Hello! I'm now very confused: I have this config file:
<?xml version="1.0" encoding="UTF-8"?> <beans xmlns="http://www.springframework.org/schema/beans" xmlns:cxf="http://cxf.apache.org/core" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:sec="http://cxf.apache.org/configuration/security" xmlns:http="http://cxf.apache.org/transports/http/configuration" xmlns:httpj="http://cxf.apache.org/transports/http-jetty/configuration" xmlns:jaxws="http://cxf.apache.org/jaxws" xmlns:util="http://www.springframework.org/schema/util" xmlns:soap="http://cxf.apache.org/bindings/soap" xsi:schemaLocation="http://cxf.apache.org/core http://cxf.apache.org/schemas/core.xsd http://cxf.apache.org/configuration/security http://cxf.apache.org/schemas/configuration/security.xsd http://cxf.apache.org/jaxws http://cxf.apache.org/schemas/jaxws.xsd http://cxf.apache.org/transports/http/configuration http://cxf.apache.org/schemas/configuration/http-conf.xsd http://cxf.apache.org/transports/http-jetty/configuration http://cxf.apache.org/schemas/configuration/http-jetty.xsd http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-4.2.xsd http://www.springframework.org/schema/util http://www.springframework.org/schema/util/spring-util-4.2.xsd http://cxf.apache.org/bindings/soap http://cxf.apache.org/schemas/configuration/soap.xsd"> <bean id="defaultTokenStore" class="org.apache.cxf.sts.cache.DefaultInMemoryTokenStore"> </bean> <bean id="cryptoProperties" class="java.util.Properties"> <constructor-arg> <props> <prop key="org.apache.ws.security.crypto.provider">org.apache.ws.security.components.crypto.Merlin</prop> <prop key="org.apache.ws.security.crypto.merlin.keystore.type">jks</prop> <prop key="org.apache.ws.security.crypto.merlin.keystore.password">.....</prop> <prop key="org.apache.ws.security.crypto.merlin.file">key/key.jks</prop> </props> </constructor-arg> </bean> <bean id="utSTSProperties" class="org.apache.cxf.sts.StaticSTSProperties"> <property name="SignatureCryptoProperties" ref="cryptoProperties"/> <property name="issuer" value="issuer"/> <property name="signatureUsername" value="signature"/> </bean> <bean id="utService" class="org.apache.cxf.sts.service.StaticService"> <property name="endpoints" value="http://localhost: xxxx /services/SecurityTokenServiceProvider" /> </bean> <bean id="utSCTSamlTokenProvider" class="org.apache.cxf.sts.token.provider.SAMLTokenProvider"> </bean> <util:list id="utTokenProviders"> <ref bean="utSCTSamlTokenProvider"/> </util:list> <bean id="utIssueDelegate" class=" package .TokenIssueOperation"> <property name="tokenProviders" ref="utTokenProviders"/> <property name="services" ref="utService" /> <property name="stsProperties" ref="utSTSProperties" /> <property name="tokenStore" ref="defaultTokenStore"/> </bean> <bean id="utSTSProviderBean" class=" package .SecurityTokenServiceProvider"> <property name="issueOperation" ref="utIssueDelegate" /> </bean> <!-- <bean id="utSTSProviderBean" class="org.apache.cxf.ws.security.sts.provider.SecurityTokenServiceProvider"> <property name="issueOperation" ref="utIssueDelegate" /> </bean> --> <jaxws:endpoint xmlns:tns="http://docs.oasis-open.org/ws-sx/ws-trust/200512/" id="securitytokenserviceprovider" implementor="#utSTSProviderBean" wsdlLocation="WEB-INF/wsdl/ws-trust-1.4-service.wsdl" endpointName="tns:UT_Port" serviceName="tns:SecurityTokenService" address="/SecurityTokenServiceProvider"> <jaxws:properties> <entry key="security.return.security.error" value="true" /> <entry key="security.validate.audience-restriction" value="false" /> <entry key="security.signature.properties"> <bean id="signatureCryptoProperties" class="java.util.Properties"> <constructor-arg> <props> <prop key="org.apache.ws.security.crypto.provider">org.apache.ws.security.components.crypto.Merlin</prop> <prop key="org.apache.ws.security.crypto.merlin.keystore.type">jks</prop> <prop key="org.apache.ws.security.crypto.merlin.keystore.password">.....</prop> <prop key="org.apache.ws.security.crypto.merlin.file">key/key.jks</prop> </props> </constructor-arg> </bean> </entry> <entry key="ws-security.saml2.validator"> <bean class="org.apache.cxf.ws.security.trust.STSTokenValidator"/> </entry> </jaxws:properties> <jaxws:binding> <soap:soapBinding mtomEnabled="true" version="1.2" /> </jaxws:binding> </jaxws:endpoint> </beans> the keystore is under WEB-INF, it cointains the cert from the incomming Cert. all help thanks. Csaba On 2018.01.26. 15:40, Colm O hEigeartaigh wrote: > OK so it appears the problems with the STS issuing the token have been > fixed? The errors are from the STSSamlAssertionValidator, which is supposed > to be used on the service side. It tries to validate the Signature locally > on the token, and if it fails it dispatches the token to the STS for > validation, which is why you're seeing an error about STSClient. > > What behaviour are you expecting on the service side? Normally the > STSSamlAssertionValidator > is not configured, because you have the CA cert of the STS in the service > keystore and it can validate the certificate locally. Is the STS cert (or > CA cert) in your crypto properties file pointing to by the > security.signature.properties configuration variable on the service side? > > Colm. > > On Fri, Jan 26, 2018 at 11:56 AM, Tóth Csaba <[email protected]> wrote: > >> Hello! >> (Sorry for the wrong address) >> >> It's go forward with little steps. >> now I get this error: >> jan. 26, 2018 12:42:21 DU >> org.apache.cxf.ws.security.trust.STSSamlAssertionValidator >> verifySignedAssertion >> WARNING: Local trust verification of SAML assertion failed: Error during >> certificate path validation: No trusted certs found >> org.apache.wss4j.common.ext.WSSecurityException: Error during >> certificate path validation: No trusted certs found >> at org.apache.wss4j.common.crypto.Merlin.verifyTrust(Merlin.java:829) >> at org.apache.wss4j.common.crypto.Merlin.verifyTrust(Merlin.java:919) >> at >> org.apache.wss4j.dom.validate.SignatureTrustValidator.verifyTrustInCerts( >> SignatureTrustValidator.java:109) >> at >> org.apache.wss4j.dom.validate.SignatureTrustValidator.validate( >> SignatureTrustValidator.java:64) >> at >> org.apache.wss4j.dom.validate.SamlAssertionValidator. >> verifySignedAssertion(SamlAssertionValidator.java:214) >> at >> org.apache.cxf.ws.security.trust.STSSamlAssertionValidator. >> verifySignedAssertion(STSSamlAssertionValidator.java:68) >> >> I get the certification from the SAML, and put into the keystore what i >> already setup (and put under the WEB-INF/classes/key directory >> >> the strange thing, the next error come about: >> jan. 26, 2018 12:42:24 DU org.apache.cxf.phase.PhaseInterceptorChain >> doDefaultLogging >> WARNING: Interceptor for >> {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService >> has thrown exception, unwinding now >> org.apache.cxf.ws.security.trust.TrustException: The STSClient is not >> configured with either a location or wsdlLocation property >> at >> org.apache.cxf.ws.security.trust.AbstractSTSClient.createClient( >> AbstractSTSClient.java:673) >> at >> org.apache.cxf.ws.security.trust.AbstractSTSClient. >> validate(AbstractSTSClient.java:1101) >> at >> org.apache.cxf.ws.security.trust.STSClient.validateSecurityToken( >> STSClient.java:105) >> >> What STSClient? why want to create a client? >> in the cxf settings no "client" string is found >> >> Thanx >> Csaba >> >> On 2018.01.25. 15:48, Colm O hEigeartaigh wrote: >>> Please reply to the CXF mailing list and not me directly...the problem >>> is that the SAML Assertion is getting validated before it hits the >>> STS, so you need to make a reference to the signature properties as a >>> JAX-WS property of the endpoint. For example: >>> >>> https://github.com/apache/cxf/blob/6a3f97e9f0d02eef72bf10c266d444 >> ec3af78bf5/services/sts/systests/basic/src/test/resources/org/apache/cxf/ >> systest/sts/transport/cxf-service.xml#L44 >>> On Thu, Jan 25, 2018 at 2:38 PM, Tóth Csaba <[email protected] >>> <mailto:[email protected]>> wrote: >>> >>> Hello! >>> this is the full trace: >>> >>> jan. 25, 2018 2:17:13 DU org.apache.cxf.phase.PhaseInterceptorChain >>> doDefaultLogging >>> WARNING: Interceptor for >>> {http://docs.oasis-open.org/ws-sx/ws-trust/200512/} >> SecurityTokenService >>> <http://docs.oasis-open.org/ws-sx/ws-trust/200512/% >> 7DSecurityTokenService> >>> has thrown exception, unwinding now >>> org.apache.cxf.binding.soap.SoapFault: No crypto property file >>> supplied >>> for signature >>> at >>> org.apache.cxf.ws.security.wss4j.WSS4JUtils. >> createSoapFault(WSS4JUtils.java:236) >>> at >>> org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor. >> handleMessageInternal(WSS4JInInterceptor.java:340) >>> at >>> org.apache.cxf.ws.security.wss4j.WSS4JInInterceptor.handleMessage( >> WSS4JInInterceptor.java:175) >>> at >>> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JInInterceptor. >> handleMessage(PolicyBasedWSS4JInInterceptor.java:79) >>> at >>> org.apache.cxf.ws.security.wss4j.PolicyBasedWSS4JInInterceptor. >> handleMessage(PolicyBasedWSS4JInInterceptor.java:66) >>> at >>> org.apache.cxf.phase.PhaseInterceptorChain.doIntercept( >> PhaseInterceptorChain.java:308) >>> at >>> org.apache.cxf.transport.ChainInitiationObserver.onMessage( >> ChainInitiationObserver.java:121) >>> at >>> org.apache.cxf.transport.http.AbstractHTTPDestination.invoke( >> AbstractHTTPDestination.java:267) >>> at >>> org.apache.cxf.transport.servlet.ServletController. >> invokeDestination(ServletController.java:234) >>> at >>> org.apache.cxf.transport.servlet.ServletController. >> invoke(ServletController.java:208) >>> at >>> org.apache.cxf.transport.servlet.ServletController. >> invoke(ServletController.java:160) >>> at >>> org.apache.cxf.transport.servlet.CXFNonSpringServlet. >> invoke(CXFNonSpringServlet.java:191) >>> at >>> org.apache.cxf.transport.servlet.AbstractHTTPServlet.handleRequest( >> AbstractHTTPServlet.java:301) >>> at >>> org.apache.cxf.transport.servlet.AbstractHTTPServlet. >> doPost(AbstractHTTPServlet.java:220) >>> at javax.servlet.http.HttpServlet.service(HttpServlet.java:661) >>> at >>> org.apache.cxf.transport.servlet.AbstractHTTPServlet. >> service(AbstractHTTPServlet.java:276) >>> at >>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter( >> ApplicationFilterChain.java:231) >>> at >>> org.apache.catalina.core.ApplicationFilterChain.doFilter( >> ApplicationFilterChain.java:166) >>> at >>> org.apache.tomcat.websocket.server.WsFilter.doFilter( >> WsFilter.java:52) >>> at >>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter( >> ApplicationFilterChain.java:193) >>> at >>> org.apache.catalina.core.ApplicationFilterChain.doFilter( >> ApplicationFilterChain.java:166) >>> at >>> org.apache.catalina.core.StandardWrapperValve.invoke( >> StandardWrapperValve.java:198) >>> at >>> org.apache.catalina.core.StandardContextValve.invoke( >> StandardContextValve.java:96) >>> at >>> org.apache.catalina.authenticator.AuthenticatorBase.invoke( >> AuthenticatorBase.java:504) >>> at >>> org.apache.catalina.core.StandardHostValve.invoke( >> StandardHostValve.java:140) >>> at >>> org.apache.catalina.valves.ErrorReportValve.invoke( >> ErrorReportValve.java:81) >>> at >>> org.apache.catalina.valves.AbstractAccessLogValve.invoke( >> AbstractAccessLogValve.java:650) >>> at >>> org.apache.catalina.core.StandardEngineValve.invoke( >> StandardEngineValve.java:87) >>> at >>> org.apache.catalina.connector.CoyoteAdapter.service( >> CoyoteAdapter.java:342) >>> at >>> org.apache.coyote.http11.Http11Processor.service( >> Http11Processor.java:803) >>> at >>> org.apache.coyote.AbstractProcessorLight.process( >> AbstractProcessorLight.java:66) >>> at >>> org.apache.coyote.AbstractProtocol$ConnectionHandler.process( >> AbstractProtocol.java:790) >>> at >>> org.apache.tomcat.util.net >>> <http://org.apache.tomcat.util.net>.NioEndpoint$ >> SocketProcessor.doRun(NioEndpoint.java:1459) >>> at >>> org.apache.tomcat.util.net >>> <http://org.apache.tomcat.util.net>.SocketProcessorBase. >> run(SocketProcessorBase.java:49) >>> at java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown >>> Source) >>> at java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown >>> Source) >>> at >>> org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run( >> TaskThread.java:61) >>> at java.lang.Thread.run(Unknown Source) >>> >>> Csaba >>> >>> On 2018.01.25. 15 <tel:2018.01.25.%2015>:32, Colm O hEigeartaigh >>> wrote: >>> > What's the full stack-trace? >>> > >>> > On Thu, Jan 25, 2018 at 1:44 PM, Tóth Csaba <[email protected] >>> <mailto:[email protected]>> wrote: >>> > >>> >> Hello! >>> >> Yes, after I deleted it, its begin to parse the SAML. >>> >> the next error is about the SigVerCrypto is empty at the >>> >> SignatureTrustValidator.validate step. >>> >> (get from the RequestData.sigVerCrypto) >>> >> >>> >> I set up the thing: >>> >> >>> >> <bean id="cryptoProperties" class="java.util.Properties"> >>> >> <constructor-arg> >>> >> <props> >>> >> <prop >>> >> key="org.apache.ws.security.crypto.provider">org.apache. >>> >> ws.security.components.crypto.Merlin</prop> >>> >> <prop >>> >> key="org.apache.ws.security.crypto.merlin.keystore.type"> >> jks</prop> >>> >> <prop >>> >> key="org.apache.ws.security.crypto.merlin.keystore.password"> >>> .... </prop> >>> >> <prop >>> >> key="org.apache.ws.security.crypto.merlin.file">key/key. >> jks</prop> >>> >> </props> >>> >> </constructor-arg> >>> >> </bean> >>> >> <bean id="utSTSProperties" >>> >> class="org.apache.cxf.sts.StaticSTSProperties"> >>> >> <property name="SignatureCryptoProperties" >>> >> ref="cryptoProperties"/> >>> >> .... >>> >> </bean> >>> >> >>> >> and put the keyfile under the WEB-INF/classes/key >>> >> (in the keyfile the keys for signing the new SAML) >>> >> >>> >> Thanx >>> >> Csaba >>> >> >>> >> >>> >> On 2018.01.25. 13 <tel:2018.01.25.%2013>:40, Colm O >>> hEigeartaigh wrote: >>> >>> Do you mean that there was a "saml2p:Status" element in the >>> security >>> >> header >>> >>> before the Assertion? If so then this is not valid, only the SAML >>> >> Assertion >>> >>> should be there. >>> >>> >>> >>> Colm. >>> >>> >>> >>> On Thu, Jan 25, 2018 at 8:47 AM, Tóth Csaba <[email protected] >>> <mailto:[email protected]>> wrote: >>> >>> >>> >>>> Hello! >>> >>>> >>> >>>> I dig deeper in the code: >>> >>>> The problem with the SAML was: >>> >>>> In the securty element contains not only the SAML, its >>> contains before >>> >>>> the SAML an >>> >>>> <saml2:Issuer> and an <saml2p:Status> element >>> >>>> (in his case The same is not processed) >>> >>>> >>> >>>> If I delete it, its go thru the SAML validator >>> >>>> >>> >>>> Csaba >>> >>>> >>> >>>> On 2018.01.24. 19 <tel:2018.01.24.%2019>:25, Tóth Csaba wrote: >>> >>>>> Hello! >>> >>>>> Thanx. I changed the namespace, but not helped. >>> >>>>> >>> >>>>> The DefaultSubjectProvider cant retrieve the subject from >>> this SAML: >>> >>>>> >>> >>>>> <saml2:Assertion ID="..." IssueInstant="..." Version="2.0" >>> >>>>> xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"> >>> >>>>> >>> >>>>> <saml2:Subject> >>> >>>>> <saml2:NameID >>> >>>>> Format="urn:oasis:names:tc:SAML:2.0:nameid-format: >>> >>>> persistent">[name]</saml2:NameID> >>> >>>>> <saml2:SubjectConfirmation >>> >>>>> Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"> >>> >>>>> <saml2:SubjectConfirmationData >>> >>>>> InResponseTo="_9c7644ce0fb93649cd2ca77bb9b5e6db22f68b52a9" >>> >>>>> NotOnOrAfter="2018-01-24T18:06:33.305Z"/> >>> >>>>> </saml2:SubjectConfirmation> >>> >>>>> </saml2:Subject> >>> >>>>> >>> >>>>> </saml2:Assertion> >>> >>>>> >>> >>>>> But I get an error, because the subject is null >>> >>>>> (At this point I cant change the SAML in the request) >>> >>>>> >>> >>>>> Thanx >>> >>>>> >>> >>>>> Csaba >>> >>>>> >>> >>>>> On 2018.01.24. 10:55, Colm O hEigeartaigh wrote: >>> >>>>>> The problem I think is that "http://schemas.xmlsoap.org/ >>> >>>> ws/2003/06/secext" >>> >>>>>> is not a standard WS-Security namespace, and hence CXF is not >>> >> processing >>> >>>>>> the message header at all. The correct WS-Security >>> namespace for the >>> >>>>>> security header is instead " >>> >>>>>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss- >>> <http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-> >>> >>>> wssecurity-secext-1.0.xsd >>> >>>>>> ". >>> >>>>>> >>> >>>>>> You could take a look at the CXF transformation feature to >>> transform >>> >> the >>> >>>>>> namespace into the correct version (no idea if this will >>> work or not): >>> >>>>>> >>> >>>>>> http://cxf.apache.org/docs/transformationfeature.html >>> <http://cxf.apache.org/docs/transformationfeature.html> >>> >>>>>> >>> >>>>>> Colm. >>> >>>>>> >>> >>>>>> >>> >>>>>> On Tue, Jan 23, 2018 at 6:19 PM, Tóth Csaba <[email protected] >>> <mailto:[email protected]>> wrote: >>> >>>>>> >>> >>>>>>> Hello! >>> >>>>>>> Its in the header: >>> >>>>>>> ------------ >>> >>>>>>> <soapenv:Envelope >>> >>>>>>> xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/ >>> <http://schemas.xmlsoap.org/soap/envelope/>" >>> >>>>>>> xmlns:ns="http://docs.oasis-open.org/ws-sx/ws-trust/200512 >>> <http://docs.oasis-open.org/ws-sx/ws-trust/200512>" >>> >>>>>>> xmlns:a="http://www.w3.org/2005/08/addressing >>> <http://www.w3.org/2005/08/addressing>"> >>> >>>>>>> <soapenv:Header> >>> >>>>>>> <wsse:Security xmlns:wsse="http://schemas. >>> >>>> xmlsoap.org/ws/2003/06/secext >>> <http://xmlsoap.org/ws/2003/06/secext>" >>> >>>>>>> <saml:Assertion xmlns:saml="urn:oasis:names: >>> >> tc:SAML:2.0:assertion" >>> >>>>>>> xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance >>> <http://www.w3.org/2001/XMLSchema-instance>" >>> >>>>>>> xmlns:xs="http://www.w3.org/2001/XMLSchema >>> <http://www.w3.org/2001/XMLSchema>" >>> >>>>>>> ID="pfxccb2f4f7-ca9c-3b5e-89b1-1d3c777400bc" Version="2.0" >>> >>>>>>> IssueInstant="2014-07-17T01:01:48Z"> >>> >>>>>>> >>> >>>>>>> [assertion] >>> >>>>>>> >>> >>>>>>> </saml:Assertion> >>> >>>>>>> >>> >>>>>>> </wsse:Security> >>> >>>>>>> </soapenv:Header> >>> >>>>>>> <soapenv:Body> >>> >>>>>>> <ns:RequestSecurityToken > >>> >>>>>>> >>> >>>>>>> <ns:RequestType>http://docs.oasis-open.org/ws-sx/ws-trust/ >>> <http://docs.oasis-open.org/ws-sx/ws-trust/> >>> >> 200512/Issue >>> >>>>>>> </ns:RequestType> >>> >>>>>>> >>> >>>>>>> <ns:TokenType>http://docs.oasis-open.org/wss/oasis-wss- >>> <http://docs.oasis-open.org/wss/oasis-wss-> >>> >>>>>>> saml-token-profile-1.1#SAMLV2.0</ns:TokenType> >>> >>>>>>> <ns7:AppliesTo xmlns:ns7="http://www.w3.org/ns/ws-policy >>> <http://www.w3.org/ns/ws-policy>"> [url] >>> >>>>>>> </ns7:AppliesTo> >>> >>>>>>> <!-- >>> >>>>>>> <ns:Claims Dialect="http://bag.admin.ch/ >>> >> epr/2017/annex/5/addendum/2 >>> >>>> "> >>> >>>>>>> [claims need to process too ] >>> >>>>>>> >>> >>>>>>> </ns:Claims> >>> >>>>>>> --> >>> >>>>>>> </ns:RequestSecurityToken> >>> >>>>>>> </soapenv:Body> >>> >>>>>>> </soapenv:Envelope> >>> >>>>>>> --------------------- >>> >>>>>>> >>> >>>>>>> Its look like easy task for the first look: >>> >>>>>>> get a SAML in the header, full of attributes, and a >>> request with >>> >> other >>> >>>>>>> attributes. >>> >>>>>>> Validate some attributes, and all header attributes + claims >>> >> attributes >>> >>>>>>> put the new SAML token. >>> >>>>>>> >>> >>>>>>> but, about a week long, I google, read source code, google >>> again, and >>> >>>>>>> try to config the thing. >>> >>>>>>> no good tutorial, no good documentation, no good >>> description :( >>> >>>>>>> >>> >>>>>>> Csaba >>> >>>>>>> >>> >>>>>>> >>> >>>>>>> >>> >>>>>>> On 2018.01.23. 18 <tel:2018.01.23.%2018>:08, Colm O >>> hEigeartaigh wrote: >>> >>>>>>>> What does the request look like, e.g. where is the SAML >>> token in the >>> >>>>>>>> request? Is it referred to directly in the SOAP Body? >>> >>>>>>>> >>> >>>>>>>> Colm. >>> >>>>>>>> >>> >>>>>>>> On Tue, Jan 23, 2018 at 4:37 PM, Tóth Csaba >>> <[email protected] <mailto:[email protected]>> wrote: >>> >>>>>>>> >>> >>>>>>>>> Hello! >>> >>>>>>>>> >>> >>>>>>>>> I'd like to parse the incomming SAML token to get the >>> fields (user, >>> >>>> etc) >>> >>>>>>>>> and give it to the issuer. >>> >>>>>>>>> I found, that is done in the >>> >>>>>>>>> org.apache.cxf.sts.operation.TokenIssueOperation class but >>> >>>>>>>>> stsProperties.getSamlRealmCodec() is always null in my >>> code (how >>> >>>> can i >>> >>>>>>>>> set it, need to create a new one?) >>> >>>>>>>>> but after in the fetchSAMLAssertionFromWSSecuri >> tySAMLToken() >>> >>>> function >>> >>>>>>>>> List<WSSecurityEngineResult> engineResults = >>> >>>> handlerResult.getResults(); >>> >>>>>>>>> line give back an empty list. >>> >>>>>>>>> >>> >>>>>>>>> In the request there is an SAML token. >>> >>>>>>>>> >>> >>>>>>>>> I try to find some solution, but every example is >>> working with the >>> >>>>>>>>> usernametoken, and/or dont provide a valid cxf config xml. >>> >>>>>>>>> >>> >>>>>>>>> Thanx >>> >>>>>>>>> Csaba >>> >>>>>>>>> >>> >>>>>>>>> >>> >> >>> > >>> >>> >>> >>> >>> -- >>> Colm O hEigeartaigh >>> >>> Talend Community Coder >>> http://coders.talend.com >> >> >
