hi Nandana see inline
2009/3/20 Nandana Mihindukulasooriya <nandana....@gmail.com> > How does your custom token get validated ? This was what I really wondered about, how i could validate the custom token, I thought I could perform this in a password callback handler. Extract the Custom token as a Element and collect the values form it. Was not aware that wss4j had something to do with that. > Have you added a custom handler for that ? Maybe I'll look into that, do you have a link to a page where there's information about this? > WSS4J has a map of processor registered with the QName of the header block > in the security header. So if we can register a processor for your custom > header, then we can get this problem solved. Yes, at current we expect a > SAML token when there is Issued Token as a supporting token in the policy. > This should be improved to look for any type custom token. We need to find a > way to register a custom processor with a QName in WSS4J and then we can > improve Rampart Configuration have those configuration data. > If you are willing to do these improvements, I can help and guide you to do > that. I've have to consult my time schedule, but it would be a nice feature, would work much as the password callback handlers or? cheers, håkon > > > thanks, > Nandana > > 2009/3/20 Håkon Sagehaug <hakon.sageh...@bccs.uib.no> > > Hi >> >> Any tips on this issue? >> >> cheers, Håkon >> >> 2009/3/17 Håkon Sagehaug <hakon.sageh...@bccs.uib.no> >> >> Hi all >>> >>> I've got a service that accepts a custom token from a sts service, but >>> when I call my end service after injected the custom token into my header I >>> always get >>> >>> org.apache.axis2.AxisFault: SAML Token missing in request >>> >>> replay from my service. So I was wondering what does ramart look for when >>> trying to extract the custom token? Is it that the value of TokenType, a >>> namespace containing the element in my case, that must be the same as one of >>> the elements in the soap header. I had a look at the code where the >>> exception is thrown, in PolicyBasedResultsValidator#handleSupportingTokens >>> >>> else if ( token instanceof IssuedToken ) { >>> //TODO is is enough to check for ST_UNSIGNED results ?? >>> WSSecurityEngineResult samlResult = >>> WSSecurityUtil.fetchActionResult(results, WSConstants.ST_UNSIGNED); >>> if(samlResult == null) { >>> throw new RampartException("samlTokenMissing"); >>> } >>> } >>> >>> So if I got i correct is that it checks for unsigned saml tokens, bu >>> since my issued token is not a SAML token I've got a problem. Maybe the TODO >>> has something to do with it >>> >>> Any tips on how to solve this? >>> >>> cheers, Håkon >>> >>> >>> -- >>> Håkon Sagehaug, Scientific Programmer >>> Parallab, Bergen Center for Computational Science (BCCS) >>> UNIFOB AS (University of Bergen Research Company) >>> >> >> >> >> -- >> Håkon Sagehaug, Scientific Programmer >> Parallab, Bergen Center for Computational Science (BCCS) >> UNIFOB AS (University of Bergen Research Company) >> > > -- Håkon Sagehaug, Scientific Programmer Parallab, Bergen Center for Computational Science (BCCS) UNIFOB AS (University of Bergen Research Company)