Sanka,

while you have a look into the wsp:Optinal stuff, maybe you
can give some hints/ideas how to access and evaluate the various
assertions inside a policy once it was normalized? This would
speed up my learning curve considerable :-) .

Regards,
Werner


Davanum Srinivas wrote:
> Nice!!!. Please feel free to cleanup/update policy code if needed.
> 
> -- dims
> 
> On 12/5/05, Dittmann, Werner <[EMAIL PROTECTED]> wrote:
> 
>>All,
>>
>>as proposed by Sanka let's continue the discussion
>>and reports about WS-Commons/Policy on the WSS4J list. We'll
>>try to use Policy as starting point to enable WSS4J with
>>some WS-SecurityPolicy functions.
>>
>>Well, lets start.
>>
>>I did a small (in fact very small) example just to warm up
>>to Policy methods. See the attachement for the Java file.
>>
>>The attachement msg.txt shows the result and the problems
>>I have with the result.
>>
>>The input to the example was taken from the link to IBM's
>>interop site (see msg.txt), selected "policy2", cut/paste
>>it into a small file. This site also shows the expected
>>result if this Policy is normalized (merge and intersect
>>don't work yet?)
>>
>>Sanka, can you have a look into the result and the example
>>Java and give some advise? Did I miss something, e.g. scanning
>>the domain specific part (sec:) and using XOR / AND functions?
>>
>>Regards,
>>Werner
>>
>>
>>---------------------------------------------------------------------
>>To unsubscribe, e-mail: [EMAIL PROTECTED]
>>For additional commands, e-mail: [EMAIL PROTECTED]
>>
>>
>>
> 
> 
> 
> --
> Davanum Srinivas : http://wso2.com/blogs/
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to