Verify that the module mod_headers is loaded. Set the VIRTUAL_HOST_TYPE header name in the RequestHeader. Valid values
11-72 Oracle Fusion Middleware Security and Administrators Guide for Web Services
d orawsp:category = security
orawsp:local-optimization = off orasp:sts-trust-config
orawsp:Silent = true orawsp:Enforced = true
orawsp:name = STS Trust Configuration orawsp:category = securitysts-config
orasp:wsdl-uri = http:host:portsts?wsdl orasp:port-uri = http:host:portsts-service
orasp:soap-version=12 orawsp:bindings
orawsp:Config orawsp:name = StsTrustConfig orawsp:configType = declarative
orawsp:PropertySet orawsp:name=standard-security-properties orawsp:Property orawsp:name=role orawsp:type=string
orawsp:contentType=constant orawsp:ValueultimateReceiverorawsp:Value
orawsp:Property orawsp:PropertySet
orawsp:Config orawsp:bindings
orasp:sts-trust-config wsp:Policy
Settings You Can Change
You can change the settings shown in Table C–75
.
Properties You Can Configure
You can configure the properties shown in Table C–76
.
How to Set Up the Web Service
See Setting Up Automatic Policy Configuration for STS
on page 10-69 for the steps to follow.
oraclests_trust_config_client_policy
Use this policy to specify the STS client configuration information that is used to invoke the STS for token exchange.
Use this policy only if you are not using Automatic Client STS Policy Configuration, as described in
Setting Up Automatic Policy Configuration for STS on page 10-69
If you attach multiple instances of oraclests_trust_config_client_policy, no error is generated. However, only one instance is enforced, and you cannot control
which instance that is.
This policy contains the following assertion template: oraclests_trust_config_ template. See
oraclests_trust_config_client_template on page C-77 for more
information about the assertion.
Policy Assertion
The oraclests_trust_config_client_policy policy assertion is as follows: ?xml version = 1.0 encoding = UTF-8?
wsp:Policy
Configuring Policies 11-73
xmlns:oralgp = http:schemas.oracle.comws200601loggingpolicy xmlns:orasp = http:schemas.oracle.comws200601securitypolicy
orawsp:description = i18n:oracle.wsm.resources.policydescription.PolicyDescriptionBundle_oraclests_
trust_config_client_policy_PolyDescKey orawsp:displayName =
i18n:oracle.wsm.resources.policydescription.PolicyDescriptionBundle_oraclests_ trust_config_client_policy_PolyDispNameKey
wsu:Id = sts_trust_config_client_policy orawsp:attachTo = binding.client
orawsp:status = enabled xmlns:orawsp = http:schemas.oracle.comws200601policy
Name = oraclests_trust_config_client_policy xmlns:wsp = http:schemas.xmlsoap.orgws200409policy
xmlns:wsu = http:docs.oasis-open.orgwss200401oasis-200401-wss-wssecurity-utility-1.0.xs
d orawsp:category = security
orawsp:local-optimization = off orasp:sts-trust-config
orawsp:Silent = true orawsp:Enforced = true
orawsp:name = STS Trust Configuration orawsp:category = securitysts-config
orasp:wsdl-uri = http:host:portsts?wsdl orasp:port-uri = http:host:portsts-service
orasp:port-endpoint=target-namespacewsdl.endpointservice-nameport-name
orasp:policy-reference-uri=oraclepolicy-name orasp:soap-version=12
orasp:sts-keystore-recipient-alias=sts-csf-key orawsp:bindings
orawsp:Config orawsp:name = StsTrustConfig orawsp:configType = declarative
orawsp:PropertySet orawsp:name=standard-security-properties orawsp:Property orawsp:name=role orawsp:type=string
orawsp:contentType=constant orawsp:ValueultimateReceiverorawsp:Value
orawsp:Property orawsp:PropertySet
orawsp:Config orawsp:bindings
orasp:sts-trust-config wsp:Policy
Settings You Can Change
You can change the settings shown in Table C–73
.
Properties You Can Configure
You can configure the properties shown in Table C–74
.
How to Set Up the Web Service Client
You are encouraged to configure the STS config policy from the Web service, as described in
Setting Up Automatic Policy Configuration for STS on page 10-69.
However, if you did not configure the STS config policy from the Web service, or if you are using the SAML sender vouches confirmation method, you must then
configure it from the Web service client. See Manually Configuring the STS Config
11-74 Oracle Fusion Middleware Security and Administrators Guide for Web Services
Policy From the Web Service Client: Main Steps on page 10-72 for information on how
to set up the Web service client.
How to Set Up the Web Service Client at Design Time
You are encouraged to configure the STS config policy from the Web service, as described in
Setting Up Automatic Policy Configuration for STS on page 10-69.
However, if you did not configure the STS config policy from the Web service, or if you are using the SAML sender vouches confirmation method, you must then
configure it from the Web service client as described in this section.
See Manually Configuring the STS Config Policy From the Web Service Client: Main
Steps on page 10-72 for additional information on how to set up the Web service
client. You can set up and attach the oraclests_trust_config_client_policy
policy programmatically, as shown in Example 11–6
and Example 11–7
.
Example 11–6 Sample JSE Proxy Client
URL endpointUrl = new URLgetWebConnectionString + jaxws-test-servicejaxws-test-port;
ServiceDelegateImpl client = new ServiceDelegateImpl new URLendpointUrl.toString + ?WSDL,
new QNamehttp:jaxws.oracle.comtargetNamespaceJaxwsService, JaxwsService,
OracleService.class; JaxwsService port = client.getPort
new QNamehttp:jaxws.oracle.comtargetNamespaceJaxwsService, JaxwsServicePort,
test.jaxws.client.JaxwsService.class; BindingProviderport.getRequestContext.putBindingProvider.ENDPOINT_ADDRESS_
PROPERTY,endpointUrl.toExternalForm; BindingProviderport.getRequestContext.putClientConstants.CLIENT_CONFIG,
fileToElementnew File.jaxwsclientdatoracle-webservice-client.xml;
The related oracle-webservice-client.xml file with the STS config policy and STS issue policy is shown in
Example 11–7 .
Example 11–7 Sample oracle-webservice-client.xml
?xml version=1.0 encoding=UTF-8? oracle-webservice-clients
webservice-client port-info
policy-references policy-reference uri=oraclests_trust_config_client_policy
category=security policy-reference uri=oraclewss11_sts_issue_saml_hok_with_
message_protection_client_policy category=security
Configuring Policies 11-75
policy-references port-info
webservice-client oracle-webservice-clients
How to Set Up the Web Service
See Setting Up Automatic Policy Configuration for STS
on page 10-69 for the steps to follow.
oraclewss_sts_issued_saml_bearer_token_over_ssl_client_policy
This policy inserts a SAML bearer assertion issued by a trusted STS. Messages are protected using SSL.
This policy contains the following assertion template: oraclewss_sts_issued_saml_ bearer_token_over_ssl_client_policy_template. See
WS-Trust Assertion Templates on
page C-77 for more information about the assertion.
Policy Assertion
The oraclewss_sts_issued_saml_bearer_token_over_ssl_client_ policy assertion is as follows:
orasp:wss-sts-issued-token-over-ssl xmlns:orasp=http:schemas.oracle.comws200601securitypolicy
xmlns:orawsp=http:schemas.oracle.comws200601policy orasp:require-applies-to=true orasp:require-client-entropy=true
orasp:require-server-entropy=true orasp:trust-version=13 orawsp:Enforced=true orawsp:Silent=false
orawsp:category=securityauthentication, securitymsg-protection orawsp:name=WS-Security 1.1, issued token over ssl
orasp:issued-token orasp:require-external-reference=true orasp:require-internal-reference=true orasp:use-derived-keys=false
orasp:request-security-token-template orasp:key-type=Bearer orasp:token-type=SAML11
orasp:issued-token orasp:require-tls orasp:include-timestamp=true orasp:mutual-auth=false
orawsp:bindings orawsp:Config orawsp:configType=declarative
orawsp:name=WssStsIssuedTokenOverSSLConfig orawsp:PropertySet orawsp:name=standard-security-properties
orawsp:Property orawsp:contentType=optional orawsp:name=sts.auth.user.csf.key orawsp:type=string
orawsp:Value orawsp:Property
orawsp:Property orawsp:contentType=optional orawsp:name=sts.auth.x509.csf.key orawsp:type=string
orawsp:Value orawsp:Property
orawsp:Property orawsp:name=on.behalf.of orawsp:type=boolean orawsp:Valuefalseorawsp:Value
orawsp:Property orawsp:Property orawsp:contentType=optional
orawsp:name=sts.auth.on.behalf.of.csf.key
orawsp:type=string orawsp:Value
orawsp:Property orawsp:Property orawsp:contentType=optional
11-76 Oracle Fusion Middleware Security and Administrators Guide for Web Services
orawsp:name=sts.auth.service.principal.name
orawsp:type=string orawsp:ValueHOSTlocalhostEXAMPLE.COMorawsp:Value
orawsp:Property orawsp:Property orawsp:contentType=optional
orawsp:name=sts.auth.keytab.location
orawsp:type=string orawsp:Value
orawsp:Property orawsp:Property orawsp:contentType=optional
orawsp:name=sts.auth.caller.principal.name
orawsp:type=string orawsp:Value
orawsp:Property orawsp:PropertySet
orawsp:Config orawsp:bindings
orasp:wss-sts-issued-token-over-ssl
Settings You Can Change
You can change the settings shown in Table C–77
.
Properties You Can Configure
You can configure the properties shown in Table C–78
.
How to Set Up the Web Service Client
See Setting Up Automatic Policy Configuration: Main Steps
on page 10-70 for information on how to set up the Web service client.
This policy requires you to set up the Oracle WSM keystore to specify a key usernamepassword or X.509 to authenticate to the STS. See
Configuring Keystores for Message Protection
on page 10-8. See
Programmatic Configuration Overrides for WS-Trust Client Policies on
page 10-74 for a description of the configuration settings you can override.
If you do not set Require Mutual Authentication, one-way SSL is involved. See
Configuring SSL for a Web Service Client on page 10-27.
If you do set Require Mutual Authentication, the client must supply credentials, and expect credentials back from the Web service. See
Configuring Two-Way SSL for a Web Service Client
on page 10-28.
How to Set Up the Web Service Client at Design Time
See Setting Up Automatic Policy Configuration: Main Steps
on page 10-70 for information on how to set up the Web service client.
This policy requires you to set up the Oracle WSM keystore to specify a key usernamepassword or X.509 to authenticate to the STS. See
Configuring Keystores for Message Protection
on page 10-8. See
Using Client Programmatic Configuration Overrides on page 11-89 for a
description of the configuration settings you can override. See Programmatic
Configuration Overrides for WS-Trust Client Policies on page 10-74 for examples of
overriding STS configuration settings.
If you do not set Require Mutual Authentication, one-way SSL is involved. See
Configuring SSL for a Web Service Client on page 10-27.
Configuring Policies 11-77
If you do set the Require Mutual Authentication control, the client must supply credentials, and expect credentials back from the Web service. See
Configuring Two-Way SSL for a Web Service Client
on page 10-28.
oraclewss_sts_issued_saml_bearer_token_over_ssl_service_policy
This policy authenticates a SAML bearer assertion issued by a trusted STS. Messages are protected using SSL.
This policy contains the following assertion template: oraclewss_sts_issued_saml_ bearer_token_over_ssl_service_policy_template. See
WS-Trust Assertion Templates on page C-77 for more information about the assertion.
Policy Assertion
The oraclewss_sts_issued_saml_bearer_token_over_ssl_service_ policy assertion is as follows:
orasp:wss-sts-issued-token-over-ssl xmlns:orasp=http:schemas.oracle.comws200601securitypolicy
xmlns:orawsp=http:schemas.oracle.comws200601policy orasp:require-applies-to=true orasp:require-client-entropy=true
orasp:require-server-entropy=true orasp:trust-version=13 orawsp:Enforced=true orawsp:Silent=false
orawsp:category=securityauthentication, securitymsg-protection orawsp:name=WS-Security 1.1, issued token over ssl
orasp:issued-token orasp:require-external-reference=true orasp:require-internal-reference=true orasp:use-derived-keys=false
orasp:request-security-token-template orasp:key-type=Bearer orasp:token-type=SAML11
orasp:issued-token orasp:require-tls orasp:include-timestamp=true orasp:mutual-auth=false
orawsp:bindings orawsp:Config orawsp:configType=declarative
orawsp:name=WssStsIssuedTokenOverSSLConfig orawsp:PropertySet orawsp:name=standard-security-properties
orawsp:Property orawsp:contentType=constant orawsp:name=role orawsp:type=string
orawsp:ValueultimateReceiverorawsp:Value orawsp:Property
orawsp:PropertySet orawsp:Config
orawsp:bindings orasp:wss-sts-issued-token-over-ssl
Settings You Can Change
See Table C–77
.
Properties You Can Configure
You can configure the properties shown in Table C–79
.
How to Set Up the Web Service
See Setting Up Automatic Policy Configuration: Main Steps
on page 10-70 for information on how to set up the Web service.
To configure SSL, see Configuring SSL on WebLogic Server One-Way
on page 10-26, or
Configuring SSL on WebLogic Server Two-Way on page 10-26 if
Require Mutual Authentication is checked.
11-78 Oracle Fusion Middleware Security and Administrators Guide for Web Services
oraclewss11_sts_issued_saml_hok_with_message_protection_client_policy
This policy inserts a SAML HOK assertion issued by a trusted STS Security Token Service. Messages are protected using proof key material provided by the STS.
This policy contains the following assertion template: oraclewss11_sts_issued_saml_ hok_with_message_protection_client_template. See
WS-Trust Assertion Templates on page C-77 for more information about the assertion.
Policy Assertion
The oraclewss11_sts_issued_saml_hok_with_message_protection_client_policy assertion is as follows:
orasp:wss11-sts-issued-token-with-certificates xmlns:orasp=http:schemas.oracle.comws200601securitypolicy
xmlns:orawsp=http:schemas.oracle.comws200601policy orasp:require-applies-to=true orasp:require-client-entropy=true
orasp:require-server-entropy=true orasp:trust-version=13 orawsp:Enforced=true orawsp:Silent=false
orawsp:category=securityauthentication, securitymsg-protection orawsp:name=WS-Security 1.1, issued tokee
orasp:issued-token orasp:require-external-reference=true orasp:require-internal-reference=true orasp:use-derived-keys=false
orasp:request-security-token-template orasp:algorithm-suite=Basic128 orasp:key-type=Symmetric orasp:token-type=SAML11
orasp:issued-token orasp:x509-token orasp:enc-key-ref-mech=thumbprint orasp:is-encrypted=false
orasp:is-signed=true orasp:sign-key-ref-mech=thumbprint orasp:msg-security orasp:algorithm-suite=Basic128
orasp:confirm-signature=true orasp:encrypt-signature=false orasp:include-timestamp=true orasp:sign-then-encrypt=true
orasp:use-derived-keys=false orasp:request
orasp:signed-parts orasp:body
orasp:header orasp:namespace=http:www.w3.org200508addressing orasp:header orasp:namespace=http:schemas.xmlsoap.orgws200408addressing
orasp:header orasp:name=fmw-context orasp:namespace=http:xmlns.oracle.comfmwcontext1.0
orasp:signed-parts orasp:encrypted-parts
orasp:body orasp:header orasp:name=fmw-context
orasp:namespace=http:xmlns.oracle.comfmwcontext1.0 orasp:encrypted-parts
orasp:request orasp:response
orasp:signed-parts orasp:body
orasp:signed-parts orasp:encrypted-parts
orasp:body orasp:encrypted-parts
orasp:response orasp:fault
orasp:msg-security orawsp:bindings
orawsp:Config orawsp:configType=declarative orawsp:name=Wss11StsIssuedTokenWithCertsConfig
orawsp:PropertySet orawsp:name=standard-security-properties
Configuring Policies 11-79
orawsp:Property orawsp:contentType=optional orawsp:name=sts.auth.user.csf.key orawsp:type=string
orawsp:Value orawsp:Property
orawsp:Property orawsp:contentType=optional orawsp:name=sts.auth.x509.csf.key orawsp:type=string
orawsp:Valueenc-csf-keyorawsp:Value orawsp:Property
orawsp:Property orawsp:name=on.behalf.of orawsp:type=boolean orawsp:Valuefalseorawsp:Value
orawsp:Property orawsp:Property orawsp:contentType=optional
orawsp:name=sts.auth.on.behalf.of.csf.key orawsp:type=string orawsp:Value
orawsp:Property orawsp:Property orawsp:name=keystore.recipient.alias orawsp:type=string
orawsp:Valueorakeyorawsp:Value orawsp:Property
orawsp:Property orawsp:contentType=optional orawsp:name=keystore.enc.csf.key orawsp:type=string
orawsp:Value orawsp:Property
orawsp:Property orawsp:contentType=optional orawsp:name=sts.auth.service.principal.name orawsp:type=string
orawsp:ValueHOSTlocalhostEXAMPLE.COMorawsp:Value orawsp:Property
orawsp:Property orawsp:contentType=optional orawsp:name=sts.auth.keytab.location orawsp:type=string
orawsp:Value orawsp:Property
orawsp:Property orawsp:contentType=optional orawsp:name=sts.auth.caller.principal.name orawsp:type=string
orawsp:Value orawsp:Property
orawsp:PropertySet orawsp:Config
orawsp:bindings orasp:wss11-sts-issued-token-with-certificates
Settings You Can Change
You can change the settings shown in Table C–80
.
Properties You Can Configure
You can configure the properties shown in Table C–81
.
How to Set Up the Web Service Client
See Setting Up Automatic Policy Configuration: Main Steps
on page 10-70 for information on how to set up the Web service client.
This policy requires you to set up the Oracle WSM keystore to specify a key usernamepassword or X.509 to authenticate to the STS. See
Configuring Keystores for Message Protection
on page 10-8. See
Programmatic Configuration Overrides for WS-Trust Client Policies on
page 10-74 for a description of the configuration settings you can override. Configure the policy assertion for message signing, message encryption, or both.
11-80 Oracle Fusion Middleware Security and Administrators Guide for Web Services
The Web services base64-encoded public certificate is published in the WSDL for use by the Web service client, as described in
Using Service Identity Certification Extension
on page 10-37. As an alternative, you can specify a value for keystore.recipient.alias, or
override it on a per-client basis when you attach the policy. The keystore recipient alias specifies the alias used to look up the public key in the keystore when retrieving a
key for encryption of outbound SOAP messages.
You can specify a value for keystore.enc.csf.key, or override them on a per-client basis when you attach the policy.
How to Set Up the Web Service Client at Design Time
See Setting Up Automatic Policy Configuration: Main Steps
on page 10-70 for information on how to set up the Web service client.
This policy requires you to set up the Oracle WSM keystore to specify a key usernamepassword or X.509 to authenticate to the STS. See
Configuring Keystores for Message Protection
on page 10-8. See
Using Client Programmatic Configuration Overrides on page 11-89 for a
description of the configuration settings you can override. See Programmatic
Configuration Overrides for WS-Trust Client Policies on page 10-74 for examples of
overriding STS configuration settings. Configure the policy assertion for message signing, message encryption, or both.
The Web services base64-encoded public certificate is published in the WSDL for use by the Web service client, as described in
Using Service Identity Certification Extension
on page 10-37. As an alternative, you can specify a value for keystore.recipient.alias, or
override it on a per-client basis when you attach the policy. The keystore recipient alias specifies the alias used to look up the public key in the keystore when retrieving a
key for encryption of outbound SOAP messages.
You can specify a value for keystore.enc.csf.key, or override them on a per-client basis when you attach the policy.
oraclewss11_sts_issued_saml_hok_with_message_protection_service_policy
This policy authenticates a SAML HOK assertion issued by a trusted STS Security Token Service. Messages are protected using WS-Securitys Basic 128 suite of
symmetric key technologies.
This policy contains the following assertion template: oraclewss11_sts_issued_saml_ hok_with_message_protection_service_template. See
WS-Trust Assertion Templates on page C-77 for more information about the assertion.
Policy Assertion
The oraclewss11_sts_issued_saml_hok_with_message_protection_service_policy assertion is as follows:
orasp:wss11-sts-issued-token-with-certificates xmlns:orasp=http:schemas.oracle.comws200601securitypolicy
xmlns:orawsp=http:schemas.oracle.comws200601policy orasp:require-applies-to=true orasp:require-client-entropy=true
orasp:require-server-entropy=true orasp:trust-version=13 orawsp:Enforced=true orawsp:Silent=false
orawsp:category=securityauthentication, securitymsg-protection
Configuring Policies 11-81
orawsp:name=WS-Security 1.1, issued tokee orasp:issued-token orasp:require-external-reference=true
orasp:require-internal-reference=true orasp:use-derived-keys=false orasp:request-security-token-template orasp:algorithm-suite=Basic128
orasp:key-type=Symmetric orasp:token-type=SAML11 orasp:issued-token
orasp:x509-token orasp:enc-key-ref-mech=thumbprint orasp:is-encrypted=false orasp:is-signed=true orasp:sign-key-ref-mech=thumbprint
orasp:msg-security orasp:algorithm-suite=Basic128 orasp:confirm-signature=true orasp:encrypt-signature=false
orasp:include-timestamp=true orasp:sign-then-encrypt=true orasp:use-derived-keys=false
orasp:request orasp:signed-parts
orasp:body orasp:header orasp:namespace=http:www.w3.org200508addressing
orasp:header orasp:namespace=http:schemas.xmlsoap.orgws200408addressing orasp:header orasp:name=fmw-context
orasp:namespace=http:xmlns.oracle.comfmwcontext1.0 orasp:signed-parts
orasp:encrypted-parts orasp:body
orasp:header orasp:name=fmw-context orasp:namespace=http:xmlns.oracle.comfmwcontext1.0
orasp:encrypted-parts orasp:request
orasp:response orasp:signed-parts
orasp:body orasp:signed-parts
orasp:encrypted-parts orasp:body
orasp:encrypted-parts orasp:response
orasp:fault orasp:msg-security
orawsp:bindings orawsp:Config orawsp:configType=declarative
orawsp:name=Wss11StsIssuedTokenWithCertsConfig orawsp:PropertySet orawsp:name=standard-security-properties
orawsp:Property orawsp:contentType=optional orawsp:name=keystore.enc.csf.key orawsp:type=string
orawsp:Value orawsp:Property
orawsp:Property orawsp:contentType=constant orawsp:name=role orawsp:type=string
orawsp:ValueultimateReceiverorawsp:Value orawsp:Property
orawsp:PropertySet orawsp:Config
orawsp:bindings orasp:wss11-sts-issued-token-with-certificates
Settings You Can Change
You can change the settings shown in Table C–80
.
11-82 Oracle Fusion Middleware Security and Administrators Guide for Web Services
Properties You Can Configure
You can configure the properties shown in Table C–82
. You also have the option to override the keystore.enc.csf.key server-side configuration property, as
described in Attaching Web Service Policies Permitting Overrides
on page 8-16.
How to Set Up the Web Service
See Setting Up Automatic Policy Configuration: Main Steps
on page 10-70 for information on how to set up the Web service.
oraclewss11_sts_issued_saml_with_message_protection_client_policy
This policy inserts a SAML sender vouches assertion issued by a trusted STS Security Token Service. Messages are protected using the clients private key.
This policy contains the following assertion template: oraclewss11_sts_issued_saml_ with_message_protection_client_policy. See
WS-Trust Assertion Templates on
page C-77 for more information about the assertion.
Policy Assertion
The oraclewss11_sts_issued_saml_with_message_protection_client_policy policy assertion is as follows:
orasp:wss11-sts-issued-token-with-certificates xmlns:orasp=http:schemas.oracle.comws200601securitypolicy
xmlns:orawsp=http:schemas.oracle.comws200601policy orasp:require-applies-to=true orasp:require-client-entropy=true
orasp:require-server-entropy=true orasp:trust-version=13 orawsp:Enforced=true orawsp:Silent=false
orawsp:category=securityauthentication, securitymsg-protection orawsp:name=WS-Security 1.1, issued token
orasp:issued-token orasp:require-external-reference=true orasp:require-internal-reference=true orasp:use-derived-keys=false
orasp:request-security-token-template orasp:algorithm-suite=Basic128 orasp:token-type=SAML11
orasp:issued-token orasp:x509-token orasp:enc-key-ref-mech=thumbprint orasp:is-encrypted=false
orasp:is-signed=true orasp:sign-key-ref-mech=direct orasp:msg-security orasp:algorithm-suite=Basic128
orasp:confirm-signature=true orasp:encrypt-signature=false orasp:include-timestamp=true orasp:sign-then-encrypt=true
orasp:use-derived-keys=false orasp:request
orasp:signed-parts orasp:body
orasp:header orasp:namespace=http:www.w3.org200508addressing orasp:header orasp:namespace=http:schemas.xmlsoap.orgws200408addressing
orasp:header orasp:name=fmw-context orasp:namespace=http:xmlns.oracle.comfmwcontext1.0
orasp:signed-parts orasp:encrypted-parts
orasp:body orasp:header orasp:name=fmw-context
orasp:namespace=http:xmlns.oracle.comfmwcontext1.0 orasp:encrypted-parts
orasp:request orasp:response
orasp:signed-parts orasp:body
Configuring Policies 11-83
orasp:signed-parts orasp:encrypted-parts
orasp:body orasp:encrypted-parts
orasp:response orasp:fault
orasp:msg-security orawsp:bindings
orawsp:Config orawsp:configType=declarative orawsp:name=Wss11StsIssuedTokenWithCertsConfig
orawsp:PropertySet orawsp:name=standard-security-properties orawsp:Property orawsp:contentType=optional orawsp:name=sts.auth.user.csf.key
orawsp:type=string orawsp:Value
orawsp:Property orawsp:Property orawsp:contentType=optional orawsp:name=sts.auth.x509.csf.key
orawsp:type=string orawsp:Value
orawsp:Property orawsp:Property orawsp:name=on.behalf.of orawsp:type=boolean
orawsp:Valuetrueorawsp:Value orawsp:Property
orawsp:Property orawsp:contentType=optional orawsp:name=sts.auth.on.behalf.of.csf.key orawsp:type=string
orawsp:Value orawsp:Property
orawsp:Property orawsp:contentType=optional orawsp:name=keystore.recipient.alias orawsp:type=string
orawsp:Valueorakeyorawsp:Value orawsp:Property
orawsp:Property orawsp:contentType=optional orawsp:name=keystore.enc.csf.key orawsp:type=string
orawsp:Value orawsp:Property
orawsp:PropertySet orawsp:Config
orawsp:bindings orasp:wss11-sts-issued-token-with-certificates
Settings You Can Change
You can change the settings shown in Table C–83
.
Properties You Can Configure
You can configure the properties shown in Table C–84
.
How to Set Up the Web Service Client
See Setting Up Automatic Policy Configuration: Main Steps
on page 10-70 for information on how to set up the Web service client.
This policy requires you to set up the Oracle WSM keystore to specify a key usernamepassword or X.509 to authenticate to the STS. See
Configuring Keystores for Message Protection
on page 10-8. See
Programmatic Configuration Overrides for WS-Trust Client Policies on
page 10-74 for a description of the configuration settings you can override. Configure the policy assertion for message signing, message encryption, or both.
11-84 Oracle Fusion Middleware Security and Administrators Guide for Web Services
The Web services base64-encoded public certificate is published in the WSDL for use by the Web service client, as described in
Using Service Identity Certification Extension
on page 10-37. As an alternative, you can specify a value for keystore.recipient.alias, or
override it on a per-client basis when you attach the policy. The keystore recipient alias specifies the alias used to look up the public key in the keystore when retrieving a
key for encryption of outbound SOAP messages.
You can specify a value for keystore.enc.csf.key, or override them on a per-client basis when you attach the policy.
How to Set Up the Web Service Client at Design Time
See Setting Up Automatic Policy Configuration: Main Steps
on page 10-70 for information on how to set up the Web service client.
This policy requires you to set up the Oracle WSM keystore to specify a key usernamepassword or X.509 to authenticate to the STS. See
Configuring Keystores for Message Protection
on page 10-8. See
Using Client Programmatic Configuration Overrides on page 11-89 for a
description of the configuration settings you can override. See Programmatic
Configuration Overrides for WS-Trust Client Policies on page 10-74 for examples of
overriding STS configuration settings. The Web services base64-encoded public certificate is published in the WSDL for use
by the Web service client, as described in Using Service Identity Certification
Extension on page 10-37.
As an alternative, you can specify a value for keystore.recipient.alias, or override it on a per-client basis when you attach the policy. The keystore recipient
alias specifies the alias used to look up the public key in the keystore when retrieving a key for encryption of outbound SOAP messages.
You can specify a value for keystore.enc.csf.key, or override them on a per-client basis when you attach the policy.
Configure the policy assertion for message signing, message encryption, or both.
MTOM Attachment Policies and Configuration Steps
This section describes the predefined MTOM policies.
oraclewsmtom_policy
SOAP Message Transmission Optimization MechanismXML-binary Optimized Packaging MTOMXOP defines a method for optimizing the transmission of XML
data of type xs:base64Binary or xs:hexBinary in SOAP messages.
The Message Transmission Optimization Mechanism MTOM policy rejects inbound messages that are not in MTOM format and verifies that outbound messages are in
MTOM format.
MTOM refers to specifications http:www.w3.orgTR2005REC-soap12-mtom-20050125
and http:www.w3.orgSubmission2006SUBM-soap11mtom10-20060405
for SOAP 1.2 and SOAP 1.1 bindings, respectively.
Configuring Policies 11-85
How to Set Up the Web Service Client
No configuration is required.
How to Set Up the Web Service Client at Design Time
To enable MTOM on the client of the Web service, pass the javax.xml.ws.soap.MTOMFeature as a parameter when creating the Web service proxy
or dispatch, as illustrated in the following example.
package examples.webservices.mtom.client; import javax.xml.ws.soap.MTOMFeature;
public class Main { public static void mainString[] args {
String FOO = FOO; MtomService service = new MtomService
MtomPortType port = service.getMtomPortTypePortnew MTOMFeature; String result = null;
result = port.echoBinaryAsStringFOO.getBytes; System.out.println Got result: + result ;
} }
How to Set Up Oracle Platform Security Services OPSS
No configuration is required.
Reliable Messaging Policies and Configuration Steps
WS-ReliableMessaging makes message exchanges reliable. It ensures that messages are delivered reliably between distributed applications regardless of software
component, system, or network failures. Ordered delivery is assured and automatic retransmission of failed messages does not have to be coded by each client application.
Consider using reliable messaging if your Web service is experiencing the following problems:
■
network failures or dropped connections
■
messages are lost in transit
■
messages are arriving at their destination out of order WS-ReliableMessaging considers the source and destination of a message to be
independent of the clientserver model. That is, the client and the server can each act simultaneously as both a message source and destination on the communications path.
This section describes the predefined Reliable Messaging policies.
WS-RM Policy Properties
Table 11–1 lists the properties that you can set for the WS-RM policies.
11-86 Oracle Fusion Middleware Security and Administrators Guide for Web Services
oraclewsrm10_policy
This policy provides support for version 1.0 of the Web Services Reliable Messaging protocol. This policy can be attached to any SOAP-based client or endpoint.
How to Set Up the Web Service Client
The Web service client will automatically detect the WSDL policy assertions at run time and use them to enable the advertised version of WS-RM on the client.
Table 11–1 WS-RM Policy Properties
Property Name Description
Default Value Used by Policy
Possible Values
DeliveryAssurance Delivery assurance. The following
defines the delivery assurance types:
■
At Most Once—Messages are delivered at most once, without
duplication.
■
At Least Once—Every message is delivered at least once. It is
possible that some messages are delivered more than once.
■
Exactly Once—Every message is delivered exactly once, without
duplication.
■
Messages are delivered in the order that they were sent. This
delivery assurance can be combined with one of the
preceding three assurances. InOrder
InOrder AtLeastOnce
AtLeastOnceInOrder ExactlyOnce
ExactlyOnceInOrder AtMostOnce
AtMostOnceInOrder
StoreType Type of message store.
InMemory InMemory
FileSystem not fully supported
JDBC StoreName
Name of the message store. oracle
String value jdbc-connection-name
JNDI reference to a JDBC data source. This field is valid only if StoreType is
set to JDBC. This value takes precedence over jdbc-connection-url.
The username and password will be used if both are present.
jdbcMessagesStor e
Valid JDBC store
InactivityTimeout Amount of time, in milliseconds, that
can elapse between message exchanges associated with a particular
WS-ReliableMessaging sequence. Once this value is reached, the
sequence will be terminated and discarded automatically.
600000 The amount of time in
milliseconds.
BaseRetransmissionInt erval
Interval, in milliseconds, that the source endpoint waits after
transmitting a message and before it retransmits the message if it receives
no acknowledgment for that message. 3000
The amount of time in milliseconds.
Configuring Policies 11-87
How to Set Up the Web Service Client at Design Time
For multi-message sequences, the client code must include explicit invocations of methods for delimiting sequence boundaries. Otherwise, every message is wrapped in
its own sequence
Edit the client to enable a reliable messaging session for the messages sent to the service. The oracle.webservices.rm.client.RMSessionLifecycle interface provides the client
with a mechanism for demarcating WS-RM sequence boundaries.
Example 11–8 illustrates sample WS-RM client code. In the code, a new TestService is
created. The TestPort, through which the client will communicate with the service, is retrieved. The port object is cast to a RMSessionLifecycle object and a reliable messaging
session is opened on it openSession. After the messages are sent to the service, the session is closed closeSession.
Example 11–8 Sample WS-Rm Client Code
public class ClientServlet extends HttpServlet { public void doGetHttpServletRequest request,
HttpServletResponse response throws ServletException, IOException {
int num1 = Integer.parseIntrequest.getParameternum1; int num2 = Integer.parseIntrequest.getParameternum2;
String outputStr = null; TestService service = new TestService;
Test port = service.getTestPort; try {
RMSessionLifecycle port.openSession; outputStr = port.helloinputStr;
} catch Exception e { e.printStackTrace;
outputStr = e.getMessage; } finally {
RMSessionLifecycle port.closeSession; response.getOutputStream.writeoutputStr.getBytes;
} }
}
How to Set Up Oracle Platform Security Services OPSS
No additional configuration is required.
oraclewsrm11_policy
This policy provides support for version 1.1 of the Web Services Reliable Messaging protocol. This policy can be attached to any SOAP-based client or endpoint.
How to Set Up the Web Service Client
The Web service client will automatically detect the WSDL policy assertions at run time and use them to enable the advertised version of WS-RM on the client.
11-88 Oracle Fusion Middleware Security and Administrators Guide for Web Services
How to Set Up the Web Service Client at Design Time
For multi-message sequences, the client code must include explicit invocations of methods for delimiting sequence boundaries. Otherwise, every message is wrapped in
its own sequence
Edit the client to enable a reliable messaging session for the messages sent to the service. The oracle.webservices.rm.client.RMSessionLifecycle interface provides the client
with a mechanism for demarcating WS-RM sequence boundaries.
Example 11–8 illustrates a servlet client. In the code, a new TestService is created. The
TestPort, through which the client will communicate with the service, is retrieved. The port object is cast to a RMSessionLifecycle object and a reliable messaging session is
opened on it openSession. After the messages are sent to the service, the session is closed closeSession.
How to Set Up Oracle Platform Security Services OPSS
No additional configuration is required.
Management Policies and Configuration Steps
This section describes the predefined Management policies.
oraclelog_policy
This policy causes the request, response, and fault messages to be sent to a message log.
This policy contains the following assertion template: oraclelog_template. See oraclesecurity_log_template
on page C-95 for more information about the assertion.
Settings You Can Change
See Table C–93
.
Properties You Can Configure
None defined.
How to Set Up the Web Service or Client
Determine whether you want to log messages for the request and response, based on the following categories:
■
all
■
header
■
SOAP body
■
SOAP envelope
How to Set Up Oracle Platform Security Services OPSS
Messages are logged to the message log for the domain.
To view the message log 1.
In the navigator pane, expand WebLogic Domain to show the domain for which you want to see the logged messages. Select the domain.
Configuring Policies 11-89