When you first install the Enterprise Server, the providers XWS_ClientProvider and XWS_ServerProvider are configured but disabled. You can enable them in one of the following ways:
To enable the message security providers using the Administration Console, open the Security component under the relevant configuration, select the Message Security component, and select SOAP. Then select XWS_ServerProvider from the Default Provider list and XWS_ClientProvider from the Default Client Provider list. For details, click the Help button in the Administration Console.
You can enable the message security providers using the following commands.
asadmin set server-config.security-service.message-security-config.SOAP.default_provider=XWS_ServerProvider asadmin set server-config.security-service.message-security-config.SOAP.default_client_provider=XWS_ClientProvider |
For more information about the asadmin set command, see the Sun GlassFish Enterprise Server v3 Reference Manual.
The example described in Understanding and Running the Sample Application uses the ClientProvider and ServerProvider providers, which are enabled when the Ant targets are run. You don’t need to enable these on the Enterprise Server prior to running the example.
If you install the Access Manager, you have these additional provider choices:
AMClientProvider and AMServerProvider – These providers secure web services and Simple Object Access Protocol (SOAP) messages using either WS-I BSP or Liberty ID-WSF tokens. These providers are used automatically if they are configured as the default providers. If you wish to override any provider settings, you can configure these providers in message-security-binding elements in the sun-web.xml, sun-ejb-jar.xml, and sun-application-client.xml deployment descriptor files.
AMHttpProvider – This provider handles the initial end user authentication for securing web services using Liberty ID-WSF tokens and redirects requests to the Access Manager for single sign-on. To use this provider, specify it in the httpservlet-security-provider attribute of the sun-web-app element in the sun-web.xml file.
Liberty specifications can be viewed at http://www.projectliberty.org/resources/specifications.php. The WS-I BSP specification can be viewed at http://www.ws-i.org/Profiles/BasicSecurityProfile-1.0.html.
For more information about the Sun-specific deployment descriptor files, see the Sun GlassFish Enterprise Server v3 Application Deployment Guide.
For information about configuring these providers in the Enterprise Server, see Chapter 13, Administering Message Security, in Sun GlassFish Enterprise Server v3 Administration Guide. For additional information about overriding provider settings, see Application-Specific Message Protection.
You can create new message security providers in one of the following ways:
To create a message security provider using the Administration Console, open the Security component under the relevant configuration, and select the Message Security component. For details, click the Help button in the Administration Console.
You can use the asadmin create-message-security-provider command to create a message security provider. For details, see the Sun GlassFish Enterprise Server v3 Reference Manual.
In addition, you can set a few optional provider properties using the asadmin set command. For example:
asadmin set server-config.security-service.message-security-config.provider-config.property.debug=true |
The following table describes these message security provider properties.
Table 5–2 Message Security Provider Properties
Property |
Default |
Description |
---|---|---|
domain-dir/config/wss-server-config-1.0.xml |
Specifies the location of the message security configuration file. To point to a configuration file in the domain-dir/config directory, use the system property ${com.sun.aas.instanceRoot}/config/, for example: ${com.sun.aas.instanceRoot}/config/wss-server-config-1.0.xml See System Properties. |
|
false |
If true, enables dumping of server provider debug messages to the server log. |
|
false |
If true, signals the provider runtime to collect the user name and password from the CallbackHandler for each request. If false, the user name and password for wsse:UsernameToken(s) is collected once, during module initialization. This property is only applicable for a ClientAuthModule. |
|
s1as |
Specifies the encryption key used by the provider. The key is identified by its keystore alias. |
|
s1as |
Specifies the signature key used by the provider. The key is identified by its keystore alias. |