Hi Chris,
On Tue, Feb 27, 2018 at 1:56 AM, Christopher Schultz <
ch...@christopherschultz.net> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Igor,
>
> On 2/23/18 5:47 PM, Igor Cicimov wrote:
> > On Sat, Feb 24, 2018 at 7:52 AM, Christopher Schultz <
> > ch...@christopherschultz.n
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Igor,
On 2/23/18 5:47 PM, Igor Cicimov wrote:
> On Sat, Feb 24, 2018 at 7:52 AM, Christopher Schultz <
> ch...@christopherschultz.net> wrote:
>
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA256
>>
>> Igor,
>>
>> On 2/23/18 4:45 AM, Igor Cicimov
Hi Chris,
On Sat, Feb 24, 2018 at 7:52 AM, Christopher Schultz <
ch...@christopherschultz.net> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Igor,
>
> On 2/23/18 4:45 AM, Igor Cicimov wrote:
> > Hi all,
> >
> > I have the following setup in the tomcat default file on
> > Ubunntu-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Igor,
On 2/23/18 4:45 AM, Igor Cicimov wrote:
> Hi all,
>
> I have the following setup in the tomcat default file on
> Ubunntu-14.04:
>
> JAVA_OPTS="$JAVA_OPTS
> -Djavax.net.ssl.keyStore=/opt/encompass/keystore/keystore.jks"
> JAVA_OPTS="$JAVA_O
Hi all,
I have the following setup in the tomcat default file on Ubunntu-14.04:
JAVA_OPTS="$JAVA_OPTS
-Djavax.net.ssl.keyStore=/opt/encompass/keystore/keystore.jks"
JAVA_OPTS="$JAVA_OPTS
-Djavax.net.ssl.trustStore=/opt/encompass/keystore/truststore.jks"
The keystore.jks holds dozen of SSL keys o
ediate it will only show the certificates that the
> intermediate accepts.
I understand all that. But what is important is that the client
(browser) determines which certificates are acceptable based upon what
the server provides.
> So the way it works for DoD is that on each CAC there
iate accepts. So the way
> it works for DoD is that on each CAC there are 2 client authentication
> certificates one Email Cert and one ID cert. They contain different
> information mainly the email address is only contained in the Email
> cert. When users are prompted to select a certif
import into your trust store. So if you import a
root certificate it will show everything that has that root
certificate in its chain but if you import in an intermediate it will
only show the certificates that the intermediate accepts. So the way
it works for DoD is that on each CAC there are 2 client
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Racine,
On 6/21/17 12:38 PM, Racine Faye wrote:
> I have noticed that in Tomcat 8.5.15 on the Windows Server 2008
> Operating System that the way that tomcat presents user
> certificates has changed. I have a trust store that I use on the
> tomcat
I have noticed that in Tomcat 8.5.15 on the Windows Server 2008
Operating System that the way that tomcat presents user certificates
has changed. I have a trust store that I use on the tomcat 8.5.14
version that has only DoD intermediate Email certificates which makes
it so when users go to the sit
I have noticed that in Tomcat 8.5.15 on the Windows Server 2008 Operating
System that the way that tomcat presents user certificates has changed. I
have a trust store that I use on the tomcat 8.5.14 version that has only
DoD intermediate Email certificates which makes it so when users go to the
sit
uirynen wrote:
>>
>> On 01/10/14 18:08, Christopher Schultz wrote: Nathan,
>>
>> On 10/1/14 10:02 AM, Nathan Quirynen wrote:
>>
>> Hi Tomcat users,
>>
>> A current application has client authentication configured in
>> the SSL Connector (server
,
>
> On 10/1/14 10:02 AM, Nathan Quirynen wrote:
>
> Hi Tomcat users,
>
> A current application has client authentication configured in
> the SSL Connector (server.xml):
>
> keystoreFile=".keystore" keystorePass="..."
> truststoreFile=".tru
uirynen wrote:
>>>>> Hi Tomcat users,
>>>>>
>>>>> A current application has client authentication configured in
>>>>> the SSL Connector (server.xml):
>>>>>
>>>>> >>>> keystoreFile=".keystore&
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Nathan,
On 10/1/14 12:16 PM, Nathan Quirynen wrote:
> On 01/10/14 18:08, Christopher Schultz wrote: Nathan,
>
> On 10/1/14 10:02 AM, Nathan Quirynen wrote:
>>>> Hi Tomcat users,
>>>>
>>>> A current app
02 AM, Nathan Quirynen wrote:
>>>> Hi Tomcat users,
>>>>
>>>> A current application has client authentication configured in the
>>>> SSL Connector (server.xml):
>>>>
>>>> >>> keystoreFile=".keystore" keystorePas
2014-10-01 18:16 GMT+02:00 Nathan Quirynen :
> On 01/10/14 18:08, Christopher Schultz wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA256
>>
>> Nathan,
>>
>> On 10/1/14 10:02 AM, Nathan Quirynen wrote:
>>> Hi Tomcat users,
>>>
>&
On 01/10/14 18:08, Christopher Schultz wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Nathan,
>
> On 10/1/14 10:02 AM, Nathan Quirynen wrote:
>> Hi Tomcat users,
>>
>> A current application has client authentication configured
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Nathan,
On 10/1/14 10:02 AM, Nathan Quirynen wrote:
> Hi Tomcat users,
>
> A current application has client authentication configured in the
> SSL Connector (server.xml):
>
> keystoreFile=".keystore" keystore
Hi Tomcat users,
A current application has client authentication configured in the SSL
Connector (server.xml):
And the CA root certificates have been added to the truststore.
This way it asks for a client certificate in any case, which works and
is fine for this application.
For a new
29.*.* 192.168.30.144 HTTP 312 HTTP/1.1 200 OK
(application/json)
********
Problem starts when I configure ssl client authentication for REST service:
web.xml
...
Service Api
/service/*
sic-service
CLIENT-CERT
Service Api
sic-service
...
tomcat-users.xml:
...
I solved my problem, I changed my web.xml to the following:
PartNos
/TNR/*
GET
POST
admin
secureconn
CONFIDENTIAL
converter-api
2013/2/20 :
> Hello Cedric,
>
>>And look at the first line which could be Owner or Subject (I only have a
>>french version at the moment which says Propriétaire:)
>
> (I created another Client-Cert)
> I did it and it shows me: CN=User03, OU=Any, O=Company, L=City, ST=Something,
> C=DE
>
> So I w
Hello Cedric,
>And look at the first line which could be Owner or Subject (I only have a
>french version at the moment which says Propriétaire:)
(I created another Client-Cert)
I did it and it shows me: CN=User03, OU=Any, O=Company, L=City, ST=Something,
C=DE
So I wrote:
But still I get a 4
2013/2/20 :
> Hello Mark,
>
> thank you for the quick answer! Could you explain, how I can change how to
> derive the user name from the cert? I don't have a DN in my certificate (Only
> E, CN, OU, O, L, S, C). This would be very great.
>
Hello,
The different E, CN,... are elements which compos
Hello Mark,
thank you for the quick answer! Could you explain, how I can change how to
derive the user name from the cert? I don't have a DN in my certificate (Only
E, CN, OU, O, L, S, C). This would be very great.
Mit freundlichen Grüßen,
Maximilian Schmidt
-
On 20/02/2013 12:01, maximilian-schm...@telekom.de wrote:
And this is my tomcat-users.xml ("Maximilian Schmidt" is the CN of my
client-certificate):
By default, you have to use the DN not the CN.
See X509UsernameRetrieverClassName
in
http://tomcat.apache.org/tom
Hello dear Tomcat Users and Developers,
I'm want my tomcat to use Client Authentication to check access of different
users. I created all certs (HTTPS works) but if I connect with a Client and
send my Client Cert I always get a 403 Error. I don't think it'S a problem of
certific
> -Original Message-
> From: Christopher Schultz [mailto:ch...@christopherschultz.net]
> Sent: Tuesday, July 17, 2012 9:14 AM
> To: Tomcat Users List
> Subject: Re: Client Authentication using SSL
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Jef
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jeffrey,
On 7/16/12 10:01 AM, Jeffrey Janner wrote:
> Thanks Chris, I'd seen a lot of traffic on the topic over the
> years, so knew someone had real-world experience on the subject.
> I'll check out what you did a little further. Of course, thinking
ers List
> Subject: Re: Client Authentication using SSL
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Jeffrey,
>
> On 7/12/12 9:44 AM, Jeffrey Janner wrote:
> > Is there anyone who's implemented true-client SSL auth over APR that
> > would
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jeffrey,
On 7/12/12 9:44 AM, Jeffrey Janner wrote:
> Is there anyone who's implemented true-client SSL auth over APR
> that would be willing to share hints/tips on how they handled
> certificate distributions, etc.?
I wasn't using APR -- though it sh
ded message --
>> From: Puneet Dewan
>> Date: Thu, Jul 12, 2012 at 10:19 PM
>> Subject: Re: Client Authentication using SSL
>> To: Tomcat Users List
>>
>>
>> Excellent suggestions and the link at the bottom .
>> On my local machine using keystor
?!
Am 12.07.2012 um 19:22 schrieb Puneet Dewan:
> The below way I used to deploy the war and able to use it :)
>
>
> -- Forwarded message --
> From: Puneet Dewan
> Date: Thu, Jul 12, 2012 at 10:19 PM
> Subject: Re: Client Authentication using SSL
&g
The below way I used to deploy the war and able to use it :)
-- Forwarded message --
From: Puneet Dewan
Date: Thu, Jul 12, 2012 at 10:19 PM
Subject: Re: Client Authentication using SSL
To: Tomcat Users List
Excellent suggestions and the link at the bottom .
On my local
col"
redirectPort="8443"
scheme="https"
secure="true"/>
On Wed, Jul 11, 2012 at 10:05 PM, Jeffrey Janner <
jeffrey.jan...@polydyne.com> wrote:
> Looking into implemented two-factor Auth for
; -Original Message-
> From: burghard.britzke [mailto:b...@charmides.in-berlin.de]
> Sent: Thursday, July 12, 2012 1:11 AM
> To: Tomcat Users List
> Subject: Re: Client Authentication using SSL
>
> may be that article helps:
> http://www.tomcatexpert.com/blog/2012/07
resting. But really just looking for some additional info on how the
> client SSL stuff really works.
> Jeff
>
>> -Original Message-
>> From: Esmond Pitt [mailto:esmond.p...@bigpond.com]
>> Sent: Wednesday, July 11, 2012 5:58 PM
>> To: Jeffrey Janner
>&g
where I have
> these
> 'factors':
>
> - SSL client certificate
> - 'ticket' (a UID in the URL, e.g. for password resets)
> - form
>
>
> EJP
>
> -Original Message-
> From: Jeffrey Janner [mailto:jeffrey.jan...@polydy
> -Original Message-
> From: Jeffrey Janner [mailto:jeffrey.jan...@polydyne.com]
> Sent: Wednesday, July 11, 2012 11:36 AM
> To: 'Tomcat Users List'
> Subject: Client Authentication using SSL
>
> Looking into implemented two-factor Auth for Tomcat with f
Looking into implemented two-factor Auth for Tomcat with first factor being our
current userid/password form.
I figured that the second factor could be Client Authentication using SSL, as
it seems readily available in Tomcat.
Aside from the wonderful Tomcat documentation on configuring the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Sanjeev,
On 2/6/12 12:01 PM, Sanjeev Sharma wrote:
> This forces client authentication when I try to access the app
> using a browser and when I provide a trusted certificate, I'm able
> get authenticated. After the authentication I wa
Sent: Monday, February 06, 2012 12:20 PM
To: Tomcat Users List
Subject: Re: Client Authentication--getting certificate information on the
server side
On 06/02/2012 17:01, Sanjeev Sharma wrote:
> Hello,
>
> I'm trying to configure client authentication in Tomcat 7 on Windows 7. I
&
On 06/02/2012 17:01, Sanjeev Sharma wrote:
> Hello,
>
> I'm trying to configure client authentication in Tomcat 7 on Windows 7. I
> have the following connector in the server.xml:
>
> protocol="HTTP/1.1"
>SSLEnabled
Hello,
I'm trying to configure client authentication in Tomcat 7 on Windows 7. I have
the following connector in the server.xml:
In my web.xml I have the following :
CLIENT-CERT
PKI Enabled App
This forces client authentication when I try to access the app us
>> I then installed the client certificate mycert.cer into
>> the client browsers, but has no effect and I still recevie the same
>> error messages.
Is Firefox able to authenticate itself via a client certificate
against a server? Maybe you just installed it in the truststore of
trustfull servers?
tore keystore.jks
> -storepass changeit
>
> Imported certificate into trust store:
>
> keytool -import -v -trustcacerts alias mycert -keypass changeit -file
> mycert.cer -keystore cacerts.jks -storepass changeit
>
> Added the following Connector into server.xml to allow Client
&
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ralph,
On 7/1/2010 9:28 AM, Ralph Carlson wrote:
> I changed server.xml to:
>
> maxThreads="150"
>scheme="https"
>secure="true"
>clientAuth="true"
>keystoreFile="/
-racarlson=mediacomcc@tomcat.apache.org] On Behalf Of
Christopher Schultz [ch...@christopherschultz.net]
Sent: Wednesday, June 30, 2010 9:40 PM
To: Tomcat Users List
Subject: Re: need help setting up tomcat with ssl client authentication
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ralph,
On 6
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ralph,
On 6/30/2010 5:07 PM, Ralph Carlson wrote:
> (d) have client Authorization on - with it off tomcat ssl works just fine,
> when its turned on I get this error
> so far I have been following the steps listed in this tomcat user group
> message
[...@pidster.com]
Sent: Wednesday, June 30, 2010 7:19 PM
To: Tomcat Users List
Subject: Re: need help setting up tomcat with ssl client authentication
On 30/06/2010 23:45, Ralph Carlson wrote:
> the tomcats logs have no errors in them, they end after start up (I haven't
> installed any app
On 30/06/2010 23:45, Ralph Carlson wrote:
> the tomcats logs have no errors in them, they end after start up (I haven't
> installed any apps yet, just trying to get to the tomcat manager with ssl)
Are you using APR?
This path:
>keystoreFile="/server.ks"
doesn't appear to match
-214164-racarlson=mediacomcc@tomcat.apache.org
[users-return-214164-racarlson=mediacomcc@tomcat.apache.org] On Behalf Of
Pid [...@pidster.com]
Sent: Wednesday, June 30, 2010 5:25 PM
To: Tomcat Users List
Subject: Re: need help setting up tomcat with ssl client authentication
On 30/06/201
On 30/06/2010 22:07, Ralph Carlson wrote:
> tomcat version 6.0.20
> os: windows xp sp3 professional edition
> sun java jdk 1.5.11
>
> I am trying to do the following
> (a) create a certificate authority and self sign server and client
> certificates using openssl and keytool
> (b) import the keyt
tomcat version 6.0.20
os: windows xp sp3 professional edition
sun java jdk 1.5.11
I am trying to do the following
(a) create a certificate authority and self sign server and client certificates
using openssl and keytool
(b) import the keytool keystore into tomcat
(c) verify the certificate chaing
List
Subject: RE: Unable to get client authentication working in tomcat 6
> From: Dobson, Paul L CTR USAF AFMC 416 SCMS/OBN
> [mailto:paul.dob...@hill.af.mil]
> Subject: Unable to get client authentication working in tomcat 6
>
> I have a tomcat 5 installation that uses client authentica
> From: Dobson, Paul L CTR USAF AFMC 416 SCMS/OBN
> [mailto:paul.dob...@hill.af.mil]
> Subject: Unable to get client authentication working in tomcat 6
>
> I have a tomcat 5 installation that uses client authentication. I am
> trying to upgrade to Tomcat 6.0.24 and I am n
I have a tomcat 5 installation that uses client authentication. I am
trying to upgrade to Tomcat 6.0.24 and I am not able to get the client
authentication to work. I am using the same keystore and truststore
files. I am also configuring the SSL port 8443 using what I believe are
the same
The client reports the error, which I presumed came as a response from
the server.
-Original Message-
From: Pid [mailto:p...@pidster.com]
Sent: 12 January 2010 17:30
To: Tomcat Users List
Subject: Re: Client authentication problems
On 12/01/2010 16:32, John Watson wrote:
> Dear tom
On 12/01/2010 16:32, John Watson wrote:
Dear tomcat users,
I run tomcat 6.0.18 under java 6 and am attempting to set up client
authentication via SSL. I have followed the instructions here:
http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html, with Tomcat
using the default SSL
Dear tomcat users,
I run tomcat 6.0.18 under java 6 and am attempting to set up client
authentication via SSL. I have followed the instructions here:
http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html, with Tomcat
using the default SSL implementation. We act as our own CA, so I have
set
FireFox also allows you to directly import a .p12 file.
-Original Message-
From: Jorge Medina [mailto:jmed...@e-dialog.com]
Sent: Monday, April 20, 2009 9:49 AM
To: Tomcat Users List
Subject: RE: Tomcat 5.5 Trust Stores and Client Authentication
I have not used client certificates, but in order
Message-
From: Ron Perkins [mailto:ronperkins...@googlemail.com]
Sent: Monday, April 20, 2009 4:14 AM
To: users@tomcat.apache.org
Subject: Tomcat 5.5 Trust Stores and Client Authentication
Hi All,
I have done the following to create a Trust Store for Tomcat to use:
Created a keystore with new certi
-keystore keystore.jks
-storepass changeit
Imported certificate into trust store:
keytool -import -v -trustcacerts alias mycert -keypass changeit -file
mycert.cer -keystore cacerts.jks -storepass changeit
Added the following Connector into server.xml to allow Client Authentication:
After
I am trying to get Client Authentication working with Tomcat 5.5, I
have successfully got SSL working without Client Authentication.
This is what I have done so far.
Created a keystore with new certificate:
keytool -genkey -alias mykey -keyalg RSA -kaypass changeit -keystore
keystore.jks
> From: Benoit Maupas [mailto:bmau...@yahoo.fr]
>
> I am using Tomcat with SSL and client-authentication by smartcard. My
> application uses Struts2 and Spring-Security. I would like to :
> 1/ get current SSL session retrieved from session-id
There isn't (at the moment) a
I am using Tomcat with SSL and client-authentication by smartcard. My
application uses Struts2 and Spring-Security. I would like to :
1/ get current SSL session retrieved from session-id
2/ close current SSL session in order to force end-user to typein again his pin
code (i.e. a logout function
hi,
i am trying to use ssl client authentication together with apr. I have
followed the instructions contained in apr manual but no success.
When I try access server with the browser (get the prompt for user cert), i
get the error:
An error occurred during a connection to rzuem5008u.jap2.ch
Hello all,
Any comments?
Thanks,
Pavlos
Original Message
Subject:client authentication issues
Date: Tue, 03 Jun 2008 18:06:49 +0300
From: Pavlos Drandakis <[EMAIL PROTECTED]>
To: users@tomcat.apache.org
Hi all,
I have configured a stand alone tomcat
Hi all,
I have configured a stand alone tomcat server with apr support that hosts a web
application. I wanted to enable client authentication so I put in server.xml the
following:
Everything seems ok, but there are some issues ...
1) When CRL expires, Tomcat rejects every client certificate as
Hi,
I am trying to get client authentication to work with my server. I have
basically followed the Tomcat 6.0-SSL-How-TO, except I changed
clientAuth="false" to client="true".
When I have clientAuth="true", I can't access my webapp at all. The server
do
set clientAuth="want"
you still may have to do some mucking around in the realm code to be
able to do both in a prioritized order
Filip
Dave wrote:
Hi, I need some help on SSL client authentication.
If a user has digital certificate installed on his/her machine,
Hi, I need some help on SSL client authentication.
If a user has digital certificate installed on his/her machine, we like to
authenticate the user using digital certificate, otherwise using
username/password.
When I set clientAuth="true" in server.xml, open IE to the
Hi, everyone
I setup two tomcat servers. Server 1 is using client
authentication, I set the server.xml like this:
and I deployed a web service on it. when I visit the service, the
server ask me to give out the client certification. That means client
authentication worked.
Server 2 is not
"Shuwen" <[EMAIL PROTECTED]> wrote in message
news:[EMAIL PROTECTED]
> Hi,
> I would like to find out how to configure client authentication when
> enabling tomcat to run on https. From
> http://tomcat.apache.org/tomcat-5.0-doc/ssl-howto.html, it says that
>
Hi,
I would like to find out how to configure client authentication when
enabling tomcat to run on https. From
http://tomcat.apache.org/tomcat-5.0-doc/ssl-howto.html, it says that
***
For using clientAuth on a per-user or per-session basis, check out the tips
in
Has anyone got SSL working with client authentication? If so, please
help.
I have no issues with standard SSL.
Standard SSL:
keytool -genkey -alias -keystore -kayalg RSA
Answer all the questions
Edit server.xml file.
I am then away and working with SSL for self signed certificates
fundamental step or set up.
Regards,
Andrew Friebel
-Original Message-
From: Mark Thomas [mailto:[EMAIL PROTECTED]
Sent: Tuesday, 14 November 2006 12:34 PM
To: Tomcat Users List
Subject: Re: Accessing ssl pages using client authentication
Andrew Friebel wrote:
> Mark,
> Than
Andrew Friebel wrote:
> Mark,
> Thanks for your input. I have got normal SSL working, and that
> works like a charm (using both IE - doGet, and via a servlet - doPost).
Great.
> My certificates are self signed, to answer your questions:
> o I do not believe this is an issue with self si
,
Andrew Friebel
-Original Message-
From: Mark Thomas [mailto:[EMAIL PROTECTED]
Sent: Tuesday, 14 November 2006 11:05 AM
To: Tomcat Users List
Subject: Re: Accessing ssl pages using client authentication
Andrew Friebel wrote:
> I am also having trouble access the page using a browser. I extr
Andrew Friebel wrote:
> I am also having trouble access the page using a browser. I extract my
> each certificate from my certificate chain, and import them into the
> keystore on the server running tomcat. After I accept the server
> certificate (before I select my client certificate to send), t
2006 5:05 AM
To: Tomcat Users List
Subject: Re: Accessing ssl pages using client authentication
Andrew Friebel wrote:
> I think I have an issue with how my client is sending the certificate.
> I thought tomcat handled this automatically. Is my assumption
correct?
Your assumption is correct
the PC certificate into the keystore on the server. The
server tomcat instance has SSL configured in the server.xml file. My
web.xml for my application on the server has the following for client
authentication:
My Test Realm
/myURL
myrole
myrole
Andrew Friebel wrote:
> I think I have an issue with how my client is sending the certificate.
> I thought tomcat handled this automatically. Is my assumption correct?
Your assumption is correct. With SSL, as I am sure you are finding,
every bit of the configuration has to be perfect or it just d
tomcat handled this automatically. Is my assumption correct?
Regards,
Andrew Friebel
-Original Message-
From: Mark Thomas [mailto:[EMAIL PROTECTED]
Sent: Friday, 10 November 2006 11:33 AM
To: Tomcat Users List
Subject: Re: Accessing ssl pages using client authentication
Andrew Friebel
Andrew Friebel wrote:
>
> CLIENT_CERT
> My Test Realm
>
You want CLIENT-CERT here. Note the hyphen rather than the underscore.
Mark
-
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail:
When I try and access a page that is using client authentication, I get
a http 404 error (not available).
I need to try and access this page (using https) by the following
methods:
* Web Browser
* Another servlet (posting data to it).
The web.xml file for the authentication looks
Hi All,
I've got a couple of questions on using client authentication with
Tomcat.
I have multiple clients that need to communicate with a single Tomcat
server.
It would be ideal if those clients could be authenticated before data is
exchanged.
1) Does each client need a certificate signed
Hi,
I have different AXIS services running and I would like some of them to be
available only with ssl client authentication and some others only with server
authentication. I have succeded to configure Tomcat to work with ssl with
client authentication in port 8443 and in 8444 without client
n.com/public/...
and
2) a private (personalized) area which is only accessible by ssl AND
client authentication.
for example mydomain.com/private/...
Is it possible to enable/disable client authentication by directory or
by servlet using t
Dobson Paul L Contr 84 MSUG/GBMLBR <[EMAIL PROTECTED]> writes:
> Thanks for the additional insight into client authentication.
>
> The smart card and IE are set up correctly to prompt for a valid
> certificate. I know this because that is how it works when I visit
> o
Thanks for the additional insight into client authentication.
The smart card and IE are set up correctly to prompt for a valid
certificate. I know this because that is how it works when I visit other
web sites on our network that has client authentication implimented. I have
a feeling the
Dobson Paul L Contr 84 MSUG/GBMLBR <[EMAIL PROTECTED]> writes:
> I am having a tough time finding information on implementing client
> authentication. When trying to access my site, I need the user to be
> presented with a dialog box asking for a digital certificate. The
> ce
I am having a tough time finding information on implementing client
authentication. When trying to access my site, I need the user to be
presented with a dialog box asking for a digital certificate. The
certificate needs to be validated then bounced against a list of revoked
certificates, If it
94 matches
Mail list logo