Author: nandana
Date: Wed Jan  2 23:55:10 2008
New Revision: 11791

Log:

Updated the Commodity Quote Sample Guide

Modified:
   trunk/wsas/java/modules/documentation/src/site/xdoc/commodity_quote_guide.xml

Modified: 
trunk/wsas/java/modules/documentation/src/site/xdoc/commodity_quote_guide.xml
==============================================================================
--- 
trunk/wsas/java/modules/documentation/src/site/xdoc/commodity_quote_guide.xml   
    (original)
+++ 
trunk/wsas/java/modules/documentation/src/site/xdoc/commodity_quote_guide.xml   
    Wed Jan  2 23:55:10 2008
@@ -163,30 +163,24 @@
                 domain policies. We would only demonstrate the sample with the
                 default policy available from Sandesha2
             </li>
-            <li>secure - Rampart/Rahas: WSO2 WSAS distribution compliant with 
ten
+            <li>secure - Rampart/Rahas: WSO2 WSAS distribution compliant with 
fifteen
                 security scenarios.
                 <ol>
-                    <li>Username Token authentication</li>
-                    <li>Requests as well as responses are signed</li>
-                    <li>Sign and encrypt using Basic256 algorithm suite</li>
-                    <li>Encrypt and sign using Basic256 algorithm suite</li>
-                    <li>Sign and encrypt using Basic256 algorithm suite and 
derived
-                        keys
-                    </li>
-                    <li>Sign and encrypt using TripleDesRsa15 algorithm 
suite</li>
-                    <li>Sign and encrypt using TripleDesRsa15 algorithm suite 
and
-                        derived keys
-                    </li>
-                    <li>Sign and encrypt using TripleDesRsa15 algorithm suite, 
derived
-                        keys and encrypt primary signature
-                    </li>
-                    <li>SecureConversation - Sign and encrypt - Service as STS 
-
-                        Bootstrap policy - UsernameToken with Timestamp over 
HTTPS
-                    </li>
-                    <li>SecureConversation - Sign and encrypt with signature 
encrypted
-                        - Service as STS - Bootstrap policy - Derived Key 
encr/sig based
-                        on an ephemeral key
-                    </li>
+                    <li>Username Token authentication over HTTPS</li>
+                    <li>Sign only - X509 Authentication</li>
+                    <li>Sign and encrypt - X509 Authentication</li>
+                    <li>Sign only - Anonymous clients</li>
+                    <li>Encrypt only - Anonymous clients</li>
+                    <li>Sign and Encrypt - Anonymous clients</li>
+                    <li>Encrypt only - Username Token Authentication</li>
+                    <li>Sign and Encrypt - Username Token Authentication</li>
+                    <li>SecureConversation - Sign only - Service as STS - 
Bootstrap policy - Sign and Encrypt , X509 Authentication    </li>
+                    <li>SecureConversation - Encrypt only - Service as STS - 
Bootstrap policy - Sign and Encrypt , X509 Authentication</li>
+                    <li>SecureConversation - Sign and Encrypt - Service as STS 
- Bootstrap policy - Sign and Encrypt , X509 Authentication</li>
+                    <li>SecureConversation - Sign Only - Service as STS - 
Bootstrap policy - Sign and Encrypt , Anonymous clients</li>
+                    <li>SecureConversation - Encrypt Only - Service as STS - 
Bootstrap policy - Sign and Encrypt , Anonymous clients</li>
+                    <li>SecureConversation - Encrypt Only - Service as STS - 
Bootstrap policy - Sign and Encrypt , Username Token Authentication</li>
+                    <li>SecureConversation - Sign and Encrypt - Service as STS 
- Bootstrap policy - Sign and Encrypt , Username Token Authentication</li>
                 </ol>
                 <p><strong>Note:</strong> Some of the scenarios listed above 
need
                     provision for unlimited security jurisdiction. This will 
basically be
@@ -235,8 +229,8 @@
 <pre>STARTING COMMODITY QUOTE SAMPLE CLIENT
 =============================
 
-Enter security scenario [1 - 10]...
-{select a value between 1 to 10}</pre>
+Enter security scenario [1 - 15]...
+{select a value between 1 to 15}</pre>
 <ol>
 <li>Username Token authentication
     <ul>
@@ -253,7 +247,7 @@
 STARTING COMMODITY QUOTE SAMPLE CLIENT
 =============================
 
-Enter security scenario [1 - 10]...
+Enter security scenario number [1 - 15]...
 1
 Client will be tuned to work on security scenario :  1
 Please enter your username :
@@ -334,7 +328,7 @@
         <pre>STARTING COMMODITY QUOTE SAMPLE CLIENT
 =============================
 
-Enter security scenario [1 - 10]...
+Enter security scenario number [1 - 15]...
 2
 Client will be tuned to work on security scenario :  2
 In this demonstration, client will use client.jks and server should use
@@ -373,33 +367,112 @@
         </li>
     </ul>
 </li>
-<li>Sign and encrypt using Basic256 algorithm suite<br/>
+<li>Sign and encrypt - X509 Authentication<br/>
        <strong>Configuration same as in scenario 2, except using this security
         scenario.</strong></li>
-<li>Encrypt and sign using Basic256 algorithm suite<br/>
+<li>Sign only - Anonymous clients<br/>
     <strong>Configuration as in scenario 2, except using this security
-        scenario.</strong></li>
-<li>Sign and encrypt using Basic256 algorithm suite and derived keys<br/>
+        scenario. But in the client side, client's keys are not used and only 
+        the service's public key is used</strong></li>
+<li>Encrypt only - Anonymous clients<br/>
     <strong>Configuration as in scenario 2, except using this security
-        scenario.</strong></li>
-<li>Sign and encrypt using TripleDesRsa15 algorithm suite<br/>
+        scenario. But in the client side, client's keys are not used and only 
+        the service's public key is used</strong></li>
+<li>Sign and Encrypt - Anonymous clients<br/>
     <strong>Configuration as in scenario 2, except using this security
-        scenario.</strong></li>
-<li>Sign and encrypt using TripleDesRsa15 algorithm suite and derived
-    keys<br/>
-    <strong>Configuration as in scenario 2, except using this security
-        scenario.</strong></li>
-<li>Sign and encrypt using TripleDesRsa15 algorithm suite, derived keys and
-    encrypt primary signature<br/>
+        scenario. But in the client side, client's keys are not used and only 
+        the service's public key is used</strong></li>
+<li>Requests as well as responses are encrypted for this scenario to work.
+    Commodity quote service needs to import a certificate. Let this
+    certificate be service.jks. In addition to this, client needs to import
+    the private key of the service.jks. Let's say this is client.jks. For
+    this demonstration, service.jks and client.jks will be shipped with the
+    sample and it's located at WSO2WSAS_HOME/samples/CommodityQuote/keys/
+    <ul>
+        <li><strong>Server side:</strong> Logging to management console. Go to
+            Security &gt; Users &gt; User Management. The add a user "client"
+            with password "testing". Go to Keystores and upload the
+            service.jks. Keystore password will be "testing" and private key
+            store password will be "testing". Then go to Services &gt;
+            CommodityQuote &gt; Security Configuration and select "Encrypt 
only -
+            Username Token Authentication",after which select "Continue". 
Select 
+            Trusted Certificate Stores as service.jks and select private 
keystore 
+            as service.jks and also select user client and apply it.
+        </li>
+        <li><strong>Client side:</strong>
+        <pre>STARTING COMMODITY QUOTE SAMPLE CLIENT
+=============================
+
+Enter security scenario number [1 - 15]...
+7
+Selected security scenario :  7
+In this demonstration, client will use client.jks and server should use
+service.jks.
+Please enter your username :
+client
+Please enter your password :
+testing
+Sample will be invoked using following parameters ..
+CommodityQuoteService Endpoint reference   : 
http://10.100.1.130:9762/services/CommodityQuote
+Quality of Service                : secure
+
+
+
+Please select your operation...
+---------------------------------
+(1) getQuote
+(2) getSymbols
+(3) Exit
+:1
+...Getting Quote...
+Please enter the symbol:xe
+
+Results
+-------
+Name       :xe
+Symbol     :Xenon
+High value :0.0
+Low value  :0.0
+Price      :24.0
+
+Please select your operation...
+---------------------------------
+(1) getQuote
+(2) getSymbols
+(3) Exit
+:
+                     
+
+                      </pre>
+        </li>
+    </ul>
+</li>
+<li>Sign and Encrypt - Username Token Authentication<br/>
+    <strong>Configuration as in scenario 7, except using this security
+        scenario</strong></li>
+<li>Sign and Encrypt - Username Token Authentication<br/>
+    <strong>Configuration as in scenario 7, except using this security
+        scenario</strong></li>
+<li>SecureConversation - Sign only - Service as STS - Bootstrap policy - Sign 
and Encrypt , X509 Authentication<br/>
     <strong>Configuration as in scenario 2, except using this security
         scenario</strong></li>
-<li>SecureConversation - Sign and encrypt - Service as STS - Bootstrap
-    policy - UsernameToken with Timestamp over HTTPS<br/>
-    <strong>Select "client" as the user.</strong></li>
-<li>SecureConversation - Sign and encrypt with signature encrypted -
-    Service as STS - Bootstrap policy - Derived Key encr/sig based on an
-    ephemeral key<br/>
-    <strong>Configuration same as in scenario 2, except using this security
+<li>SecureConversation - Encrypt only - Service as STS - Bootstrap policy - 
Sign and Encrypt , X509 Authentication<br/>
+       <strong>Configuration same as in scenario 2, except using this security
+        scenario.</strong></li>
+<li>SecureConversation - Sign and Encrypt - Service as STS - Bootstrap policy 
- Sign and Encrypt , X509 Authentication<br/>
+       <strong>Configuration same as in scenario 2, except using this security
+        scenario.</strong></li>
+<li>SecureConversation - Sign Only - Service as STS - Bootstrap policy - Sign 
and Encrypt , Anonymous clients<br/>
+       <strong>Configuration same as in scenario 2, except using this security
+        scenario.</strong></li>
+<li>SecureConversation - Encrypt Only - Service as STS - Bootstrap policy - 
Sign and Encrypt , Anonymous clients<br/>
+       <strong>Configuration same as in scenario 2, except using this security
+        scenario.</strong></li>
+<li>SecureConversation - Encrypt Only - Service as STS - Bootstrap policy - 
Sign and Encrypt , Username Token Authentication<br/>
+       <strong>Configuration same as in scenario 7, except using this security
+        scenario.</strong></li>
+<li>SecureConversation - Sign and Encrypt - Service as STS - Bootstrap policy 
- Sign and Encrypt , Username Token Authentication<br/>
+       <strong>Configuration same as in scenario 7, except using this security
         scenario.</strong></li>
 </ol>
 

_______________________________________________
Wsas-java-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/wsas-java-dev

Reply via email to