Binding XML Names to Java Identifiers
Java Representation of XML Schema
Configuring and Running the Samples
About the Schema-to-Java Bindings
Does XWS-Security Implement Any Specifications?
On Which Technologies Is XWS-Security Based?
What is the XWS-Security Framework?
Configuring Security Configuration Files
Understanding Security Configuration Files
XWS-Security Configuration File Schema
Semantics of Security Configuration File Elements
How Do I Specify the Security Configuration for the Build Files?
Are There Any Sample Applications Demonstrating XWS-Security?
Setting Up To Use XWS-Security With the Sample Applications
Setting Up the Application Server For the Examples
Keystore and Truststore Files with XWS-Security
Understanding and Running the Simple Sample Application
Plugging in Security Configurations
Sample Security Configuration File Options
Running the Simple Sample Application
Understanding and Running the JAAS-Sample Application
Understanding JAAS-Sample Security Configuration Files
Setting Up For the JAAS-Sample
Running the JAAS-Sample Application
Writing SecurityEnvironmentHandlers for XWS-Security Applications
Useful XWS-Security Command-Line Tools
Troubleshooting XWS-Security Applications
How XWS-Security and XML Digital Signature API Are Related
Introduction to XML Signatures
XML Digital Signature API Examples
Changing the Port for the Registry Server
Adding a New User to the Registry
Deleting a User from the Registry
Adding Services to an Organization
Adding Service Bindings to a Service
Adding and Removing Classifications