Hi,

We have requirements to use X.509 Proxy Certificates (http://www.ietf.org/rfc/rfc3820.txt ) for message signature and validation. We have provider implementation of CertPathValidator, that deals with X.509 Proxy Certificates. We also have a CertStore implementation that deals with our trusted certificates and CRL processing, implemented as a provider.

But looking at the WSS4J trunk code, specifically, SingnatureProcessor (http://svn.apache.org/viewvc/webservices/wss4j/trunk/src/org/apache/ws/security/processor/SignatureProcessor.java?view=annotate ), line 360 onwards, it appears that the trust verification is baked into the code.

Are there any plans to use the standard Java Security Provider framework for this? Can the trust verification and path validation be made configurable, with use of the current implementation as a fallback mechanism if no other trust verification is configured?

If not, can anyone advice on the best way to integrate this with the current code base? We could extend and modify the WSS4J library (we do this for the current version of toolkit based on Apache Axis), but before we explore that option, if there are suggestions for cleaner integration or any planned changes that would accommodate our requirement, that would be great. Our main intention here is to use this with Apache CXF, and are happy to contribute any pieces we might have to develop to back to the project.

Thanks,
Rachana

Rachana Ananthakrishnan
Argonne National Laboratory | University of Chicago

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to