Hello Santosh,

Your line:

<wsse:UsernameToken xmlns:wsu="
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd";
wsu:Id="SecurityToken-9e141676-2400-4c6d-ab87-1d5af61729b3">
is based on the namespace:
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd

you may open the URL by double clicking in the link:
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd

By reading the provided documentation it follows that the attribute ID:

 <xsd:attribute name="Id" type="xsd:ID">
    <xsd:annotation>
       <xsd:documentation>This global attribute supports annotating
arbitrary elements with an ID.</xsd:documentation>
    </xsd:annotation>
 </xsd:attribute>

Then we may conclude that this type defines the fault code value for
Timestamp message expiration
(wsu:Id="SecurityToken-9e141676-2400-4c6d-ab87-1d5af61729b3).


Hope this helps.

Jose Ferreiro


On 7/20/08, Werner Dittmann <[EMAIL PROTECTED]> wrote:
>
> Strange - same mail with different subjects - what do intend here?
>
> Regards,
> Werner
>
> sh_santosh schrieb:
>
>>
>>
>> Dear all,
>>
>> Hi Jose / all,
>>
>> just one word away.
>>
>> I am NOT able generate
>> 'SecurityToken-9e141676-2400-4c6d-ab87-1d5af61729b3'  inside the
>> wsse:UsernameToken tag.
>> In place of this i am able to generate only '
>> wsu:Id="UsernameToken-2691004"
>> '
>>
>> <wsse:UsernameToken
>> xmlns:wsu="
>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
>> "
>>
>> wsu:Id="SecurityToken-9e141676-2400-4c6d-ab87-1d5af61729b3">
>>
>> What is this 'SecurityToken-9e141676-2400-4c6d-ab87-1d5af61729b3' ?
>>
>> How can I generate it in Java (using Axis 1.3 and wss4j) ?
>>
>> Required Security Header by other end( .Net WSE 3.0) ----
>>
>> <?xml version="1.0" encoding="utf-8"?>
>> <soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/";
>>        xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";
>>        xmlns:xsd="http://www.w3.org/2001/XMLSchema";
>>        xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing";
>>       xmlns:wsse="
>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
>> "
>>       xmlns:wsu="
>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
>> ">
>>        <soap:Header>
>>                <wsa:Action>
>>                        http://www.test.com/api/ws/internal/testInfo
>>                </wsa:Action>
>>                <wsa:MessageID>
>>                        urn:uuid:ca7e475b-484a-4bb8-974f-eb573438bb43
>>                </wsa:MessageID>
>>                <wsa:ReplyTo>
>>                        <wsa:Address>
>>
>> http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
>>                        </wsa:Address>
>>                </wsa:ReplyTo>
>>                <wsa:To>
>>                        http://localhost:8080/testapi/testwsapi.asmx
>>                </wsa:To>
>>                <wsse:Security soap:mustUnderstand="1">
>>                        <wsu:Timestamp
>>
>> wsu:Id="Timestamp-c70b72e2-561c-4b18-bc4b-acf8c3896b14">
>>
>> <wsu:Created>2008-02-28T15:33:56Z</wsu:Created>
>>
>> <wsu:Expires>2008-02-28T15:38:56Z</wsu:Expires>
>>                        </wsu:Timestamp>
>>                        <wsse:UsernameToken
>>                               xmlns:wsu="
>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
>> "
>>
>> wsu:Id="SecurityToken-9e141676-2400-4c6d-ab87-1d5af61729b3">
>>                               <wsse:Username>[EMAIL PROTECTED]
>> </wsse:Username>
>>                                <wsse:Password
>>                                       Type="
>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText
>> ">
>>                                        SomePassword
>>                                </wsse:Password>
>>
>> <wsse:Nonce>5SImW1gykzSPdeiWzcCdaQ==</wsse:Nonce>
>>
>> <wsu:Created>2008-02-28T15:33:56Z</wsu:Created>
>>                        </wsse:UsernameToken>
>>                </wsse:Security>
>>        </soap:Header>
>>        <soap:Body>
>>                <SAN_Info
>>                        xmlns="http://www.test.com/api/testing/ws/internal
>> ">
>>                        <SAN_Request VendorId="TestVendor"
>>                                VendorPassword="SomePassword"
>>                               xmlns="
>> http://www.test.com/api/testing/testinforequest";>
>>                                <Brand>SANBUS</Brand>
>>                                <TourCode>GE</TourCode>
>>                                <Code>80135</Code>
>>                        </SAN_Request>
>>                </SAN_Info>
>>        </soap:Body>
>> </soap:Envelope>
>>
>> Generated Security header By my side (Java- Axis 1.3 and wss4j
>> )-----------------
>> <?xml version="1.0" encoding="UTF-8"?>
>> <soapenv:Envelope
>>        xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/";
>>        xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing";
>>        xmlns:xsd="http://www.w3.org/2001/XMLSchema";
>>        xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";>
>>        <soapenv:Header>
>>                <wsse:Security
>>                       xmlns:wsse="
>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
>> "
>>                        soapenv:mustUnderstand="1">
>>                        <wsse:UsernameToken
>>                               xmlns:wsu="
>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
>> "
>>                                wsu:Id="UsernameToken-2691004">
>>                                <wsse:Username>
>>                                        [EMAIL PROTECTED]
>>                                </wsse:Username>
>>                                <wsse:Password
>>                                       Type="
>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText
>> ">
>>                                        SomePassword
>>                                </wsse:Password>
>>
>> <wsse:Nonce>bGmGuPDxQw2kkR5R0zC/hA==</wsse:Nonce>
>>
>> <wsu:Created>2008-07-10T16:46:47.046Z</wsu:Created>
>>                        </wsse:UsernameToken>
>>                        <wsu:Timestamp
>>                               xmlns:wsu="
>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
>> "
>>                                wsu:Id="Timestamp-25899876">
>>
>> <wsu:Created>2008-07-10T16:46:47.015Z</wsu:Created>
>>
>> <wsu:Expires>2008-07-10T16:51:47.015Z</wsu:Expires>
>>                        </wsu:Timestamp>
>>                </wsse:Security>
>>                <wsa:MessageID soapenv:mustUnderstand="0">
>>                        uuid:c83b29b0-4e9f-11dd-8e1f-d019b0e90563
>>                </wsa:MessageID>
>>                <wsa:To soapenv:mustUnderstand="0">
>>                        http://localhost:8080/testapi/testwsapi.asmx
>>                </wsa:To>
>>                <wsa:Action soapenv:mustUnderstand="0">
>>                        http://www.test.com/api/testing/testinforequest
>>                </wsa:Action>
>>                <wsa:From soapenv:mustUnderstand="0">
>>                        <wsa:Address>
>>
>> http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
>>                        </wsa:Address>
>>                </wsa:From>
>>                <wsa:ReplyTo soapenv:mustUnderstand="0">
>>                        <wsa:Address>
>>
>> http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
>>                        </wsa:Address>
>>                </wsa:ReplyTo>
>>        </soapenv:Header>
>>        <soapenv:Body>
>>                <SAN_Info
>>                        xmlns="http://www.test.com/api/testing/ws/internal
>> ">
>>                        <SAN_Request VendorId="TestVendor"
>>                                VendorPassword="SomePassword"
>>                               xmlns="
>> http://www.test.com/api/testing/testinforequest";>
>>                                <Brand>SANBUS</Brand>
>>                                <TourCode>GE</TourCode>
>>                                <Code>80135</Code>
>>                        </SAN_Request>
>>                </SAN_Info>
>>        </soapenv:Body>
>> </soapenv:Envelope>
>>
>>
>> My client-config.wsdd ---------
>>
>> <?xml version="1.0" encoding="UTF-8"?>
>> <deployment xmlns="http://xml.apache.org/axis/wsdd/";
>> xmlns:java="http://xml.apache.org/axis/wsdd/providers/java";>
>>  <transport name="http"
>> pivot="java:org.apache.axis.transport.http.HTTPSender"/>
>>  <globalConfiguration>
>>   <requestFlow>
>>    <handler type="java:org.apache.ws.axis.security.WSDoAllSender" >
>>     <parameter name="action" value="Timestamp UsernameToken"/>
>>     <parameter name="user" value="[EMAIL PROTECTED]"/>
>>     <parameter name="passwordCallbackClass"
>> value="com.api.testing.ws.internal.PWCallback"/>
>>     <parameter name="passwordType" value="PasswordText"/>
>>     <parameter name="password" value="ppx13Z11"/>
>>     <parameter name="mustUnderstand" value="true" />
>>     <parameter name="addUTElements" value="Nonce Created"/>
>>    </handler>
>>   </requestFlow>
>>  </globalConfiguration>
>> </deployment>
>>
>>
>> By seeing the security header, we can say that it is
>> username-token-profile-1.0.
>>
>> How to solve this.
>>
>>
>>
>> Please help me.
>>
>>
>>
>> Regards
>> Santosh
>>
>>
>>
>>
>>
>> Shawn McKinney wrote:
>>
>>> Hello,
>>>
>>> I have question:
>>> How do (can) we change the default crypto provider
>>> used by WSS4J for a particular Java runtime instance?
>>>
>>> We are using WSS4J 1.5 and would like to enable WSS4J
>>> to use the default crypto provider provided by Sun or
>>> IBM in a Java runtime.  The idea here is we want to
>>> make it as easy as possible for our developers to test
>>> transactions using WS-Security running in Axis.
>>> We run Axis/WSS4J in JBoss, Tomcat and Websphere
>>> containers and would like to be able to test using the
>>> standard providers found in either JVM implementation
>>> without having to configure the BouncyCastle provider.
>>>
>>> Please note the aim here isn't to phase out or replace
>>> our use of BouncyCastle provider in production as we
>>> are quite happy with its capabilities.  Rather we want
>>> to remove a step (steamline setup) for developers that
>>> want to test using our security configuration.
>>>
>>> Our default client-side configuration is to enable
>>> Username token, ecrypted:
>>>
>>> <parameter name="action" value="UsernameToken Encrypt
>>> Timestamp"/>
>>>
>>> Thanks in advance for your reply.
>>>
>>> ---------------------------------------------------------------------
>>> To unsubscribe, e-mail: [EMAIL PROTECTED]
>>> For additional commands, e-mail: [EMAIL PROTECTED]
>>>
>>>
>>>
>>>
>>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>

Reply via email to