BasicNamespace-nabble.view.web.template.NabbleNamespace-nabble.view.web.template.NodeNamespace&breadcrumbs=notify_subscribers%21nabble%3Aemail.naml-instant_emails%21nabble%3Aemail.naml-send_instant_email%21nabble%3Aemail.naml> > -- Niranjan -- View this message in context: http://cxf.547215.n5.nabble.com/IssuedToken-nullpointer-exception-tp5749119p5749197.html Sent from the cxf-user mailing list archive at Nabble.com.
