[ https://issues.apache.org/jira/browse/CXF-4595?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13482157#comment-13482157 ]
Jason Pell commented on CXF-4595: --------------------------------- This is the code in HttpsTokenInInterceptor that does actually check for the client certificate. And in my case, my debugging tells me that the setAsserted is false, which is a good thing, but then gets overriden. TLSSessionInfo tlsInfo = message.get(TLSSessionInfo.class); if (tlsInfo != null) { if (token.isRequireClientCertificate() && (tlsInfo.getPeerCertificates() == null || tlsInfo.getPeerCertificates().length == 0)) { asserted = false; } } else { asserted = false; } ai.setAsserted(asserted); > RequireClientCertificate is not validated > ----------------------------------------- > > Key: CXF-4595 > URL: https://issues.apache.org/jira/browse/CXF-4595 > Project: CXF > Issue Type: Bug > Components: WS-* Components > Affects Versions: 2.7.0 > Reporter: Jason Pell > Attachments: PolicySample.tar.gz > > > I can execute a web service which has a RequireClientCertificate="true" > policy in the transport binding, the problem is that my client is not > providing a certificate. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira