What's New in Oracle Security Developer Tools?

This preface introduces the new and changed features of Oracle Security Developer Tools.

Topics in this section include:

Updates in September 2014 Documentation Refresh for 12c (12.1.3)

This edition of Developing Applications with Oracle Security Developer Tools contains usability enhancements and editorial corrections.

New Features in 11g Release 1 (11.1.1.7.0)

New Java API references have been published for all the tools.

New Features in 11g Release 1 (11.1.1.6.0)

11g Release 1 Patch Set 5 provides these features:

  • JWT toolkit

    For details, see Chapter 13, "Oracle JSON Web Token".

This document contains the following updates:

  • Graphics have been revised.

  • Documentation errata have been corrected.

New Features for Release 11g (11.1.1)

The new features of Oracle Security Developer Tools include the following:

  • All higher level toolkits now take JCE keys and certificates as parameters instead of Oracle crypto keys and certificates.

    This lets you use any JCE provider, in particular a hardware-based JCE provider.

    Note:

    Due to this change, the 11g Release 1 APIs are not compatible with pre-11g. Your existing code will need to be changed to compile with 11g Oracle Security Developer Tools.
  • Support for Web Services Security 1.1. This includes:

    • implementation of Kerberos and SAML 2.0 profiles

    • WS-i BSP conformance

  • Upper layers of the toolkit hierarchy that called the Oracle Security Engine now call the new JCE Provider for cryptographic functions

    Figure 1–2 depicts the relationships between tools in the toolkit.

Oracle SAML Changes

Oracle Fusion Middleware 11g contains updates to most classes in the SAML2 library. The fixes fall into a few broad categories:

Schema Errors

These include issues such as incorrectly spelled XML element or attribute names, incorrect namespace URIs, or incorrect ordering of child elements.

Extraneous Namespace Declarations

Many classes were outputting both a default declaration and a prefix-bound declaration for the same namespace. This causes issues for some XML parsers and SOAP implementations, which can cause XML signature verification errors in some 3rd-party SAML software.

The fixes remove the extra default namespace declarations, leaving only the prefix-bound declarations.

Missing Namespace Declarations

Some of the SAML classes needed to have a namespace prefix declared.

Extraneous xsi:type Declarations

Many classes had both a concrete XML element type name and an xsi:type declaration. This is redundant and confusing; only extension XML types should declare the xsi:type of the element.

Incomplete Support for Boolean Types

Some classes that implement XML elements with attribute of type xsd:boolean recognized only the values "true" and "false", while the values "1" and "0" should also be allowed.