Return-Path: Delivered-To: apmail-ws-axis-c-user-archive@www.apache.org Received: (qmail 70540 invoked from network); 27 May 2009 03:12:37 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 27 May 2009 03:12:37 -0000 Received: (qmail 64240 invoked by uid 500); 27 May 2009 03:12:50 -0000 Delivered-To: apmail-ws-axis-c-user-archive@ws.apache.org Received: (qmail 64201 invoked by uid 500); 27 May 2009 03:12:49 -0000 Mailing-List: contact axis-c-user-help@ws.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: List-Id: "Apache AXIS C User List" Reply-To: "Apache AXIS C User List" Delivered-To: mailing list axis-c-user@ws.apache.org Received: (qmail 64192 invoked by uid 99); 27 May 2009 03:12:49 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 27 May 2009 03:12:49 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of uthaiyashankar@gmail.com designates 209.85.221.131 as permitted sender) Received: from [209.85.221.131] (HELO mail-qy0-f131.google.com) (209.85.221.131) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 27 May 2009 03:12:41 +0000 Received: by qyk37 with SMTP id 37so410838qyk.30 for ; Tue, 26 May 2009 20:12:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:received:date :x-google-sender-auth:message-id:subject:from:to:content-type :content-transfer-encoding; bh=nyugpTSdoX54d7lR3X86cNE/xNqApcU8gEbVFp4AWX0=; b=NO6bYxKJHNF2CezXOeOdCHo80Y/EEGcGz7jO69N1M3yEd9Q6B9oVKcgUWrd8iZTDoW 1uRwoClq7d4CpzTlKo7XGKxgY0R0YGrszbcG6yuwswagQy73zADE5zgH+u16YjBuUnr0 V4G9/QcUTcONNF+YnW28gdjU1hbtxWllcn6aw= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:date:x-google-sender-auth:message-id:subject :from:to:content-type:content-transfer-encoding; b=QtD/yewL+l0syBDQuDGCdbuLV0D0BNguFJWBg0eo/wHfEQPaNTLMtBvPp78WBGhJiL HFc/9JEQGQY+0tLIBJtuFzikFe2qF7e5aCDxVyYluO95yDWl7cck59K7rJ/G8RW12OfZ ZN/k7GgNmH/GEBh1dh/4/HSc3UcE4bIhbwQtg= MIME-Version: 1.0 Sender: uthaiyashankar@gmail.com Received: by 10.229.95.77 with SMTP id c13mr2648484qcn.2.1243393940352; Tue, 26 May 2009 20:12:20 -0700 (PDT) Date: Wed, 27 May 2009 08:42:19 +0530 X-Google-Sender-Auth: 15299c0538ce8c24 Message-ID: <84cacd920905262012y3998877x729de3871c8645bf@mail.gmail.com> Subject: [ANN][Rampart/C] Apache Rampart/C 1.3.0 Released From: Uthaiyashankar To: Apache AXIS C User List Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org We are pleased to announce the release of Apache Rampart/C version 1.3.0. You can download this release from http://ws.apache.org/rampart/c/download.cgi Key features ------------- 1. Ability to send and verify UsernameTokens with - Username and PlainText password - Username and Digested password 2. Ability to send Timestamp tokens 3. SOAP message encryption - With derived key support for improved security - Symmetric and Asymmetric modes of operations - Support for AES and Tripple DES encryption - Signature encryption - Keys encryption 4. SOAP message signature - XML signature with RSA-SHA1 - Message authentication with HMAC-SHA1 - Signature confirmation support - SOAP Header signing 5. WS-Security Policy (spec 1.1 & spec 1.2) based configurations - Support for both Symmetric as well as Asymmetric policy bindings - Support for different modes of key identifiers - Support for different algorithm suites [Basic128, Basic 192, Basic256, TrippleDES, Basic128Rsa15, Basic192Rsa15,Basic256Rsa15, TripleDesRsa15] - Support for IssuedToken assertion in client side. - Support for SAMLToken assertion. 6. Replay detection support - Easy to use built-in replay detection module - Ability to deploy a customized replay detection module 7. Different protection orders - Encrypt before signing - Sign before encrypting 8. Extensible modules - Password callback module - Authentication module - Credentials module - Replay detection module - Secure conversation token module 9. Keys management - Support for X509 token profile - Support for Key identifiers, Thumb prints, Issuer/Serial pairs, Embedded and Direct references - Support for PKCS12 keystore 10. WS-Secure Conversation Language support - Establishing Security Context and thereby maintaining a session - Per message key derivation - Support for stored securtiy context token - Rahas module support to give STS functionality to a service 11. WS-Trust Language support - Security Token Services (STS) - STS Client - Server and Client entrophy support 12. SAML Support - Support for Creation and Processing of SAML Core 1.1 Assertions - SAML Token as Sign Supporting Token - Signing and Encryption with SAML 10. Other - Easy to use deployment scripts - A comprehensive set of samples Major Changes Since Last Release -------------------------------- 1. WS-Secure Conversation Language support 2. WS-Trust Language support 3. Rahas module to give STS support to a service 4. PKCS12 Keystore support 5. Security Policy 1.2 support 6. Memory leak fixes 7. Many bug fixes Apache Rampart/C 1.3.0 works with the Apache Axis2/C 1.6.0 http://ws.apache.org/axis2/c/download.cgi Issues can be reported here. http://issues.apache.org/jira/browse/RAMPARTC We welcome your early feedback. Thank you for your interest in Rampart/C. --Apache Rampart/C Team-- http://ws.apache.org/rampart/c/