Author: prabath
Date: Tue Apr 15 03:06:09 2008
New Revision: 15671

Log:

documentation added/updated

Added:
   
trunk/solutions/identity/modules/documentation/src/site/xdoc/oprp_developer_guide2.xml
Modified:
   trunk/solutions/identity/modules/documentation/src/site/site.xml
   
trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_administratorguide.xml
   trunk/solutions/identity/modules/documentation/src/site/xdoc/index.xml
   trunk/solutions/identity/modules/documentation/src/site/xdoc/index_docs.xml
   
trunk/solutions/identity/modules/documentation/src/site/xdoc/installation_guide.xml
   
trunk/solutions/identity/modules/documentation/src/site/xdoc/op_administratorguide.xml
   
trunk/solutions/identity/modules/documentation/src/site/xdoc/oprp_developer_guide.xml
   
trunk/solutions/identity/modules/documentation/src/site/xdoc/release-notes.xml
   
trunk/solutions/identity/modules/documentation/src/site/xdoc/rp_developer_guide.xml

Modified: trunk/solutions/identity/modules/documentation/src/site/site.xml
==============================================================================
--- trunk/solutions/identity/modules/documentation/src/site/site.xml    
(original)
+++ trunk/solutions/identity/modules/documentation/src/site/site.xml    Tue Apr 
15 03:06:09 2008
@@ -22,8 +22,7 @@
             <item name="Home" href="index.html"/>
         </menu>
         <menu name="Downloads">
-            <item name="Releases"
-                  
href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@"/>
+           <item name="Releases" 
href="http://wso2.org/downloads/solutions/identity"/>
         </menu>
         <menu name="Documentation" href="index_docs.html">
           <item name="Installation Guide" href="installation_guide.html"/>
@@ -33,6 +32,7 @@
           <item name="mod_cspace Configuration Guide" 
href="mod_cspace_config.html"/> 
            <item name="Relying Party Developer Guide - I" 
href="rp_developer_guide.html"/>
            <item name="Relying Party Developer Guide - II" 
href="oprp_developer_guide.html"/>
+           <item name="Relying Party Developer Guide - III" 
href="oprp_developer_guide2.html"/>
            <item name="Idp User Guide" href="idp_userguide.html"/>
            <item name="OpenID User Guide" href="op_userguide.html"/>
         </menu>

Modified: 
trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_administratorguide.xml
==============================================================================
--- 
trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_administratorguide.xml
     (original)
+++ 
trunk/solutions/identity/modules/documentation/src/site/xdoc/idp_administratorguide.xml
     Tue Apr 15 03:06:09 2008
@@ -19,7 +19,7 @@
 <html xmlns="http://www.w3.org/1999/xhtml";>
 <body>
 <p>[<a
-href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@";>Download</a>]
+href="http://wso2.org/downloads/solutions/identity";>Download</a>]
 | [<a href="index_docs.html">Documentation Index</a>] | [<a
 href="release-notes.html">Release Note</a>]</p>
 

Modified: trunk/solutions/identity/modules/documentation/src/site/xdoc/index.xml
==============================================================================
--- trunk/solutions/identity/modules/documentation/src/site/xdoc/index.xml      
(original)
+++ trunk/solutions/identity/modules/documentation/src/site/xdoc/index.xml      
Tue Apr 15 03:06:09 2008
@@ -19,10 +19,10 @@
 <body>
 <h1>Welcome to WSO2 Identity Solution, [EMAIL PROTECTED]@</h1>
 
-<h2>April 07th, 2008 - WSO2 Identity Solution , [EMAIL PROTECTED]@ 
Released!</h2>
+<h2>April 08th, 2008 - WSO2 Identity Solution , [EMAIL PROTECTED]@ 
Released!</h2>
 
 <p>[<a
-href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@";>Download</a>]
+href="http://wso2.org/downloads/solutions/identity";>Download</a>]
 | [<a href="index_docs.html">Documentation Home</a>] | [<a
 href="release-notes.html">Release Note</a>]</p>
 

Modified: 
trunk/solutions/identity/modules/documentation/src/site/xdoc/index_docs.xml
==============================================================================
--- trunk/solutions/identity/modules/documentation/src/site/xdoc/index_docs.xml 
(original)
+++ trunk/solutions/identity/modules/documentation/src/site/xdoc/index_docs.xml 
Tue Apr 15 03:06:09 2008
@@ -17,7 +17,7 @@
 <html xmlns="http://www.w3.org/1999/xhtml";>
 <body>
 <p>[<a
-href="http://dist.wso2.org/products/wsas/java/@wso2is_version@";>Download</a>]
+href="http://wso2.org/downloads/solutions/identity";>Download</a>]
 | [<a href="index_docs.html">Documentation Home</a>] | [<a
 href="release-notes.html">Release Note</a>]</p>
 
@@ -40,7 +40,9 @@
   <li><a href="rp_developer_guide.html">Relying Party Developer Guide - I</a> 
- 
   Describes how to enable InfoCard login for websites using our 
components.</li>
   <li><a href="oprp_developer_guide.html">Relying Party Developer Guide - 
II</a> - 
-  Describes how to enable OpenID and OpenID InfoCard login for websites using 
our components.</li>
+  Describes how to enable OpenID with Simple Registration and OpenID InfoCard 
login for websites using our components.</li>
+  <li><a href="oprp_developer_guide2.html">Relying Party Developer Guide - 
III</a> - 
+  Describes how to enable OpenID login with OpenID Attribute Exchange and 
OpenID Provider Authentication Policy Extension for websites using our 
components.</li>
 </ul>
 <strong>For IdP Users</strong>
 <ul>

Modified: 
trunk/solutions/identity/modules/documentation/src/site/xdoc/installation_guide.xml
==============================================================================
--- 
trunk/solutions/identity/modules/documentation/src/site/xdoc/installation_guide.xml
 (original)
+++ 
trunk/solutions/identity/modules/documentation/src/site/xdoc/installation_guide.xml
 Tue Apr 15 03:06:09 2008
@@ -1,94 +1,99 @@
-<!--
-  ~ Copyright 2005-2007 WSO2, Inc. (http://wso2.com)
-  ~
-  ~ Licensed under the Apache License, Version 2.0 (the "License");
-  ~ you may not use this file except in compliance with the License.
-  ~ You may obtain a copy of the License at
-  ~
-  ~ http://www.apache.org/licenses/LICENSE-2.0
-  ~
-  ~ Unless required by applicable law or agreed to in writing, software
-  ~ distributed under the License is distributed on an "AS IS" BASIS,
-  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-  ~ See the License for the specific language governing permissions and
-  ~ limitations under the License.
-  --><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
-       "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd";>
-<html xmlns="http://www.w3.org/1999/xhtml";>
-<body>
-<p>[<a
-href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@";>Download</a>]
-| [<a href="index_docs.xml">Documentation Home</a>] | [<a
-href="release-notes.html">Release Note</a>]</p>
-<h1>WSO2 Identity Solution, [EMAIL PROTECTED]@ - Installation Guide</h1>
-
-<p>Your feedback on WSO2 Identity Solution is most appreciated. Please send 
them to our <a
-href="index.xml#mail">mailing lists.</a></p>
-
-<h2 id="System">System Requirements</h2>
-
-<table border="2">
-  <tbody>
-    <tr>
-      <td>Java Runtime Environment</td>
-      <td>1.5 (For instructions on setting up the JRE in different
-        operating systems, visit <a
-        href="http://java.sun.com";>http://java.sun.com</a>)</td>
-    </tr>
-    <tr>
-      <td>Memory</td>
-      <td>256 MB</td>
-    </tr>
-    <tr>
-      <td>Disk</td>
-      <td>Approximately 80 MB will be used for the identity provider .zip 
-         distribution
-      </td>
-    </tr>
-    <tr>
-      <td>Operating System</td>
-      <td>Tested on Windows XP, Linux - (Ubuntu, Gentoo)</td>
-    </tr>
-  </tbody>
-</table>
-
-<h1>Installing WSO2 Identity Solution : Identity Provider [EMAIL 
PROTECTED]@</h1>
-
-<a name="win"></a> 
-
-<h2 id="Installing">Installing on Microsoft Windows</h2>
-
-<p><strong>Note</strong>: Out of Microsoft Windows platforms, the WSO2 
Identity 
-Solution, [EMAIL PROTECTED]@ release has been successfully tested only on
-Windows XP.</p>
-
-The following steps will take you through the installation for the MS Windows 
XP 
-operating system.
-
-<ol>
-<li><a 
href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@";>
-   Download</a> the WSO2 Identity solution binary distribution.</li>
-<li>Extract the zip archive.</li>
-<li>Set the JAVA_HOME environment variable to your Java installation.</li>
-<li>Execute the WSO2 Identity Solution : Identity Provider starting script. 
-e.g., C:[EMAIL PROTECTED]@\bin\wso2is.bat</li>
-<li>Check your WSO2 Identity Solution instance using the URL 
https://localhost:12443</li>
-</ol>
-
-<h2 id="Installing">Installing on Linux</h2>
-
-<ol>
-<li><a 
href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@";>
-   Download</a> the WSO2 Identity solution binary distribution.</li>
-<li>Extract the zip archive.</li>
-<li>Set the JAVA_HOME environment variable to your Java installation.</li>
-<li>Execute the WSO2 Identity Solution : Identity Provider starting script. 
-e.g., /identity/[EMAIL PROTECTED]@/bin/wso2is start</li>
-<li>Check your WSO2 Identity Solution instance using the URL 
https://localhost:12443</li>
-</ol>
-
-<p>For details on the Management Console see <a
-        href="idp_administratorguide.html">Administrator's Guide</a></p>
-
-</body>
-</html>
+<!--
+  ~ Copyright 2005-2007 WSO2, Inc. (http://wso2.com)
+  ~
+  ~ Licensed under the Apache License, Version 2.0 (the "License");
+  ~ you may not use this file except in compliance with the License.
+  ~ You may obtain a copy of the License at
+  ~
+  ~ http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  --><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
+       "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd";>
+<html xmlns="http://www.w3.org/1999/xhtml";>
+<body>
+<p>[<a
+href="http://wso2.org/downloads/solutions/identity";>Download</a>]
+| [<a href="index_docs.xml">Documentation Home</a>] | [<a
+href="release-notes.html">Release Note</a>]</p>
+<h1>WSO2 Identity Solution, [EMAIL PROTECTED]@ - Installation Guide</h1>
+
+<p>Your feedback on WSO2 Identity Solution is most appreciated. Please send 
them to our <a
+href="index.xml#mail">mailing lists.</a></p>
+
+<h2 id="System">System Requirements</h2>
+
+<table border="2">
+  <tbody>
+    <tr>
+      <td>Java Runtime Environment</td>
+      <td>1.5 (For instructions on setting up the JRE in different
+        operating systems, visit <a
+        href="http://java.sun.com";>http://java.sun.com</a>)</td>
+    </tr>
+    <tr>
+      <td>Memory</td>
+      <td>256 MB</td>
+    </tr>
+    <tr>
+      <td>Disk</td>
+      <td>Approximately 80 MB will be used for the identity provider .zip 
+         distribution
+      </td>
+    </tr>
+    <tr>
+      <td>Operating System</td>
+      <td>Tested on Windows XP, Linux - (Ubuntu, Gentoo)</td>
+    </tr>
+  </tbody>
+</table>
+
+<h1>Installing WSO2 Identity Solution : Identity Provider [EMAIL 
PROTECTED]@</h1>
+
+<a name="win"></a> 
+
+<h2 id="Installing">Installing on Microsoft Windows</h2>
+
+<p><strong>Note</strong>: Out of Microsoft Windows platforms, the WSO2 
Identity 
+Solution, [EMAIL PROTECTED]@ release has been successfully tested only on
+Windows XP.</p>
+
+The following steps will take you through the installation for the MS Windows 
XP 
+operating system.
+
+<ol>
+<li><a href="http://wso2.org/downloads/solutions/identity";>
+   Download</a> the WSO2 Identity solution binary distribution.</li>
+<li>Extract the zip archive.</li>
+<li>Set the JAVA_HOME environment variable to your Java installation.</li>
+<li>Execute the WSO2 Identity Solution : Identity Provider starting script. 
+e.g., C:[EMAIL PROTECTED]@\bin\wso2is.bat</li>
+<li>Check your WSO2 Identity Solution instance using the URL 
https://localhost:12443</li>
+</ol>
+
+<h2 id="Installing">Installing on Linux</h2>
+
+<ol>
+<li><a href="http://wso2.org/downloads/solutions/identity";>
+   Download</a> the WSO2 Identity solution binary distribution.</li>
+<li>Extract the zip archive.</li>
+<li>Set the JAVA_HOME environment variable to your Java installation.</li>
+<li>Execute the WSO2 Identity Solution : Identity Provider starting script. 
+e.g., /identity/[EMAIL PROTECTED]@/bin/wso2is start</li>
+<li>Check your WSO2 Identity Solution instance using the URL 
https://localhost:12443</li>
+</ol>
+
+<p><strong>Note</strong>: You also need to download Java Cryptography 
Extension (JCE) Unlimited Strength Jurisdiction Policy Files 5.0 from 
+<a href="http://java.sun.com/javase/downloads/index_jdk5.jsp";>here</a> and 
copy the two jar files from the extracted jce directory (local_policy.jar and 
US_export_policy.jar) to $JAVA_HOME/jre/lib/security.
+
+</p>
+
+<p>For details on the Management Console see <a
+        href="idp_administratorguide.html">Administrator's Guide</a></p>
+
+</body>
+</html>

Modified: 
trunk/solutions/identity/modules/documentation/src/site/xdoc/op_administratorguide.xml
==============================================================================
--- 
trunk/solutions/identity/modules/documentation/src/site/xdoc/op_administratorguide.xml
      (original)
+++ 
trunk/solutions/identity/modules/documentation/src/site/xdoc/op_administratorguide.xml
      Tue Apr 15 03:06:09 2008
@@ -19,7 +19,7 @@
 <html xmlns="http://www.w3.org/1999/xhtml";>
 <body>
 <p>[<a
-href="http://dist.wso2.org/products/solutions/identity/@wso2is_version@";>Download</a>]
+href="http://wso2.org/downloads/solutions/identity";>Download</a>]
 | [<a href="index_docs.html">Documentation Index</a>] | [<a
 href="release-notes.html">Release Note</a>]</p>
 

Modified: 
trunk/solutions/identity/modules/documentation/src/site/xdoc/oprp_developer_guide.xml
==============================================================================
--- 
trunk/solutions/identity/modules/documentation/src/site/xdoc/oprp_developer_guide.xml
       (original)
+++ 
trunk/solutions/identity/modules/documentation/src/site/xdoc/oprp_developer_guide.xml
       Tue Apr 15 03:06:09 2008
@@ -24,7 +24,7 @@
 <h2>Introduction</h2>
 This servlet filter 
org.wso2.solutions.identity.relyingparty.servletfilter.RelyingPartyFilter
 can be used with a servlet based web application to provide information card 
and OpenID 
-login to that application.The Part II of this guide explains how you can add 
OpenID and OpenID Information Card support to 
+login to that application.The Part II of this guide explains how you can add 
OpenID with Simple Registration and OpenID Information Card support to 
 a relying party web application. The developer should follow the steps 
described below
 in intgrating this servlet filter:
 
@@ -184,12 +184,20 @@
 <li>core-3.1.1.jar</li>
 <li>dom4j-1.6.1.jar</li>
 <li>opensaml-1.1.406.jar</li>
+<li>opensaml-2.0-rc1.jar</li>
+<li>openws-2.0-rc1.jar</li>
 <li>stax-api-1.0.1.jar</li>
 <li>wss4j-SNAPSHOT.jar</li>
 <li>xmlsec-534045-patched.jar</li>
 <li>wso2is-token-verifier-core-1.0.jar</li>
 <li>wso2is-base-1.0.jar</li>
 <li>openid4java-nodeps-0.9.3.1.jar</li>
+<li>icu4j-3.4.4.jar</li>
+<li>openxri-client-1.0.1.jar</li>
+<li>openxri-syntax-1.0.1.jar</li>
+<li>commons-pool-1.3.jar</li>
+<li>commons-dbcp-1.2.2.jar</li>
+<li>htmlparser-1.6.jar</li>
 </ul>
 
 <h3>Step 4 : Obtain the information in the verified token and process</h3>
@@ -202,13 +210,13 @@
 On successful verification value of this attribute will be 
 "<strong>success</strong>". Otherwise it will be 
"<strong>failure</strong>".</p>  
 
-<p>The ServletRequest will also contain a set of attrbites by the names of 
+<p>The ServletRequest will also contain a set of attributes by the names of 
 the claims (the part of claim URI after the final "/")</p> with their values.
 
 <p>These values can be used by the developer to initiate a user session in a 
web 
 application.</p>
 
-<h2>Adding OpenID Support</h2>
+<h2>Adding OpenID Support with Simple Registration</h2>
 
 <p></p>
 <h3>Step 1 : Add the servlet filter to your application</h3>
@@ -254,6 +262,9 @@
 // imports
 <[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.openid.relyingparty.OpenIDAuthenticationRequest"%>
 <[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.openid.relyingparty.OpenIDConsumer"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.openid.OpenIDRequestType"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.RelyingPartyException"%>
+<[EMAIL PROTECTED] import="org.wso2.solutions.identity.IdentityConstants"%>
 
 <%
 
@@ -305,6 +316,7 @@
 <pre><![CDATA[
 // imports
 <[EMAIL PROTECTED] import="org.wso2.solutions.identity.IdentityConstants"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.TokenVerifierConstants"%>
 <[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.openid.relyingparty.OpenIDConsumer "%>
 
 <%
@@ -345,12 +357,20 @@
 <li>core-3.1.1.jar</li>
 <li>dom4j-1.6.1.jar</li>
 <li>opensaml-1.1.406.jar</li>
+<li>opensaml-2.0-rc1.jar</li>
+<li>openws-2.0-rc1.jar</li>
 <li>stax-api-1.0.1.jar</li>
 <li>wss4j-SNAPSHOT.jar</li>
 <li>xmlsec-534045-patched.jar</li>
 <li>wso2is-token-verifier-core-1.5.jar</li>
 <li>wso2is-base-1.5.jar</li>
 <li>openid4java-nodeps-0.9.3.1.jar</li>
+<li>icu4j-3.4.4.jar</li>
+<li>openxri-client-1.0.1.jar</li>
+<li>openxri-syntax-1.0.1.jar</li>
+<li>commons-pool-1.3.jar</li>
+<li>commons-dbcp-1.2.2.jar</li>
+<li>htmlparser-1.6.jar</li>
 </ul>
 
 

Added: 
trunk/solutions/identity/modules/documentation/src/site/xdoc/oprp_developer_guide2.xml
==============================================================================
--- (empty file)
+++ 
trunk/solutions/identity/modules/documentation/src/site/xdoc/oprp_developer_guide2.xml
      Tue Apr 15 03:06:09 2008
@@ -0,0 +1,360 @@
+<!--
+  ~ Copyright 2005-2007 WSO2, Inc. (http://wso2.com)
+  ~
+  ~ Licensed under the Apache License, Version 2.0 (the "License");
+  ~ you may not use this file except in compliance with the License.
+  ~ You may obtain a copy of the License at
+  ~
+  ~ http://www.apache.org/licenses/LICENSE-2.0
+  ~
+  ~ Unless required by applicable law or agreed to in writing, software
+  ~ distributed under the License is distributed on an "AS IS" BASIS,
+  ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  ~ See the License for the specific language governing permissions and
+  ~ limitations under the License.
+  -->
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
+       "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd";>
+<html xmlns="http://www.w3.org/1999/xhtml";>
+<head>
+</head>
+<body>
+<h1>WSO2 Identity Solution, [EMAIL PROTECTED]@ : Java Servlet Filter Developer 
Guide : Part III</h1>
+
+<h2>Introduction</h2>
+This servlet filter 
org.wso2.solutions.identity.relyingparty.servletfilter.RelyingPartyFilter
+can be used with a servlet based web application to provide information card 
and OpenID 
+login to that application.The Part III of this guide explains how you can add 
OpenID support to 
+a relying party web application, with OpenID Attribute Exchange and OpenID 
Provider Authentication Policy Extension. 
+The developer should follow the steps described below
+in intgrating this servlet filter:
+
+<h2>Adding OpenID Attribute Exchange support</h2>
+
+<p></p><h3>Step 1 : Add the servlet filter to your application</h3>
+
+<p>Include the following entry in the web.xml file of the application:</p>
+
+<pre><![CDATA[
+
+    <filter>
+        <filter-name>TokenValidator</filter-name>
+        
<filter-class>org.wso2.solutions.identity.relyingparty.servletfilter.RelyingPartyFilter</filter-class>
+               <init-param>
+                   <param-name> ................ </param-name>
+                   <param-value> ............... </param-value>
+               </init-param>
+               <init-param>
+                       ......................
+               </init-param>
+                       ......................
+                       ......................
+    </filter>
+       
+    <filter-mapping>
+        <filter-name>TokenValidator</filter-name>
+        <url-pattern>/*</url-pattern>
+    </filter-mapping>
+]]></pre>
+
+<h3>Step 2 : Add signin page</h3>
+
+<pre><![CDATA[
+<form name="openidsignin" id="openidsignin" method="post" 
action="openidsubmit.jsp">
+    Enter Your OpenID Url:<input type="text" name="openIdUrl"/>
+    <input type="submit" name="submit" value="Login" />
+</form>
+]]></pre>
+
+<p>As per above scenario <b>openidsubmit.jsp</b> page will accept the OpenID 
url and will do authentication using Identity Solution's 
+relying parting components.</p>
+
+<h3>Step 3 : Create OpenID authentication request[openidsubmit.jsp]</h3>
+<pre><![CDATA[
+// imports
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.openid.relyingparty.OpenIDAuthenticationRequest"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.openid.relyingparty.OpenIDConsumer"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.openid.OpenIDRequestType"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.RelyingPartyException"%>
+<[EMAIL PROTECTED] import="org.wso2.solutions.identity.IdentityConstants"%>
+
+<%
+
+try
+{
+   OpenIDAuthenticationRequest openIDAuthRequest = null;
+
+   openIDAuthRequest = new OpenIDAuthenticationRequest(request,response);
+
+   openIDAuthRequest.setOpenIDUrl((String)request.getParameter("openIdUrl"));
+
+   // you need to set an absolute url as the return url.
+   // once the user authenticated successfully or failed at the OpenID
+   // Provider, the browser will be redirected to this url
+
+   openIDAuthRequest.setReturnUrl("http://myapp.com/openidcallback.jsp";);
+
+   // Use OpenID Attribute Exchange
+   openIDAuthRequest.addRequestType(OpenIDRequestType.ATTRIBUTE_EXCHANGE);
+
+   // Set the required claims - I need these claims from the OpenID
+   // Provider.
+   
openIDAuthRequest.addRequiredClaims(IdentityConstants.OpenId.ExchangeAttributes.NICK_NAME,IdentityConstants.OpenId.ExchangeAttributes.NICK_NAME_NS);
+   
openIDAuthRequest.addRequiredClaims(IdentityConstants.OpenId.ExchangeAttributes.FULL_NAME,IdentityConstants.OpenId.ExchangeAttributes.FULL_NAME_NS);
+   
openIDAuthRequest.addRequiredClaims(IdentityConstants.OpenId.ExchangeAttributes.EMAIL,IdentityConstants.OpenId.ExchangeAttributes.EMAIL_NS);
+   
openIDAuthRequest.addRequiredClaims(IdentityConstants.OpenId.ExchangeAttributes.DOB,IdentityConstants.OpenId.ExchangeAttributes.DOB_NS);
+   
openIDAuthRequest.addRequiredClaims(IdentityConstants.OpenId.ExchangeAttributes.GENDER,IdentityConstants.OpenId.ExchangeAttributes.GENDER_NS);
+   
openIDAuthRequest.addRequiredClaims(IdentityConstants.OpenId.ExchangeAttributes.POSTAL_CODE,IdentityConstants.OpenId.ExchangeAttributes.POSTAL_CODE_NS);
+   
openIDAuthRequest.addRequiredClaims(IdentityConstants.OpenId.ExchangeAttributes.COUNTRY,IdentityConstants.OpenId.ExchangeAttributes.COUNTRY_NS);
+   
openIDAuthRequest.addRequiredClaims(IdentityConstants.OpenId.ExchangeAttributes.LANGUAGE,IdentityConstants.OpenId.ExchangeAttributes.LANGUAGE_NS);
+   
openIDAuthRequest.addRequiredClaims(IdentityConstants.OpenId.ExchangeAttributes.TIMEZONE,IdentityConstants.OpenId.ExchangeAttributes.TIMEZONE_NS);
+
+
+   // Performs authentication : this will redirect you to OpenID Provider for 
authentication
+   OpenIDConsumer.getInstance().doOpenIDAuthentication(openIDAuthRequest);
+
+}
+catch(RelyingPartyException e)
+{
+   // handle exceptions
+   out.println(e.getMessage());
+}
+
+%> 
+]]></pre>
+
+<h3>Step 4 : Add OpenID callback page[openidcallback.jsp]</h3>
+
+<p>After being authenticated at the OpenID Provider, user will be redirected 
to this page.</p>
+<pre><![CDATA[
+// imports
+<[EMAIL PROTECTED] import="org.wso2.solutions.identity.IdentityConstants"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.TokenVerifierConstants"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.openid.relyingparty.OpenIDConsumer "%>
+
+<%
+
+String nickname = null;
+String auth = 
(String)request.getAttribute(TokenVerifierConstants.SERVLET_ATTR_STATE);
+
+ if(auth != null && TokenVerifierConstants.STATE_SUCCESS.equals(auth)) {
+
+    //user authenticated successfully at his OpenID Provider
+    //let me get his nick name - which I requested.
+
+    if 
(request.getAttribute(IdentityConstants.OpenId.ExchangeAttributes.NICK_NAME) != 
null)
+    {
+           nickname = 
request.getAttribute(IdentityConstants.OpenId.ExchangeAttributes.NICK_NAME);
+
+    }else {
+
+       // there can be OpenID Providers, who do not maintain a list of user
+       // attributes. In such case you won't receive any value here -
+       // though you requested.
+    }
+ }
+ else
+ {
+  //user authentication failed at his OpenID Provider
+ }
+%> 
+]]></pre>
+
+<h3>Step 5 : Add the following jars to your classpath</h3>
+<ul>
+<li>axiom-api-1.2.4.jar</li>
+<li>axiom-dom-1.2.4.jar</li>
+<li>axiom-impl-1.2.4.jar</li>
+<li>wstx-asl-3.2.1.jar</li>
+<li>bcprov-jdk15-132.jar</li>
+<li>core-3.1.1.jar</li>
+<li>dom4j-1.6.1.jar</li>
+<li>opensaml-1.1.406.jar</li>
+<li>opensaml-2.0-rc1.jar</li>
+<li>openws-2.0-rc1.jar</li>
+<li>stax-api-1.0.1.jar</li>
+<li>wss4j-SNAPSHOT.jar</li>
+<li>xmlsec-534045-patched.jar</li>
+<li>wso2is-token-verifier-core-1.5.jar</li>
+<li>wso2is-base-1.5.jar</li>
+<li>openid4java-nodeps-0.9.3.1.jar</li>
+<li>icu4j-3.4.4.jar</li>
+<li>openxri-client-1.0.1.jar</li>
+<li>openxri-syntax-1.0.1.jar</li>
+<li>commons-pool-1.3.jar</li>
+<li>commons-dbcp-1.2.2.jar</li>
+<li>htmlparser-1.6.jar</li>
+</ul>
+
+<h2>Adding OpenID Provider Authentication Policy Extension support</h2>
+
+<p></p><h3>Step 1 : Add the servlet filter to your application</h3>
+
+<p>Include the following entry in the web.xml file of the application:</p>
+
+<pre><![CDATA[
+
+    <filter>
+        <filter-name>TokenValidator</filter-name>
+        
<filter-class>org.wso2.solutions.identity.relyingparty.servletfilter.RelyingPartyFilter</filter-class>
+               <init-param>
+                   <param-name> ................ </param-name>
+                   <param-value> ............... </param-value>
+               </init-param>
+               <init-param>
+                       ......................
+               </init-param>
+                       ......................
+                       ......................
+    </filter>
+       
+    <filter-mapping>
+        <filter-name>TokenValidator</filter-name>
+        <url-pattern>/*</url-pattern>
+    </filter-mapping>
+]]></pre>
+
+<h3>Step 2 : Add signin page</h3>
+
+<pre><![CDATA[
+<form name="openidsignin" id="openidsignin" method="post" 
action="openidsubmit.jsp">
+    Enter Your OpenID Url:<input type="text" name="openIdUrl"/>
+    <input type="submit" name="submit" value="Login" />
+</form>
+]]></pre>
+
+<p>As per above scenario <b>openidsubmit.jsp</b> page will accept the OpenID 
url and will do authentication using Identity Solution's 
+relying parting components.</p>
+
+<h3>Step 3 : Create OpenID authentication request[openidsubmit.jsp]</h3>
+<pre><![CDATA[
+// imports
+<[EMAIL PROTECTED] import="org.wso2.solutions.identity.IdentityConstants"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.openid.OpenIDAuthenticationRequest"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.openid.OpenIDConsumer"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.openid.AuthPolicyType"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.openid.OpenIDRequestType"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.RelyingPartyException"%>
+
+<%
+
+try
+{
+   OpenIDAuthenticationRequest openIDAuthRequest = null;
+
+   openIDAuthRequest = new OpenIDAuthenticationRequest(request,response);
+
+   openIDAuthRequest.setOpenIDUrl((String)request.getParameter("openIdUrl"));
+
+   // you need to set an absolute url as the return url.
+   // once the user authenticated successfully or failed at the OpenID
+   // Provider, the browser will be redirected to this url
+
+   openIDAuthRequest.setReturnUrl("http://myapp.com/openidcallback.jsp";);
+
+   // Use PAPE
+   openIDAuthRequest.addRequestType(OpenIDRequestType.PAPE);
+
+   String phishing= "true"; //In real implementation accept this from the user 
: (String)request.getParameter("phishing");
+   String multifactor = null;//In real implementation accept this from the 
user : (String)request.getParameter("multifactor");
+   String multifactorphysical= null; //In real implementation accept this from 
the user : (String)request.getParameter("multifactorphysical");
+
+
+   if (phishing!= null && phishing.equalsIgnoreCase("true")) {
+         
openIDAuthRequest.addAuthPolicy(AuthPolicyType.PAPE_POLICY_PHISHING_RESISTANT);
+   }
+
+   if (multifactor!= null && multifactor.equalsIgnoreCase("true")) {
+         
openIDAuthRequest.addAuthPolicy(AuthPolicyType.PAPE_POLICY_MULTI_FACTOR);
+   }
+
+   if (multifactorphysical!= null && 
multifactorphysical.equalsIgnoreCase("true")) {
+         
openIDAuthRequest.addAuthPolicy(AuthPolicyType.PAPE_POLICY_MULTI_FACTOR_PHYSICAL);
+   }
+
+   openIDAuthRequest.setMaxAuthAge(10);
+
+
+   // Performs authentication : this will redirect you to OpenID Provider for 
authentication
+   OpenIDConsumer.getInstance().doOpenIDAuthentication(openIDAuthRequest);
+
+}
+catch(RelyingPartyException e)
+{
+   // handle exceptions
+   out.println(e.getMessage());
+}
+
+%> 
+]]></pre>
+
+<h3>Step 4 : Add OpenID callback page[openidcallback.jsp]</h3>
+
+<p>After being authenticated at the OpenID Provider, user will be redirected 
to this page.</p>
+<pre><![CDATA[
+// imports
+<[EMAIL PROTECTED] import="org.wso2.solutions.identity.IdentityConstants"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.relyingparty.TokenVerifierConstants"%>
+<[EMAIL PROTECTED] 
import="org.wso2.solutions.identity.openid.relyingparty.OpenIDConsumer "%>
+
+<%
+
+String authPolcies = null;
+String authLevel = null;
+String authAge = null;
+
+String auth = 
(String)request.getAttribute(TokenVerifierConstants.SERVLET_ATTR_STATE);
+
+ if(auth != null && TokenVerifierConstants.STATE_SUCCESS.equals(auth)) {
+
+    //user authenticated successfully at his OpenID Provider
+    //let me get PAPE related attributes.
+
+    if (request.getAttribute("auth_policies") != null) {       
+        authPolcies = request.getAttribute("auth_policies");
+    }
+       
+    if (request.getAttribute("nist_auth_level") != null) {
+         authLevel = request.getAttribute("nist_auth_level");
+    }
+
+    if (request.getAttribute("auth_age") != null) { 
+         authAge = request.getAttribute("auth_age")%>
+    }
+ }
+ else
+ {
+  //user authentication failed at his OpenID Provider
+ }
+%> 
+]]></pre>
+
+<h3>Step 5 : Add the following jars to your classpath</h3>
+<ul>
+<li>axiom-api-1.2.4.jar</li>
+<li>axiom-dom-1.2.4.jar</li>
+<li>axiom-impl-1.2.4.jar</li>
+<li>wstx-asl-3.2.1.jar</li>
+<li>bcprov-jdk15-132.jar</li>
+<li>core-3.1.1.jar</li>
+<li>dom4j-1.6.1.jar</li>
+<li>opensaml-1.1.406.jar</li>
+<li>opensaml-2.0-rc1.jar</li>
+<li>openws-2.0-rc1.jar</li>
+<li>stax-api-1.0.1.jar</li>
+<li>wss4j-SNAPSHOT.jar</li>
+<li>xmlsec-534045-patched.jar</li>
+<li>wso2is-token-verifier-core-1.5.jar</li>
+<li>wso2is-base-1.5.jar</li>
+<li>openid4java-nodeps-0.9.3.1.jar</li>
+<li>icu4j-3.4.4.jar</li>
+<li>openxri-client-1.0.1.jar</li>
+<li>openxri-syntax-1.0.1.jar</li>
+<li>commons-pool-1.3.jar</li>
+<li>commons-dbcp-1.2.2.jar</li>
+<li>htmlparser-1.6.jar</li>
+</ul>
+
+
+</body>
+</html>

Modified: 
trunk/solutions/identity/modules/documentation/src/site/xdoc/release-notes.xml
==============================================================================
--- 
trunk/solutions/identity/modules/documentation/src/site/xdoc/release-notes.xml  
    (original)
+++ 
trunk/solutions/identity/modules/documentation/src/site/xdoc/release-notes.xml  
    Tue Apr 15 03:06:09 2008
@@ -27,26 +27,36 @@
 </head>
 
 <body>
-<h1>WSO2 Identity Solution @wso2is_version@ Release Notes</h1>
+<h1>New WSO2 Identity Solution feature-rich with OpenID</h1>
 
-<h3>07 April, 2008</h3>
+<h3>WSO2 Identity Solution @wso2is_version@ Release Note</h3>
 
-<p>The WSO2 Identity Solution enables LAMP and Java websites to provide strong 
authentication 
-based on the new interoperable Microsoft CardSpace technology, which is built 
-on the open standards Security Assertion Mark-up Language (SAML) and WS-Trust. 
-WSO2’s new open source security offering features an easy-to-use Identity 
-Provider that is controlled by a simple Web-based management console and 
-supports interoperability with multiple vendors’ CardSpace components, 
including
-those provided by Microsoft .NET. The WSO2 Identity Solution also works with 
-enterprises’ current identity directories, such as those based on the 
Lightweight 
-Directory Access Protocol (LDAP) and Microsoft Active Directory, allowing them 
-to leverage their existing infrastructure. In addition to the Identity Provider
-WSO2 Identity Solution provides a Relying Party Component Set which plugs into 
-the most common web servers to add support for CardSpace authentication.</p>
+<h3>08 April, 2008</h3>
 
+<p>The WSO2 Identity Solution, which enables LAMP and Java websites to provide 
strong authentication based on the new interoperable Microsoft 
+CardSpace technology, released version 1.5 today. This new release includes 
OpenID and OpenID Information Cards, further enhancing the WSO2 
+Identity Solution to cater to a wider audience for web based authentication. 
OpenID is a key feature in decentralizing single sign-on, much 
+favored by many users.</p>
 
+<p>The WSO2 Identity Solution is built on the open standards Security 
Assertion Mark-up Language (SAML) and WS-Trust. 
+This version supports SAML  version 2.0 in addition to 1.1 which was available 
in the previous version of the WSO2 Identity Solution.</p>
 
-<h2>Key Features in this Release</h2>
+<p>WSO2's open source security offering features an easy-to-use Identity 
Provider that is controlled by a simple Web-based management console 
+and supports interoperability with multiple vendors' CardSpace components. 
This includes those provided by Microsoft .NET.</p>
+
+<p>The WSO2 Identity Solution also works with current enterprise identity 
directories, such as those based on the Lightweight Directory Access 
+Protocol (LDAP) and Microsoft Active Directory, allowing them to leverage 
their existing infrastructure. In addition to the Identity Provider 
+the WSO2 Identity Solution provides a Relying Party Component Set which plugs 
into the most common Web servers to add support for CardSpace 
+authentication and now OpenID.</p>
+
+<h2>New features in version 1.5</h2>
+        <ul>
+           <li>OpenID Provider and relying party component support</li>        
+            <li>OpenID information cards based on user name-token credential 
and self issued credential</li>   
+            <li>SAML 2.0 support</li>          
+        </ul>
+
+<h2>Other Key Features</h2>
 
 <ul>
   <li>Identity provider
@@ -58,11 +68,7 @@
                        <li>Support for custom claim dialects and claims 
types</li>
                        <li>Statistics/reporting/audit trail</li>
                        <li>Ability to revoke information cards</li>
-                       <li>Issues information cards based on username-token 
credential and
-                self issued credential</li>    
-                   <li>Issues OpenID information cards based on username-token 
credential and
-                self issued credential</li>    
-                   <li>Issues OpenID</li>              
+                       <li>Issues information cards based on username-token 
credential and self issued credential</li>                 
         </ul>
   </li>
   <li>Apache HTTPD relying party module - mod_cspace</li>
@@ -79,14 +85,9 @@
                enable CardSpace authentication</li>
                <li>Supports multi-valued claims</li>
                <li>Supports a set of simple operation modes</li>
-            <li>Supports for OpenID</li>
-            <li>Supports for OpenID Information Cards</li>
-       </ul>
-  
+       </ul>  
 </ul>
 
-<br/>
-
 <h2>Reporting Problems</h2>
 Issues can be reported using the public JIRA available at <a
 
href="https://wso2.org/jira/browse/IDENTITY";>https://wso2.org/jira/browse/IDENTITY</a>
@@ -115,4 +116,4 @@
 
 <p>Copyright 2008 WSO2 Inc.</p>
 </body>
-</html>
+</html>
\ No newline at end of file

Modified: 
trunk/solutions/identity/modules/documentation/src/site/xdoc/rp_developer_guide.xml
==============================================================================
--- 
trunk/solutions/identity/modules/documentation/src/site/xdoc/rp_developer_guide.xml
 (original)
+++ 
trunk/solutions/identity/modules/documentation/src/site/xdoc/rp_developer_guide.xml
 Tue Apr 15 03:06:09 2008
@@ -182,11 +182,20 @@
 <li>core-3.1.1.jar</li>
 <li>dom4j-1.6.1.jar</li>
 <li>opensaml-1.1.406.jar</li>
+<li>opensaml-2.0-rc1.jar</li>
+<li>openws-2.0-rc1.jar</li>
 <li>stax-api-1.0.1.jar</li>
 <li>wss4j-SNAPSHOT.jar</li>
 <li>xmlsec-534045-patched.jar</li>
 <li>wso2is-token-verifier-core-1.0.jar</li>
 <li>wso2is-base-1.0.jar</li>
+<li>openid4java-nodeps-0.9.3.1.jar</li>
+<li>icu4j-3.4.4.jar</li>
+<li>openxri-client-1.0.1.jar</li>
+<li>openxri-syntax-1.0.1.jar</li>
+<li>commons-pool-1.3.jar</li>
+<li>commons-dbcp-1.2.2.jar</li>
+<li>htmlparser-1.6.jar</li>
 </ul>
 <br/>
 <h3>Step 4 : Obtain the information in the verified token and process</h3>

_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev

Reply via email to