Team,

On the STS client page[1], the property keys configured for the direct and
indirect configuration options for an STS client seem unnecessarily
different:

direct configuration uses:
<entry key="ws-security.username" value="joe"/>
<entry key="ws-security.callback-handler"
value="interop.client.KeystorePasswordCallback"/>
<entry key="ws-security.signature.properties" value="etc/alice.properties"/> 
<entry key="ws-security.encryption.properties" value="etc/bob.properties"/>

indirect configuration uses:
<entry key="ws-security.sts.token.properties" value="etc/bob.properties"/>  
<entry key="ws-security.callback-handler"
value="interop.client.KeystorePasswordCallback"/>
<entry key="ws-security.signature.properties" value="etc/alice.properties"/> 
<entry key="ws-security.encryption.properties" value="etc/bob.properties"/>     

The example would probably be clearer if the configuration were the same for
both, or at least some explanation given why they should be different. 
(BTW, what is "ws-security.sts.token.properties" for?  I haven't needed it.)

Any problem with standardizing to the same sample config?  This is what I'm
using locally for my test client against a Metro STS:

<entry key="ws-security.username" value="alice"/>
<entry key="ws-security.callback-handler" value="client.MyCallbackHandler"/>
<entry key="ws-security.signature.properties"
value="clientKeystore.properties"/> 
<entry key="ws-security.encryption.properties"
value="clientKeystore.properties"/> 
<entry key="ws-security.encryption.username" value="mystskey"/>

Where clientKeystore.properties is this:
org.apache.ws.security.crypto.provider=org.apache.ws.security.components.crypto.Merlin
org.apache.ws.security.crypto.merlin.keystore.type=jks
org.apache.ws.security.crypto.merlin.keystore.password=cspass
org.apache.ws.security.crypto.merlin.keystore.alias=myclientkey
org.apache.ws.security.crypto.merlin.file=clientstore.jks

It seems to work fine, requires one less properties file, providing you use
the same keystore for the truststore--I can put in a sentence telling the
user to have separate "ws-security.signature.properties" and
"ws-security.encryption.properties" values if the keystore and truststore
are different.

Thoughts?

Thanks,
Glen

[1] http://cxf.apache.org/docs/ws-trust.html
-- 
View this message in context: 
http://cxf.547215.n5.nabble.com/Simplify-the-configuration-options-on-the-WS-Trust-page-tp1842738p1842738.html
Sent from the cxf-dev mailing list archive at Nabble.com.

Reply via email to