I don't think I can easily override the wss4j interceptor as I am using WS
policy so the interceptors are added for me.

Am eager to understand the security issues with client certs. When will
these be publicized
On 17/10/2014 12:56 AM, "Jason Pell" <[email protected]> wrote:

> I would be interested to understand why it is a security issue when the
> client TLS establishes the trust relationship.
>
> I had just finished adding basic saml support to our product and now with
> the upgrade I am back to square one.
>
> From the docs I have read using TLS with client auth instead of signed is
> a good alternative and performs better.
> On 17/10/2014 12:22 AM, "Colm O hEigeartaigh" <[email protected]> wrote:
>
>> There have been some considerable changes to SAML processing based on some
>> security issues that will become public soon. The security context is not
>> populated via unsigned SAML tokens any more (even if they are received
>> over
>> TLS with client authentication). If you want to support this you will have
>> to override the doResults method of the WSS4JInInterceptor. If you really
>> want to though, we could introduce a new JAX-WS property (defaulting to
>> false) to all this behaviour.
>>
>> Colm.
>>
>> On Thu, Oct 16, 2014 at 2:02 PM, Jason Pell <[email protected]> wrote:
>>
>> > All I get now is the X500Principal of the https token.
>> >
>> > My policy is below.  I am relying on the RequireClientCertificate to
>> have
>> > the saml token "signed" and thus I would have expected it to be present
>> in
>> > the security context.  I am at a loss as to why something like this
>> could
>> > change between point releases.
>> >
>> >
>> >     <!-- 2.3.1.1 (WSS1.0) SAML1.1 Assertion (Bearer) -->
>> >     <wsp:Policy wsu:Id="TLSBearerPolicy"
>> >          xmlns:wsp="http://www.w3.org/ns/ws-policy";
>> >         xmlns:wsu="
>> >
>> >
>> http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
>> > "
>> >         xmlns:sp="
>> > http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702";>
>> >
>> >             <wsp:All>
>> >                 <sp:TransportBinding>
>> >                     <wsp:Policy>
>> >                         <sp:TransportToken>
>> >                             <wsp:Policy>
>> >                                 <sp:HttpsToken>
>> >                                     <wsp:Policy>
>> >                                         <sp:RequireClientCertificate/>
>> >                                     </wsp:Policy>
>> >                                 </sp:HttpsToken>
>> >                             </wsp:Policy>
>> >                         </sp:TransportToken>
>> >                         <sp:AlgorithmSuite>
>> >                             <wsp:Policy>
>> >                                 <sp:Basic128 />
>> >                             </wsp:Policy>
>> >                         </sp:AlgorithmSuite>
>> >                         <sp:Layout>
>> >                             <wsp:Policy>
>> >                                 <sp:Strict />
>> >                             </wsp:Policy>
>> >                         </sp:Layout>
>> >                         <sp:IncludeTimestamp />
>> >                     </wsp:Policy>
>> >                 </sp:TransportBinding>
>> >
>> >                 <sp:SignedSupportingTokens>
>> >                     <wsp:Policy>
>> >                         <sp:SamlToken sp:IncludeToken="
>> >
>> >
>> http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/IncludeToken/AlwaysToRecipient
>> > ">
>> >                             <wsp:Policy>
>> >                                 <sp:WssSamlV11Token11/>
>> >                             </wsp:Policy>
>> >                         </sp:SamlToken>
>> >                     </wsp:Policy>
>> >                 </sp:SignedSupportingTokens>
>> >             </wsp:All>
>> >     </wsp:Policy>
>> >
>>
>>
>>
>> --
>> Colm O hEigeartaigh
>>
>> Talend Community Coder
>> http://coders.talend.com
>>
>

Reply via email to