Download
PDF
Home
History
PrevBeginningNext API
Search
Feedback
FAQ
Divider

XML and Web Services Security

XML and Web services security can include transport-level security and message-level security. This section discusses transport-level security. Information about using message-level security may be included in future releases of The J2EE Tutorial.

Transport-level security is security addressed by the transport layer. Adding security in this way is discussed in the following example sections:

Authentication verifies the identity of a user, device, or other entity in a computer system, usually as a prerequisite to allowing access to resources in a system. There are several ways in which this can happen. The following ways are discussed in this section:

One approach is that a user authentication method can be defined for an application in its deployment descriptor. When a user authentication method is specified for an application, the Web container activates the specified authentication mechanism when you attempt to access a protected resource. The options for user authentication methods are discussed in Understanding Login Authentication. The example application discussed in Example: Basic Authentication with JAX-RPC shows how to add basic authentication to a JAX-RPC application. The example discussed in Example: Client-Certificate Authentication over HTTP/SSL with JAX-RPC shows how to add client-certificate, or mutual, authentication to a JAX-RPC application.

A second approach is that a transport guarantee can be defined for an application in its deployment descriptor. Use this method to run over an SSL-protected session and ensure that all message content is protected for confidentiality. The options for transport guarantees are discussed in Specifying a Secure Connection. For an example application that demonstrates running over an SSL-protected session, see Example: Client-Certificate Authentication over HTTP/SSL with JAX-RPC.

When running over an SSL-protected session, the server and client can authenticate one another and negotiate an encryption algorithm and cryptographic keys before the application protocol transmits or receives its first byte of data.

SSL technology allows Web browsers and Web servers to communicate over a secure connection. In this secure connection, the data is encrypted before being sent, and then is decrypted upon receipt and before processing. Both the browser and the server encrypt all traffic before sending any data. For more information, see What Is Secure Socket Layer Technology?.

Digital certificates are necessary when running HTTP over SSL (HTTPS). The HTTPS service of most Web servers will not run unless a digital certificate has been installed. Digital certificates have already been created for the Application Server.

Example: Basic Authentication with JAX-RPC

In this section, we discuss how to configure JAX-RPC-based Web service applications for HTTP basic authentication. With HTTP basic authentication, the Web server authenticates a user by using the user name and password obtained from the Web client. If the topic of authentication is new to you, please refer to the section titled Understanding Login Authentication. For an explanation of how basic authentication works, see Figure 32-2.

For this tutorial, we begin with the example application in <INSTALL>/j2eetutorial14/examples/jaxrpc/staticstub/ and <INSTALL>/j2eetutorial14/examples/jaxrpc/helloservice/ and add user name and password authentication. The resulting application can be found in the directories <INSTALL>/j2eetutorial14/examples/security/basicauth/ and <INSTALL>/j2eetutorial14/examples/security/basicauthclient/.

In general, the following steps are necessary to add basic authentication to a JAX-RPC application. In the example application included with this tutorial, many of these steps have been completed for you and are listed here to show what needs to be done should you wish to create a similar application.

  1. Add the appropriate security elements using deploytool. For this example, the security elements are added in the packaging and deployment phase. Refer to Adding Basic Authentication Using deploytool for more information.
  2. If the default port value is changed from 8080, see Setting the Port for information on updating the example files to reflect this change. The WAR files mentioned in this tutorial will not work if the port has been changed.
  3. Edit the <INSTALL>/j2eetutorial14/examples/common/build.properties file. The build.properties file needs to be modified because the properties in this file are specific to your installation. See Building the Examples for information on which properties need to be set.
  4. Set security properties in the client code. For the example application, this step has been completed. The code for this example is shown in Setting Security Properties in the Client Code.
  5. Build, package, deploy, and run the Web service. You will use the asant tool to compile the client and service, and deploytool to package and deploy the service. Instructions for this example can be found in Building, Packaging, Deploying, and Running the Example for Basic Authentication.

Setting Security Properties in the Client Code

The source code for the client is in the HelloClient.java file of the <INSTALL>/j2eetutorial14/examples/security/basicauthclient/src/ directory. For basic authentication, the client code must set username and password properties. The username and password properties correspond to the admin group (which includes the user name and password combination entered during installation) and the role of admin, which is provided in the application deployment descriptor as an authorized role for secure transactions. (See Setting Up Security Roles.)

The client sets the aforementioned security properties as shown in the following code. The code in bold is the code that has been added from the original version of the jaxrpc/staticstub example application.

package basicauthclient;

import javax.xml.rpc.Stub;

public class HelloClient {

    public static void main(String[] args) {
    
        if (args.length !=3) {
          System.out.println("HelloClient Error: Wrong 
           number of runtime arguments!");
          System.exit(1);
        }
        
        String username=args[0];
        String password=args[1];
        String endpointAddress=args[2];

      // print to display for verification purposes
        System.out.println("username: " + username);
        System.out.println("password: " + password);
        System.out.println("Endpoint address = " +
           endpointAddress); 


    try {
      Stub stub = createProxy();
        stub._setProperty(
          javax.xml.rpc.Stub.USERNAME_PROPERTY,
            username);
        stub._setProperty(
          javax.xml.rpc.Stub.PASSWORD_PROPERTY,
            password);
        stub._setProperty
          (javax.xml.rpc.Stub.ENDPOINT_ADDRESS_PROPERTY,
          endpointAddress);

      HelloIF hello = (HelloIF)stub;
      System.out.println(hello.sayHello("Duke (secure)"));
        } catch (Exception ex) {
            ex.printStackTrace();
        }
    }    

    private static Stub createProxy() {
        // Note: MyHelloService_Impl is implementation-specific.
        return (Stub)(new
          MyHelloService_Impl().getHelloIFPort());
    }
} 

Building, Packaging, Deploying, and Running the Example for Basic Authentication

To build, package, deploy, and run the security/basicauth example using basic authentication, follow these steps.

Building the Basic Authentication Service
  1. Set up your system for running the tutorial examples if you haven't done so already by following the instructions in Building the Examples.
  2. From a terminal window or command prompt, go to the <INSTALL>/j2eetutorial14/examples/security/basicauth/ directory.
  3. Build the JAX-RPC service by entering the following at the terminal window or command prompt in the basicauth/ directory (this and the following steps that use asant assume that you have the executable for asant in your path; if not, you will need to provide the fully qualified path to the executable). This command runs the target named build in the build.xml file.
  4. asant build

Packaging the Basic Authentication Service

You can package the basic authentication example using asant or deploytool, or you can just open the WAR file located in the <INSTALL>/j2eetutorial14/examples/security/provided-wars/basicauth.war file. This section shows the steps you use to package the JAX-RPC service. More detail on packaging JAX-RPC services can be found in Packaging and Deploying the Service.

To package the example using asant, run the following command:

asant create-war 

To package the example using deploytool, follow these steps:

  1. Start the Application Server if you haven't already done so. Instructions for starting the Application Server can be found in Starting and Stopping the Application Server.
  2. Start deploytool if you haven't already done so. Information on starting deploytool can be found in Starting the deploytool Utility.
  3. Select FileRight ArrowNewRight ArrowWeb Component from the deploytool menu. The wizard displays the following dialog boxes.
    1. Introduction dialog box
      1. Read the explanatory text for an overview of the wizard's features.
      2. Click Next.
    2. WAR File dialog box
      1. Select the button labeled Create New Stand-Alone WAR Module.
      2. In the WAR Location field, enter <INSTALL>/j2eetutorial14/examples/security/basicauth/BasicAuth.war.
      3. In the WAR Display Field, enter BasicAuth.
      4. In the Context Root field, enter /basicauth-jaxrpc.
      5. Click Edit Contents.
      6. From the Starting Directory list, select the <INSTALL>/j2eetutorial14/examples/security/basicauth/ directory.
      7. Select the build/ subdirectory.
      8. Click Add.
      9. Click OK.
      10. Click Next.
    3. Choose Component Type dialog box
      1. Select the Web Services Endpoint button.
      2. Click Next.
    4. Choose Service dialog box
      1. In the WSDL File combo box, select WEB-INF/wsdl/MyBasicHelloService.wsdl.
      2. In the Mapping File combo box, select build/mapping.xml.
      3. Click Next.
    5. Component General Properties dialog box
      1. In the Service Endpoint Implementation combo box, select basicauth.HelloImpl.
      2. Click Next.
    6. Web Service Endpoint dialog box
      1. In the Service Endpoint Interface combo box, select basicauth.HelloIF.
      2. In the Namespace field, select urn:Foo.
      3. In the Local Part field, select HelloIFPort. The deploytool utility will enter a default endpoint address URI in this dialog box. It must be updated later in this section.
      4. Click Next.
      5. Click Finish.
      6. To access MyHelloService, the tutorial clients will specify this service endpoint address URI:

        http://localhost:8080/basicauth-jaxrpc/hello

        The /basicauth-jaxrpc string is the context root of the servlet that implements MySecureHelloService. The /hello string is the servlet alias.

  4. Specify the endpoint address as follows:
    1. In deploytool, select HelloImpl.
    2. Select the Aliases tab.
    3. In the Component Aliases table, add /hello. (Don't forget the forward slash.)
    4. On the Endpoint tab, select hello for the endpoint address in the Sun-specific Settings frame.
    5. Select FileRight ArrowSave.
Adding Basic Authentication Using deploytool

For HTTP basic authentication, the application deployment descriptor, web.xml, includes the information on who is authorized to access the application, which URL patterns and HTTP methods are protected, and what type of user authentication method this application uses. This information is added to the deployment descriptor using deploytool. Its contents are discussed in more detail in Web-Tier Security and in the Java Servlet specification, which can be browsed or downloaded online at http://java.sun.com/products/servlet/.

  1. Select the basic authentication example, BasicAuth, in the deploytool tree.
  2. Select the Security tabbed pane.
  3. Select Basic in the User Authentication Method field.
  4. Select Add Constraints to add a security constraint.
  5. Select Add Collection to add a Web resource collection.
  6. Select the Web resource collection from the list, and then select Edit Collections.
  7. Select Add URL Pattern. Enter /hello in the text field. Click OK.
  8. Select the HTTP GET and POST methods.
  9. Click OK to close the Edit Contents dialog box.
  10. Select Edit Roles on the Security tabbed pane to specify an authorized role for this application.
  11. Click Edit Roles in the Authorized Roles dialog box to add an authorized user to this application. Click Add in the Edit Roles dialog box and add the Name of admin. Click OK to close this dialog box.
  12. Select admin under the Roles In field, and then click Add to add it to the list of authorized roles for this application. Click OK to close the dialog box.

Note that the Authorized Roles list specifies admin, a group that was specified during installation. To map this role to a user, follow these steps.

  1. Select the General tabbed pane.
  2. Click the Sun-specific Settings button.
  3. In the Sun-specific Settings dialog box, select User to Role Mappings from the View list.
  4. Select admin from the list of roles.
  5. Click the Edit button under the Users box.
  6. Select admin from the Available Users list, and then click the Add button to map the role of admin (defined for the application) to the user named admin (defined for the Application Server). Click OK.

Note: If you don't see the list of users or groups that you defined using the Admin Console, connect to the Admin Server by double-clicking localhost:4848 in the deploytool tree and entering your admin user name and password. If this is not the current target server, change to this server by selecting it and then selecting FileRight ArrowSet Current Target Server.


  1. Click Close to return to the General tabbed pane.
  2. Select Save from the File menu to save these settings.
Deploying the Basic Authentication Service

To deploy the example using asant, run the following command:

asant deploy-war 

To deploy the example using deploytool, follow these steps:

  1. Select the BasicAuth application in the deploytool tree. Then select ToolsRight ArrowDeploy.
  2. Make sure the server is correct, localhost:4848 by default.
  3. Enter your admin user name and password.
  4. Click OK.
  5. Click the Close button after the messages indicating successful completion are finished.
Building and Running the Basic Authentication Client

To build the JAX-RPC client, do the following:

  1. Enter the following command at the terminal window or command prompt in the basicauthclient/ directory:
  2. asant build

  3. Run the JAX-RPC client by entering the following at the terminal window or command prompt in the basicauthclient/ directory:
  4. asant run

The client should display the following output:

Buildfile: build.xml

run-secure-client:
   [java] username: your_name
   [java] password: your_pwd
   [java] Endpoint address = http://localhost:8080/basicauth-
jaxrpc/hello
   [java] Hello Duke (secure)

BUILD SUCCESSFUL 

Example: Client-Certificate Authentication over HTTP/SSL with JAX-RPC

In this section, we discuss how to configure a simple JAX-RPC-based Web service application for client-certificate authentication over HTTP/SSL. Client-certificate authentication uses HTTP over SSL, in which the server and, optionally, the client authenticate one another using public key certificates. If the topic of authentication is new to you, please refer to the section titled Understanding Login Authentication. For more information on how client-certificate authentication works, see Figure 32-4.

This example application starts with the example application in <INSTALL>/j2eetutorial14/examples/jaxrpc/helloservice/ and adds both client and server authentication to the example. In SSL certificate-based basic authentication, the server presents its certificate to the client, and the client authenticates itself to the server by sending its user name and password. This type of authentication is sometimes called server authentication. Mutual authentication adds the dimension of client authentication. For mutual authentication, we need both the client's identity, as contained in a client certificate, and the server's identity, as contained in a server certificate inside a keystore file (keystore.jks). We also need both of these identities to be contained in a mutual trust-store (cacerts.jks) where they can be verified.

To add mutual authentication to the <INSTALL>/j2eetutorial14/examples/jaxrpc/helloservice/ example, complete the following steps. In the example application included with this tutorial, many of these steps have been completed for you and are listed here to show what needs to be done should you wish to create a similar application.

  1. Create the appropriate certificates and keystores. For this example, the certificates and keystores are created for the server as a generic localhost and are included with the Application Server. See the section Keystores and Trust-Stores in the Mutual Authentication Example for a discussion of how to create the client certificates for this example.
  2. If the port value is changed from the default of localhost:8080, see Setting the Port for information on updating the example files to reflect this change. The WAR files mentioned in this tutorial will not work if the port has been changed.
  3. Edit the build.properties files to add the location and password to the trust-store, and other properties, as appropriate. For a discussion of the modifications that need to be made to build.properties, see Modifying the Build Properties.
  4. Set security properties in the client code. For the example application, this step has been completed. For a discussion of the security properties that have been set in HelloClient, see Setting Security Properties in the Client Code.
  5. Add the appropriate security elements using deploytool. The security elements are discussed in the section Enabling Client-Certificate Authentication for the Mutual Authentication Example.
  6. Build, package, and deploy the service, deploy the server, and then build and run the client (see Building, Packaging, Deploying, and Running the Mutual Authentication Example). You will use the asant tool to compile the client and service and to run the client. You will use deploytool to package and deploy the service.

Keystores and Trust-Stores in the Mutual Authentication Example

In this example, the keystore file (keystore.jks) and the trust-store file (cacerts.jks) have been created for the server as a generic localhost and are included with the Application Server in the directory <J2EE_HOME>/domains/domain1/config/. You must follow the instructions in Creating a Client Certificate for Mutual Authentication to create a client certificate and add it to the existing trust-store. You must create the client certificates in the directory <J2EE_HOME>/domains/domain1/config/, and you must restart the Application Server for the client certificate to be accessed by the application.

Modifying the Build Properties

To build and run the application with mutual authentication, we have set up the example so that some of the values are passed to the application from various build.properties files.

To run any of the examples, you must modify the build.properties file located in the <INSTALL>/j2eetutorial14/examples/common/ directory to provide your admin password and the location where the Application Server is installed. If you need more information, see Building the Examples.

For this example, the build.properties file that is specific to this application, <INSTALL>/j2eetutorial14/examples/security/common/build.properties, has been modified for you. This file provides specific information about the JAX-RPC examples to the asant targets we will be running later. This information concerns the location of the keystore and trust-store files and their associated passwords.

Make sure that the following properties exist and are correctly defined.

trust.store=${j2ee.home}/domains/domain1/config/cacerts.jks 
trust.store.password=changeit
key.store=${j2ee.home}/domains/domain1/config/keystore.jks
key.store.password=changeit 

Setting Security Properties in the Client Code

The source code for the client is in the HelloClient.java file of the <INSTALL>/j2eetutorial14/examples/security/mutualauthclient/src/ directory. For mutual authentication, the client code must set several security-related properties. These values are passed into the client code when the asant build and run tasks are executed.

The client sets the aforementioned security properties as shown in the following code. The code in bold is the code that has been added from the original version of the jaxrpc/staticstub example application.

package mutualauthclient;

import javax.xml.rpc.Stub;

public class HelloClient {

    public static void main(String[] args) {
    
        if (args.length !=5) {
          System.out.println("HelloClient Error: Need 5
        runtime arguments!");
          System.exit(1);
        }
        
        String keyStore=args[0];
        String keyStorePassword=args[1];
        String trustStore=args[2];
        String trustStorePassword=args[3];
        String endpointAddress=args[4];


      // print to display for verification purposes
        System.out.println("keystore: " + keyStore);
        System.out.println("keystorePassword: " +
        keyStorePassword);
        System.out.println("trustStore: " + trustStore);
        System.out.println("trustStorePassword: " +
        trustStorePassword);
        System.out.println("Endpoint address: " +
        endpointAddress);

    try {
      Stub stub = createProxy();
      System.setProperty("javax.net.ssl.keyStore",
        keyStore);
      System.setProperty("javax.net.ssl.keyStorePassword",
        keyStorePassword);
      System.setProperty("javax.net.ssl.trustStore",
        trustStore);
      System.setProperty("javax.net.ssl.trustStorePassword",
        trustStorePassword);
      stub._setProperty(
          javax.xml.rpc.Stub.ENDPOINT_ADDRESS_PROPERTY,
            endpointAddress);

      HelloIF hello = (HelloIF)stub;
      System.out.println(hello.sayHello("Duke! (        secure!"));
        } catch (Exception ex) {
            ex.printStackTrace();
        }
    }    

    private static Stub createProxy() {
        // Note: MyHelloService_Impl is implementation-specific.
        return (Stub)(new
          MySecureHelloService_Impl().getHelloIFPort());
    }
} 

Enabling Client-Certificate Authentication for the Mutual Authentication Example

The two ways of implementing client authentication are discussed in Enabling Mutual Authentication over SSL. You can set client authentication for all applications (by specifying this in the deployment descriptor for the server) or for only a single application (by specifying this in the deployment descriptor for the application). For this example, we are enabling client authentication for this application only, so we specify the login authentication method as being Client Certificate. The steps for adding client-certificate authentication are shown in Adding Client-Certificate Authentication Using deploytool.

For more information on login configuration options, read Understanding Login Authentication.

The user authentication method specifies a client-certificate method of authentication in this example. For this authentication to run over SSL, you must also specify which type of transport guarantee to use. For this example, we have chosen CONFIDENTIAL, which is specified in the Network Security Requirement field on the Security tabbed pane in deploytool.

For more information on this type of constraint, read Specifying a Secure Connection.

Building, Packaging, Deploying, and Running the Mutual Authentication Example

To build, deploy, and run the JAX-RPC service example with mutual authentication, follow these steps.

Building the Mutual Authentication Example

To compile the application files and copy them to the correct directories, run the asant build task. More information on what happens when the build task is called can be found in Building the Service.

  1. If you haven't already done so, follow these steps for setting up the example.
  2. Go to the <INSTALL>/j2eetutorial14/examples/security/mutualauth/ directory.
  3. Build the JAX-RPC service by entering the following at the terminal window or command prompt in the mutualauth/ directory (this and the following steps that use asant assume that you have the executable for asant in your path; if not, you will need to provide the fully qualified path to the asant executable):
  4.   asant build

  5. Change to the directory <INSTALL>/j2eetutorial14/examples/security/mutualauthclient/.
  6. Build the JAX-RPC client by entering the following at the terminal window or command prompt:
  7.   asant build

Packaging the Mutual Authentication Example

You can package the mutual authentication example using asant or deploytool, or you can open the WAR file located in the <INSTALL>/j2eetutorial14/examples/security/provided-wars/mutualauth.war file. This section shows the steps you use to package the JAX-RPC service.

To package the example using asant, run the following command:

asant create-war 

To package the example using deploytool, follow these steps:

  1. Start deploytool if you haven't already done so.
  2. Select FileRight ArrowNewRight ArrowWeb Component from the deploytool menu. The wizard displays the following dialog boxes.
    1. Introduction dialog box
      1. Read the explanatory text for an overview of the wizard's features.
      2. Click Next.
    2. WAR File dialog box
      1. Select the button labeled Create New Stand-Alone WAR Module.
      2. In the WAR Location field, enter <INSTALL>/j2eetutorial14/examples/security/mutualauth/MutualAuth.war.
      3. In the WAR Display field, enter MutualAuth.
      4. In the Context Root field, enter /mutualauth-jaxrpc.
      5. Click Edit.
      6. In the tree under Available Files, locate the <INSTALL>/j2eetutorial14/examples/security/mutualauth/ directory.
      7. Select the build/ subdirectory.
      8. Click Add.
      9. Click OK.
      10. Click Next.
    3. Choose Component Type dialog box
      1. Select the Web Services Endpoint button.
      2. Click Next.
    4. Choose Service dialog box
      1. In the WSDL File combo box, select WEB-INF/wsdl/MySecureHelloService.wsdl.
      2. In the Mapping File combo box, select build/mapping.xml.
      3. Click Next.
    5. Component General Properties dialog box
      1. In the Service Endpoint Implementation combo box, select mutualauth.HelloImpl.
      2. Click Next.
    6. Web Service Endpoint dialog box
      1. In the Service Endpoint Interface combo box, select mutualauth.HelloIF.
      2. In the Namespace field, select urn:Foo.
      3. In the Local Part field, select HelloIFPort.
      4. The deploytool utility will enter a default endpoint address URI in this dialog box. It must be updated later in this section. Click Next.
      5. Click Finish.
      6. To access MyHelloService, the tutorial clients will specify this service endpoint address URI:

        http://localhost:8080/mutualauth-jaxrpc/hello

        The /mutualauth-jaxrpc string is the context root of the servlet that implements MySecureHelloService. The /hello string is the servlet alias.

  3. Specify the endpoint address as follows:
    1. In deploytool, select HelloImpl.
    2. Select the Aliases tab.
    3. In the Component Aliases table, add /hello. (Don't forget the forward slash.)
    4. On the Endpoint tab, select hello for the endpoint address in the Sun-specific Settings frame.
    5. Select FileRight ArrowSave.
Adding Client-Certificate Authentication Using deploytool

For HTTP client-certificate authentication, the application deployment descriptor, web.xml, includes the information on who is authorized to access the application, which URL patterns and HTTP methods are protected, and what type of user authentication method this application uses. This information is added to the deployment descriptor using deploytool, and its contents are discussed in more detail in Web-Tier Security and in the Java Servlet specification, which can be browsed or downloaded online at http://java.sun.com/products/servlet/.

  1. Select the MutualAuth example in the deploytool tree.
  2. Select the Security tabbed pane.
  3. Select Client Certificate in the User Authentication Method field.
  4. Select Add Constraints to add a security constraint.
  5. Select Add Collection to add a Web resource collection.
  6. Select the Web resource collection from the list, and then select Edit Collections.
  7. Select Add URL Pattern. Enter /hello in the text field. Click OK.
  8. Select the HTTP GET and POST methods.
  9. Click OK to close the Edit Contents dialog box.
  10. Select CONFIDENTIAL under Network Security Requirement so that the application requires HTTP/SSL.
  11. Select Save from the File menu to save these settings.
Deploying the Mutual Authentication Example
  1. Deploy the JAX-RPC service by selecting the mutualauth example in the deploytool tree. Then select ToolsRight ArrowDeploy.
  2. Make sure the server is correct. By default, this will be localhost:4848.
  3. Enter your admin user name and password.
  4. Click OK.
  5. Click the Close button after the messages indicating successful completion are finished.
Running the Mutual Authentication Example

Enter the following command from the mutualauthclient/ directory at the terminal window or command prompt to run the JAX-RPC client:

   asant run 

The client should display the following output:

Buildfile: build.xml

run-mutualauth-client:
    [java] keyStore: <J2EE_HOME>/domains/domain1/config/
cacerts.jks 
    [java] keyStorePassword: changeit
    [java] trustStore: <J2EE_HOME>/domains/domain1/config/
keystore.jks 
    [java] trustStorePassword: changeit
    [java] endpointAddress = https://localhost:1043/secure-
mutualauth/hello
    [java] Hello Duke (secure)

BUILD SUCCESSFUL 

For information on verifying that mutual authentication is running, see Verifying That Mutual Authentication Is Running.

Divider
Download
PDF
Home
History
PrevBeginningNext API
Search
Feedback

FAQ
Divider

All of the material in The J2EE(TM) 1.4 Tutorial is copyright-protected and may not be published in other works without express written permission from Sun Microsystems.