glassfish 0.1.1-universal-java-1.5
Sign up to get free protection for your applications and to get access to all the features.
- data/COPYRIGHT +33 -0
- data/LICENSE.txt +263 -0
- data/README +12 -0
- data/bin/asadmin +7 -0
- data/bin/asadmin.bat +8 -0
- data/bin/glassfish_rails +40 -0
- data/config/asadminenv.conf +6 -0
- data/config/asenv.bat +28 -0
- data/config/asenv.conf +27 -0
- data/config/glassfish.container +4 -0
- data/domains/domain1/config/admin-keyfile +3 -0
- data/domains/domain1/config/cacerts.jks +0 -0
- data/domains/domain1/config/default-web.xml +906 -0
- data/domains/domain1/config/domain-passwords +0 -0
- data/domains/domain1/config/domain.xml +208 -0
- data/domains/domain1/config/keyfile +6 -0
- data/domains/domain1/config/keystore.jks +0 -0
- data/domains/domain1/config/logging.properties +82 -0
- data/domains/domain1/config/login.conf +18 -0
- data/domains/domain1/config/server.policy +160 -0
- data/domains/domain1/config/sun-acc.xml +40 -0
- data/domains/domain1/config/wss-server-config-1.0.xml +86 -0
- data/domains/domain1/config/wss-server-config-2.0.xml +94 -0
- data/domains/domain1/docroot/favicon.gif +0 -0
- data/domains/domain1/docroot/index.html +87 -0
- data/domains/domain1/master-password +0 -0
- data/lib/appclient/appclientlogin.conf +10 -0
- data/lib/appclient/client.policy +79 -0
- data/lib/appclient/wss-client-config-1.0.xml +84 -0
- data/lib/appclient/wss-client-config-2.0.xml +96 -0
- data/lib/dtds/application-client_1_2.dtd +292 -0
- data/lib/dtds/application-client_1_3.dtd +506 -0
- data/lib/dtds/application_1_2.dtd +197 -0
- data/lib/dtds/application_1_3.dtd +312 -0
- data/lib/dtds/connector_1_0.dtd +561 -0
- data/lib/dtds/ejb-jar_1_1.dtd +894 -0
- data/lib/dtds/ejb-jar_2_0.dtd +1671 -0
- data/lib/dtds/sun-application-client-container_1_0.dtd +123 -0
- data/lib/dtds/sun-application-client-container_1_1.dtd +264 -0
- data/lib/dtds/sun-application-client-container_1_2.dtd +267 -0
- data/lib/dtds/sun-application-client_1_3-0.dtd +57 -0
- data/lib/dtds/sun-application-client_1_4-0.dtd +182 -0
- data/lib/dtds/sun-application-client_1_4-1.dtd +431 -0
- data/lib/dtds/sun-application-client_5_0-0.dtd +495 -0
- data/lib/dtds/sun-application_1_3-0.dtd +30 -0
- data/lib/dtds/sun-application_1_4-0.dtd +44 -0
- data/lib/dtds/sun-application_5_0-0.dtd +51 -0
- data/lib/dtds/sun-cmp-mapping_1_0.dtd +100 -0
- data/lib/dtds/sun-cmp-mapping_1_1.dtd +99 -0
- data/lib/dtds/sun-cmp-mapping_1_2.dtd +106 -0
- data/lib/dtds/sun-connector_1_0-0.dtd +66 -0
- data/lib/dtds/sun-connector_1_5-0.dtd +62 -0
- data/lib/dtds/sun-domain_1_0.dtd +2007 -0
- data/lib/dtds/sun-domain_1_1.dtd +3080 -0
- data/lib/dtds/sun-domain_1_2.dtd +3697 -0
- data/lib/dtds/sun-domain_1_3.dtd +3867 -0
- data/lib/dtds/sun-ejb-jar_2_0-0.dtd +449 -0
- data/lib/dtds/sun-ejb-jar_2_0-1.dtd +454 -0
- data/lib/dtds/sun-ejb-jar_2_1-0.dtd +756 -0
- data/lib/dtds/sun-ejb-jar_2_1-1.dtd +1085 -0
- data/lib/dtds/sun-ejb-jar_3_0-0.dtd +1113 -0
- data/lib/dtds/sun-loadbalancer_1_0.dtd +156 -0
- data/lib/dtds/sun-loadbalancer_1_1.dtd +172 -0
- data/lib/dtds/sun-resources_1_0.dtd +650 -0
- data/lib/dtds/sun-resources_1_1.dtd +650 -0
- data/lib/dtds/sun-resources_1_2.dtd +662 -0
- data/lib/dtds/sun-resources_1_3.dtd +732 -0
- data/lib/dtds/sun-server_1_0.dtd +1056 -0
- data/lib/dtds/sun-web-app_2_3-0.dtd +230 -0
- data/lib/dtds/sun-web-app_2_3-1.dtd +230 -0
- data/lib/dtds/sun-web-app_2_4-0.dtd +466 -0
- data/lib/dtds/sun-web-app_2_4-1.dtd +742 -0
- data/lib/dtds/sun-web-app_2_5-0.dtd +789 -0
- data/lib/dtds/web-app_2_2.dtd +639 -0
- data/lib/dtds/web-app_2_3.dtd +1063 -0
- data/lib/dtds/web-jsptaglibrary_1_1.dtd +265 -0
- data/lib/dtds/web-jsptaglibrary_1_2.dtd +468 -0
- data/lib/package-appclient.xml +185 -0
- data/lib/processLauncher.properties +25 -0
- data/lib/processLauncher.xml +189 -0
- data/lib/schemas/XMLSchema.dtd +402 -0
- data/lib/schemas/application-client_1_4.xsd +267 -0
- data/lib/schemas/application-client_5.xsd +304 -0
- data/lib/schemas/application_1_4.xsd +315 -0
- data/lib/schemas/application_5.xsd +336 -0
- data/lib/schemas/connector_1_5.xsd +1036 -0
- data/lib/schemas/datatypes.dtd +203 -0
- data/lib/schemas/ejb-jar_2_1.xsd +2208 -0
- data/lib/schemas/ejb-jar_3_0.xsd +2706 -0
- data/lib/schemas/j2ee_1_4.xsd +1608 -0
- data/lib/schemas/j2ee_jaxrpc_mapping_1_1.xsd +886 -0
- data/lib/schemas/j2ee_web_services_1_1.xsd +491 -0
- data/lib/schemas/j2ee_web_services_client_1_1.xsd +345 -0
- data/lib/schemas/javaee_5.xsd +2096 -0
- data/lib/schemas/javaee_web_services_1_2.xsd +747 -0
- data/lib/schemas/javaee_web_services_client_1_2.xsd +578 -0
- data/lib/schemas/jax-rpc-ri-config.xsd +416 -0
- data/lib/schemas/jsp_2_0.xsd +308 -0
- data/lib/schemas/jsp_2_1.xsd +343 -0
- data/lib/schemas/orm_1_0.xsd +1516 -0
- data/lib/schemas/persistence_1_0.xsd +260 -0
- data/lib/schemas/web-app_2_4.xsd +1234 -0
- data/lib/schemas/web-app_2_5.xsd +1271 -0
- data/lib/schemas/web-jsptaglibrary_2_0.xsd +1010 -0
- data/lib/schemas/web-jsptaglibrary_2_1.xsd +1144 -0
- data/lib/schemas/xml.xsd +82 -0
- data/modules/admin-cli-10.0-SNAPSHOT.jar +0 -0
- data/modules/auto-depends-0.2-SNAPSHOT.jar +0 -0
- data/modules/cli-framework-10.0-SNAPSHOT.jar +0 -0
- data/modules/common-ee-util-10.0-SNAPSHOT.jar +0 -0
- data/modules/common-util-10.0-SNAPSHOT.jar +0 -0
- data/modules/config-0.2-SNAPSHOT.jar +0 -0
- data/modules/config-api-10.0-SNAPSHOT.jar +0 -0
- data/modules/gf-jruby-connector-10.0-SNAPSHOT.jar +0 -0
- data/modules/glassfish-10.0-SNAPSHOT.jar +0 -0
- data/modules/glassfish-api-10.0-SNAPSHOT.jar +0 -0
- data/modules/glassfish.rb +10 -0
- data/modules/grizzly-framework-1.7.1.jar +0 -0
- data/modules/grizzly-http-1.7.1.jar +0 -0
- data/modules/grizzly-http-utils-1.7.1.jar +0 -0
- data/modules/grizzly-jruby-1.7.0.jar +0 -0
- data/modules/grizzly-jruby-module-1.7.0.jar +0 -0
- data/modules/grizzly-module-1.7.1.jar +0 -0
- data/modules/grizzly-portunif-1.7.1.jar +0 -0
- data/modules/grizzly-rcm-1.7.1.jar +0 -0
- data/modules/hk2-0.2-SNAPSHOT.jar +0 -0
- data/modules/hk2-core-0.2-SNAPSHOT.jar +0 -0
- data/modules/junit-4.3.1.jar +0 -0
- data/modules/kernel-10.0-SNAPSHOT.jar +0 -0
- data/modules/persistence-api-1.0b.jar +0 -0
- data/modules/servlet-api-2.5.jar +0 -0
- data/modules/sjsxp-1.0.jar +0 -0
- data/modules/stax-api-1.0-2.jar +0 -0
- data/modules/tiger-types-1.0.jar +0 -0
- metadata +206 -0
@@ -0,0 +1,40 @@
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
+
|
3
|
+
<!--
|
4
|
+
Copyright 2004-2005 Sun Microsystems, Inc. All rights reserved.
|
5
|
+
Use is subject to license terms.
|
6
|
+
-->
|
7
|
+
|
8
|
+
<!--
|
9
|
+
Please remember to customize this file for your environment. The defaults for
|
10
|
+
following fields may not be appropriate.
|
11
|
+
- target-server name, address and port
|
12
|
+
- Property security.config in message-security-config
|
13
|
+
-->
|
14
|
+
|
15
|
+
<!DOCTYPE client-container PUBLIC "-//Sun Microsystems Inc.//DTD Application Server 8.0 Application Client Container//EN" "http://www.sun.com/software/appserver/dtds/sun-application-client-container_1_2.dtd">
|
16
|
+
|
17
|
+
<client-container>
|
18
|
+
<target-server name="laturbie.sfbay.sun.com" address="laturbie.sfbay.sun.com" port="3700"/>
|
19
|
+
<log-service file="" level="WARNING"/>
|
20
|
+
<message-security-config auth-layer="SOAP">
|
21
|
+
<!-- turned off by default -->
|
22
|
+
<provider-config class-name="com.sun.xml.wss.provider.ClientSecurityAuthModule" provider-id="XWS_ClientProvider" provider-type="client">
|
23
|
+
<request-policy auth-source="content"/>
|
24
|
+
<response-policy auth-source="content"/>
|
25
|
+
<property name="encryption.key.alias" value="s1as"/>
|
26
|
+
<property name="signature.key.alias" value="s1as"/>
|
27
|
+
<property name="dynamic.username.password" value="false"/>
|
28
|
+
<property name="debug" value="false"/>
|
29
|
+
</provider-config>
|
30
|
+
<provider-config class-name="com.sun.xml.wss.provider.ClientSecurityAuthModule" provider-id="ClientProvider" provider-type="client">
|
31
|
+
<request-policy auth-source="content"/>
|
32
|
+
<response-policy auth-source="content"/>
|
33
|
+
<property name="encryption.key.alias" value="s1as"/>
|
34
|
+
<property name="signature.key.alias" value="s1as"/>
|
35
|
+
<property name="dynamic.username.password" value="false"/>
|
36
|
+
<property name="debug" value="false"/>
|
37
|
+
<property name="security.config" value="/Users/dochez/java/cvs/v3/publish/lib/appclient/wss-client-config-1.0.xml"/>
|
38
|
+
</provider-config>
|
39
|
+
</message-security-config>
|
40
|
+
</client-container>
|
@@ -0,0 +1,86 @@
|
|
1
|
+
<!--
|
2
|
+
Copyright 2004 Sun Microsystems, Inc. All rights reserved.
|
3
|
+
SUN PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
|
4
|
+
-->
|
5
|
+
<!--
|
6
|
+
This server side config file pairs with wss-client-config-1.0.xml on the client
|
7
|
+
and supports the following UseCases:
|
8
|
+
Usecase 1: Authentication using Protected UsernameToken
|
9
|
+
Usecase 3: Encrypted UsernameToken and MessageBody
|
10
|
+
Usecase 4: Response Encryption Key Learnt from Incoming Message
|
11
|
+
|
12
|
+
Certificate Alias Information :
|
13
|
+
1. A certificateAlias under the <xwss:Encrypt> element signifies the certificate
|
14
|
+
of the recipient of the message.
|
15
|
+
2. A certificateAlias under the <xwss:Sign> element signifies the certificate of the
|
16
|
+
sender.
|
17
|
+
|
18
|
+
NOTE:
|
19
|
+
|
20
|
+
1. the certificateAlias has the above meaning for all the Sign and Encrypt elements below
|
21
|
+
2. there are several Sign and Encrypt elements below and similarly several RequireSignature and
|
22
|
+
RequireEncryption elements. Which of them would be actually used at runtime will depend on
|
23
|
+
the AuthPolicy passed to the module.
|
24
|
+
|
25
|
+
For Example : if Auth-Source=Sender then only the <xwss:UsernameToken> elements will be used
|
26
|
+
and none of the <xwss:Sign> elements will be used.
|
27
|
+
If Auth-Source=Content then the <xwss:Sign> element will be used
|
28
|
+
|
29
|
+
3. The different variations of <xwss:Encrypt> elements in this configuration file are to accomodate
|
30
|
+
default encryption of the UsernameToken.
|
31
|
+
|
32
|
+
4. The actual certificate alias to be used for any Signature operation can be modified during AuthModule
|
33
|
+
initialization by setting the alias as the value of "signature.key.alias" property in the Module Options Map.
|
34
|
+
5. The actual certificate alias to be used for any Encrypt operation can be modified during AuthModule
|
35
|
+
initialization by setting the alias as the value of "encryption.key.alias" property in the Module Options Map.
|
36
|
+
|
37
|
+
6. Debug Dumping of Messages can be enabled by setting the "debug" property in the Module Options Map to "true" during
|
38
|
+
AuthModule initialization.
|
39
|
+
7. The Actual configuration file to be used by an Authmodule can be changed by setting the property "security.config" in
|
40
|
+
the Module Options Map to point to the configuration file location.
|
41
|
+
8. When the "security.config" property is not set during module initialization then a client auth module will use wss-client-config-2.0.xml
|
42
|
+
by default.
|
43
|
+
9. When the "security.config" property is not set during module initialization then a server auth module will use wss-server-config-2.0.xml
|
44
|
+
by default.
|
45
|
+
|
46
|
+
-->
|
47
|
+
|
48
|
+
<xwss:SecurityConfiguration xmlns:xwss="http://java.sun.com/xml/ns/xwss/config"
|
49
|
+
dumpMessages="false">
|
50
|
+
<xwss:Timestamp/>
|
51
|
+
<xwss:RequireEncryption>
|
52
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
53
|
+
</xwss:RequireEncryption>
|
54
|
+
<xwss:RequireEncryption>
|
55
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
56
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
57
|
+
</xwss:RequireEncryption>
|
58
|
+
<xwss:RequireEncryption>
|
59
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
60
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
61
|
+
</xwss:RequireEncryption>
|
62
|
+
<xwss:RequireSignature>
|
63
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
64
|
+
</xwss:RequireSignature>
|
65
|
+
<xwss:RequireUsernameToken nonceRequired="false" passwordDigestRequired="false"/>
|
66
|
+
<xwss:Encrypt>
|
67
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
68
|
+
<xwss:KeyEncryptionMethod algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
|
69
|
+
</xwss:Encrypt>
|
70
|
+
<xwss:Encrypt>
|
71
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
72
|
+
<xwss:KeyEncryptionMethod algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
|
73
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
74
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
75
|
+
</xwss:Encrypt>
|
76
|
+
<xwss:Encrypt>
|
77
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
78
|
+
<xwss:KeyEncryptionMethod algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
|
79
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
80
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
81
|
+
</xwss:Encrypt>
|
82
|
+
<xwss:Sign>
|
83
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
84
|
+
</xwss:Sign>
|
85
|
+
<xwss:UsernameToken digestPassword="false" useNonce="false"/>
|
86
|
+
</xwss:SecurityConfiguration>
|
@@ -0,0 +1,94 @@
|
|
1
|
+
<!--
|
2
|
+
Copyright 2004 Sun Microsystems, Inc. All rights reserved.
|
3
|
+
SUN PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
|
4
|
+
-->
|
5
|
+
<!--
|
6
|
+
This server side config file pairs with wss-client-config-2.0.xml on the client
|
7
|
+
and supports the following UseCases:
|
8
|
+
Usecase 2: Encrypted UsernameToken
|
9
|
+
Usecase 3: Encrypted UsernameToken and MessageBody
|
10
|
+
Usecase 4: Response Encryption Key Learnt from Incoming Message
|
11
|
+
|
12
|
+
Certificate Alias Information :
|
13
|
+
1. A certificateAlias under the <xwss:Encrypt> element signifies the certificate
|
14
|
+
of the recipient of the message.
|
15
|
+
2. A certificateAlias under the <xwss:Sign> element signifies the certificate of the
|
16
|
+
sender.
|
17
|
+
|
18
|
+
NOTE:
|
19
|
+
|
20
|
+
1. the certificateAlias has the above meaning for all the Sign and Encrypt elements below
|
21
|
+
2. there are several Sign and Encrypt elements below and similarly several RequireSignature and
|
22
|
+
RequireEncryption elements. Which of them would be actually used at runtime will depend on
|
23
|
+
the AuthPolicy passed to the module.
|
24
|
+
|
25
|
+
For Example : if Auth-Source=Sender then only the <xwss:UsernameToken> elements will be used
|
26
|
+
and none of the <xwss:Sign> elements will be used.
|
27
|
+
If Auth-Source=Content then the <xwss:Sign> element will be used
|
28
|
+
|
29
|
+
3. The different variations of <xwss:Encrypt> elements in this configuration file are to accomodate
|
30
|
+
default encryption of the UsernameToken.
|
31
|
+
|
32
|
+
4. The actual certificate alias to be used for any Signature operation can be modified during AuthModule
|
33
|
+
initialization by setting the alias as the value of "signature.key.alias" property in the Module Options Map.
|
34
|
+
5. The actual certificate alias to be used for any Encrypt operation can be modified during AuthModule
|
35
|
+
initialization by setting the alias as the value of "encryption.key.alias" property in the Module Options Map.
|
36
|
+
|
37
|
+
6. Debug Dumping of Messages can be enabled by setting the "debug" property in the Module Options Map to "true" during
|
38
|
+
AuthModule initialization.
|
39
|
+
7. The Actual configuration file to be used by an Authmodule can be changed by setting the property "security.config" in
|
40
|
+
the Module Options Map to point to the configuration file location.
|
41
|
+
8. When the "security.config" property is not set during module initialization then a client auth module will use wss-client-config-2.0.xml
|
42
|
+
by default.
|
43
|
+
9. When the "security.config" property is not set during module initialization then a server auth module will use wss-server-config-2.0.xml
|
44
|
+
by default.
|
45
|
+
|
46
|
+
-->
|
47
|
+
<xwss:SecurityConfiguration xmlns:xwss="http://java.sun.com/xml/ns/xwss/config"
|
48
|
+
dumpMessages="false">
|
49
|
+
<xwss:Timestamp/>
|
50
|
+
<xwss:Encrypt>
|
51
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
52
|
+
<xwss:KeyEncryptionMethod algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
|
53
|
+
</xwss:Encrypt>
|
54
|
+
<xwss:Encrypt>
|
55
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
56
|
+
<xwss:KeyEncryptionMethod algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
|
57
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
58
|
+
</xwss:Encrypt>
|
59
|
+
<xwss:Encrypt>
|
60
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
61
|
+
<xwss:KeyEncryptionMethod algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
|
62
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
63
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
64
|
+
</xwss:Encrypt>
|
65
|
+
<xwss:Encrypt>
|
66
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
67
|
+
<xwss:KeyEncryptionMethod algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
|
68
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
69
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
70
|
+
</xwss:Encrypt>
|
71
|
+
<xwss:Sign>
|
72
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
73
|
+
</xwss:Sign>
|
74
|
+
<xwss:UsernameToken digestPassword="false" useNonce="true"/>
|
75
|
+
|
76
|
+
<xwss:RequireUsernameToken nonceRequired="true" passwordDigestRequired="false"/>
|
77
|
+
<xwss:RequireEncryption>
|
78
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
79
|
+
</xwss:RequireEncryption>
|
80
|
+
<xwss:RequireEncryption>
|
81
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
82
|
+
</xwss:RequireEncryption>
|
83
|
+
<xwss:RequireEncryption>
|
84
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
85
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
86
|
+
</xwss:RequireEncryption>
|
87
|
+
<xwss:RequireEncryption>
|
88
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
89
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
90
|
+
</xwss:RequireEncryption>
|
91
|
+
<xwss:RequireSignature>
|
92
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
93
|
+
</xwss:RequireSignature>
|
94
|
+
</xwss:SecurityConfiguration>
|
Binary file
|
@@ -0,0 +1,87 @@
|
|
1
|
+
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
|
2
|
+
<html lang="en">
|
3
|
+
<head>
|
4
|
+
<style TYPE="text/css">
|
5
|
+
body{margin-top:0}
|
6
|
+
body,td,p,div,span,a,ul,ul li, ol, ol li, ol li b, dl,h1,h2,h3,h4,h5,h6,li {
|
7
|
+
font-family:geneva,helvetica,arial,"lucida sans",sans-serif;
|
8
|
+
font-size:10pt
|
9
|
+
}
|
10
|
+
h1 {font-size:18pt}
|
11
|
+
h2 {font-size:14pt}
|
12
|
+
h3 {font-size:12pt}
|
13
|
+
code,kbd,tt,pre {
|
14
|
+
font-family:monaco,courier,"courier new";
|
15
|
+
font-size:10pt;
|
16
|
+
}
|
17
|
+
li {padding-bottom: 8px}
|
18
|
+
p.copy, p.copy a {
|
19
|
+
font-family:geneva,helvetica,arial,"lucida sans",sans-serif;
|
20
|
+
font-size:8pt
|
21
|
+
}
|
22
|
+
p.copy {text-align: center}
|
23
|
+
|
24
|
+
table.grey1,tr.grey1,td.grey1{background:#f1f1f1}
|
25
|
+
th {
|
26
|
+
color:#ffffff;
|
27
|
+
font-family:geneva,helvetica,arial,"lucida sans",sans-serif;
|
28
|
+
font-size:12pt
|
29
|
+
}
|
30
|
+
td.insidehead {
|
31
|
+
font-weight:bold;
|
32
|
+
background:white;
|
33
|
+
text-align: left;
|
34
|
+
}
|
35
|
+
a {text-decoration:none; color:#3E6B8A}
|
36
|
+
a:visited{color:#917E9C}
|
37
|
+
a:hover {text-decoration:underline}
|
38
|
+
</style>
|
39
|
+
<title>GlassFish V3 - Server Running</title>
|
40
|
+
</head>
|
41
|
+
|
42
|
+
<body text="#000000" link="#594fbf" vlink="#1005fb" alink="#333366" bgcolor="#ffffff" marginwidth="10">
|
43
|
+
<br>
|
44
|
+
<table width="100%" border="0" cellspacing="0" cellpadding="3">
|
45
|
+
<tbody>
|
46
|
+
<tr>
|
47
|
+
<td valign="top" align="right"> <a href="http://www.sun.com">sun.com</a> </td>
|
48
|
+
</tr>
|
49
|
+
<tr>
|
50
|
+
<td valign="top" align="left" bgcolor="#587993">
|
51
|
+
<font color="#ffffff"> <b>Welcome to the GlassFish V3 preview</b></font>
|
52
|
+
</td>
|
53
|
+
</tr>
|
54
|
+
</tbody>
|
55
|
+
</table>
|
56
|
+
|
57
|
+
<h1>Your server is up and running!</h1>
|
58
|
+
|
59
|
+
<p>To replace this page, overwrite <code><<i>install_dir</i>>/domains/<<i>domain_name</i>>/docroot/index.html</code>,
|
60
|
+
where <code><<i>install_dir</i>></code> is the Application Server installation directory,
|
61
|
+
and <code><<i>domain_name</i>></code> is the domain name
|
62
|
+
(for example, <code>domain1</code>).<code></code></p>
|
63
|
+
<p>
|
64
|
+
You are invited to
|
65
|
+
<a href="https://softwarereg.sun.com/software/product_registration/index.jsp" target="_blank">register your product now</a>.
|
66
|
+
Registration is optional, but as a registered user, you will get:
|
67
|
+
<ul>
|
68
|
+
<li>News about product updates </li>
|
69
|
+
<li>Access to value-added contents </li>
|
70
|
+
<li>Notification of promotional programs </li>
|
71
|
+
<li>Entry in Java EE platform-related gift give-aways </li>
|
72
|
+
</ul>
|
73
|
+
Also check out the <a href="https://glassfish.dev.java.net/">GlassFish project</a>,
|
74
|
+
the open source community for the Java EE application server.
|
75
|
+
</p>
|
76
|
+
<P><b>More Information</b>: For more information about the Application Server, samples, documentation,
|
77
|
+
and additional resources, see <code><<i>install_dir</i>>/docs/about.html</code>,
|
78
|
+
where <code><<i>install_dir</i>></code> is the Application Server installation directory.</p>
|
79
|
+
|
80
|
+
<hr style="width: 80%; height: 2px;">
|
81
|
+
|
82
|
+
<p class="copy">
|
83
|
+
<a href="http://www.sun.com/company/">Company Info</a>
|
84
|
+
| <a href="http://www.sun.com/contact/">Contact</a>
|
85
|
+
| Copyright 2007 Sun Microsystems
|
86
|
+
</p>
|
87
|
+
</body></html>
|
Binary file
|
@@ -0,0 +1,10 @@
|
|
1
|
+
/* Copyright 2004 Sun Microsystems, Inc. All rights reserved. */
|
2
|
+
/* SUN PROPRIETARY/CONFIDENTIAL. Use is subject to license terms. */
|
3
|
+
|
4
|
+
default {
|
5
|
+
com.sun.enterprise.security.auth.login.ClientPasswordLoginModule required debug=false;
|
6
|
+
};
|
7
|
+
|
8
|
+
certificate {
|
9
|
+
com.sun.enterprise.security.auth.login.ClientCertificateLoginModule required debug=false;
|
10
|
+
};
|
@@ -0,0 +1,79 @@
|
|
1
|
+
//
|
2
|
+
// The contents of this file are subject to the terms
|
3
|
+
// of the Common Development and Distribution License
|
4
|
+
// (the "License"). You may not use this file except
|
5
|
+
// in compliance with the License.
|
6
|
+
//
|
7
|
+
// You can obtain a copy of the license at
|
8
|
+
// glassfish/bootstrap/legal/CDDLv1.0.txt or
|
9
|
+
// https://glassfish.dev.java.net/public/CDDLv1.0.html.
|
10
|
+
// See the License for the specific language governing
|
11
|
+
// permissions and limitations under the License.
|
12
|
+
//
|
13
|
+
// When distributing Covered Code, include this CDDL
|
14
|
+
// HEADER in each file and include the License file at
|
15
|
+
// glassfish/bootstrap/legal/CDDLv1.0.txt. If applicable,
|
16
|
+
// add the following below this CDDL HEADER, with the
|
17
|
+
// fields enclosed by brackets "[]" replaced with your
|
18
|
+
// own identifying information: Portions Copyright [yyyy]
|
19
|
+
// [name of copyright owner]
|
20
|
+
//
|
21
|
+
|
22
|
+
/* Copyright 2004 Sun Microsystems, Inc. All rights reserved. */
|
23
|
+
/* SUN PROPRIETARY/CONFIDENTIAL. Use is subject to license terms. */
|
24
|
+
|
25
|
+
//core server classes get all permissions by default
|
26
|
+
grant codeBase "file:${com.sun.aas.installRoot}/lib/-" {
|
27
|
+
permission java.security.AllPermission;
|
28
|
+
};
|
29
|
+
|
30
|
+
//iMQ classes get all permissions by default
|
31
|
+
grant codeBase "file:${com.sun.aas.imqLib}/-" {
|
32
|
+
permission java.security.AllPermission;
|
33
|
+
};
|
34
|
+
|
35
|
+
// Standard extensions get all permissions by default
|
36
|
+
grant codeBase "file:${java.home}/lib/ext/-" {
|
37
|
+
permission java.security.AllPermission;
|
38
|
+
};
|
39
|
+
|
40
|
+
grant codeBase "file:${java.home}/../lib/tools.jar" {
|
41
|
+
permission java.security.AllPermission;
|
42
|
+
};
|
43
|
+
|
44
|
+
|
45
|
+
|
46
|
+
// default permissions granted to all domains
|
47
|
+
grant {
|
48
|
+
permission java.lang.RuntimePermission "loadLibrary.*";
|
49
|
+
permission java.lang.RuntimePermission "accessClassInPackage.*";
|
50
|
+
permission java.lang.RuntimePermission "exitVM";
|
51
|
+
permission java.lang.RuntimePermission "queuePrintJob";
|
52
|
+
permission java.lang.RuntimePermission "modifyThreadGroup";
|
53
|
+
|
54
|
+
permission java.awt.AWTPermission "accessClipboard";
|
55
|
+
permission java.awt.AWTPermission "accessEventQueue";
|
56
|
+
permission java.awt.AWTPermission "showWindowWithoutWarningBanner";
|
57
|
+
|
58
|
+
permission java.io.FilePermission "<<ALL FILES>>", "read,write";
|
59
|
+
|
60
|
+
permission java.net.SocketPermission "*", "connect,accept,resolve";
|
61
|
+
permission java.net.SocketPermission "localhost:1024-", "accept,listen";
|
62
|
+
|
63
|
+
// "standard" properies that can be read by anyone
|
64
|
+
permission java.util.PropertyPermission "*", "read";
|
65
|
+
|
66
|
+
// setting the JSSE provider for lazy authentication of app. clients.
|
67
|
+
// Please do not change it.
|
68
|
+
permission java.security.SecurityPermission "putProviderProperty.SunJSSE";
|
69
|
+
permission java.security.SecurityPermission "insertProvider.SunJSSE";
|
70
|
+
|
71
|
+
permission java.util.logging.LoggingPermission "control";
|
72
|
+
//permission java.lang.RuntimePermission "setSecurityManager";
|
73
|
+
};
|
74
|
+
|
75
|
+
|
76
|
+
|
77
|
+
|
78
|
+
|
79
|
+
|
@@ -0,0 +1,84 @@
|
|
1
|
+
<!--
|
2
|
+
Copyright 2004 Sun Microsystems, Inc. All rights reserved.
|
3
|
+
SUN PROPRIETARY/CONFIDENTIAL. Use is subject to license terms.
|
4
|
+
-->
|
5
|
+
<!--
|
6
|
+
This client side config file pairs with wss-server-config-1.0.xml on the server
|
7
|
+
and supports the following UseCases:
|
8
|
+
Usecase 1: Authentication by Protected UsernameToken
|
9
|
+
Usecase 3: Encrypted UsernameToken and MessageBody
|
10
|
+
Usecase 4: Response Encryption Key Learnt from Incoming Message
|
11
|
+
|
12
|
+
Certificate Alias Information :
|
13
|
+
1. A certificateAlias under the <xwss:Encrypt> element signifies the certificate
|
14
|
+
of the recipient of the message.
|
15
|
+
2. A certificateAlias under the <xwss:Sign> element signifies the certificate of the
|
16
|
+
sender.
|
17
|
+
|
18
|
+
NOTE:
|
19
|
+
|
20
|
+
1. the certificateAlias has the above meaning for all the Sign and Encrypt elements below
|
21
|
+
2. there are several Sign and Encrypt elements below and similarly several RequireSignature and
|
22
|
+
RequireEncryption elements. Which of them would be actually used at runtime will depend on
|
23
|
+
the AuthPolicy passed to the module.
|
24
|
+
|
25
|
+
For Example : if Auth-Source=Sender then only the <xwss:UsernameToken> elements will be used
|
26
|
+
and none of the <xwss:Sign> elements will be used.
|
27
|
+
If Auth-Source=Content then the <xwss:Sign> element will be used
|
28
|
+
|
29
|
+
3. The different variations of <xwss:Encrypt> elements in this configuration file are to accomodate
|
30
|
+
default encryption of the UsernameToken.
|
31
|
+
|
32
|
+
4. The actual certificate alias to be used for any Signature operation can be modified during AuthModule
|
33
|
+
initialization by setting the alias as the value of "signature.key.alias" property in the Module Options Map.
|
34
|
+
5. The actual certificate alias to be used for any Encrypt operation can be modified during AuthModule
|
35
|
+
initialization by setting the alias as the value of "encryption.key.alias" property in the Module Options Map.
|
36
|
+
|
37
|
+
6. Debug Dumping of Messages can be enabled by setting the "debug" property in the Module Options Map to "true" during
|
38
|
+
AuthModule initialization.
|
39
|
+
7. The Actual configuration file to be used by an Authmodule can be changed by setting the property "security.config" in
|
40
|
+
the Module Options Map to point to the configuration file location.
|
41
|
+
8. When the "security.config" property is not set during module initialization then a client auth module will use wss-client-config-2.0.xml
|
42
|
+
by default.
|
43
|
+
9. When the "security.config" property is not set during module initialization then a server auth module will use wss-server-config-2.0.xml by default.
|
44
|
+
10. The property "dynamic.username.password" when set during module initialization to "true" will signal the provider runtime to collect the username and password from the CallbackHandler for each request. When this property is set to "false" or if the property is not set then the username and password for wsse:UsernameToken(s) is collected once during Module Initialization.
|
45
|
+
-->
|
46
|
+
|
47
|
+
<xwss:SecurityConfiguration xmlns:xwss="http://java.sun.com/xml/ns/xwss/config"
|
48
|
+
dumpMessages="false">
|
49
|
+
<xwss:Timestamp/>
|
50
|
+
<xwss:RequireUsernameToken nonceRequired="false" passwordDigestRequired="false"/>
|
51
|
+
<xwss:RequireEncryption>
|
52
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
53
|
+
</xwss:RequireEncryption>
|
54
|
+
<xwss:RequireEncryption>
|
55
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
56
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
57
|
+
</xwss:RequireEncryption>
|
58
|
+
<xwss:RequireEncryption>
|
59
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
60
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
61
|
+
</xwss:RequireEncryption>
|
62
|
+
<xwss:RequireSignature>
|
63
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
64
|
+
</xwss:RequireSignature>
|
65
|
+
<xwss:Encrypt>
|
66
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
67
|
+
</xwss:Encrypt>
|
68
|
+
<xwss:Encrypt>
|
69
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
70
|
+
<xwss:KeyEncryptionMethod algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
|
71
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
72
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
73
|
+
</xwss:Encrypt>
|
74
|
+
<xwss:Encrypt>
|
75
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
76
|
+
<xwss:KeyEncryptionMethod algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
|
77
|
+
<xwss:Target type="qname">SOAP-BODY</xwss:Target>
|
78
|
+
<xwss:Target type="qname">{http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd}UsernameToken</xwss:Target>
|
79
|
+
</xwss:Encrypt>
|
80
|
+
<xwss:Sign>
|
81
|
+
<xwss:X509Token certificateAlias="s1as"/>
|
82
|
+
</xwss:Sign>
|
83
|
+
<xwss:UsernameToken digestPassword="false" useNonce="false"/>
|
84
|
+
</xwss:SecurityConfiguration>
|