cxf-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From build...@apache.org
Subject svn commit: r825051 - in /websites/production/cxf/content: cache/docs.pageCache docs/jax-rs-saml.html docs/jax-rs.html docs/saml-web-sso.html
Date Sun, 08 Jul 2012 17:47:50 GMT
Author: buildbot
Date: Sun Jul  8 17:47:50 2012
New Revision: 825051

Log:
Production update by buildbot for cxf

Modified:
    websites/production/cxf/content/cache/docs.pageCache
    websites/production/cxf/content/docs/jax-rs-saml.html
    websites/production/cxf/content/docs/jax-rs.html
    websites/production/cxf/content/docs/saml-web-sso.html

Modified: websites/production/cxf/content/cache/docs.pageCache
==============================================================================
Binary files - no diff available.

Modified: websites/production/cxf/content/docs/jax-rs-saml.html
==============================================================================
--- websites/production/cxf/content/docs/jax-rs-saml.html (original)
+++ websites/production/cxf/content/docs/jax-rs-saml.html Sun Jul  8 17:47:50 2012
@@ -705,7 +705,7 @@ If the assertion signature is verified l
 
 <h1><a shape="rect" name="JAX-RSSAML-SAMLWebSSOProfile"></a>SAML Web SSO
Profile</h1>
 
-<p>Please see <a shape="rect" class="external-link" href="https://cwiki.apache.org/confluence/display/CXF20DOC/SAML+Web+SSO">this
page</a> for more information</p></div>
+<p>Please see <a shape="rect" href="saml-web-sso.html" title="SAML Web SSO">this
page</a> for more information</p></div>
            </div>
            <!-- Content -->
          </td>

Modified: websites/production/cxf/content/docs/jax-rs.html
==============================================================================
--- websites/production/cxf/content/docs/jax-rs.html (original)
+++ websites/production/cxf/content/docs/jax-rs.html Sun Jul  8 17:47:50 2012
@@ -375,7 +375,7 @@ Please see the configuration sections be
 <h2><a shape="rect" name="JAX-RS-Testing"></a>Testing</h2>
 
 <p>JAX-RS services can be easily tested using the embedded Jetty or CXF Local Transport.<br
clear="none">
-Please see the <span class="error">[JAXRS Testing]</span> page for more information.</p>
+Please see the <a shape="rect" class="external-link" href="https://cwiki.apache.org/confluence/display/CXF20DOC/JAXRS+Testing">JAXRS
Testing</a> page for more information.</p>
 
 <h2><a shape="rect" name="JAX-RS-Debugging"></a>Debugging</h2>
 

Modified: websites/production/cxf/content/docs/saml-web-sso.html
==============================================================================
--- websites/production/cxf/content/docs/saml-web-sso.html (original)
+++ websites/production/cxf/content/docs/saml-web-sso.html Sun Jul  8 17:47:50 2012
@@ -125,7 +125,7 @@ Apache CXF -- SAML Web SSO
 
 
 <div>
-<ul><li><a shape="rect" href="#SAMLWebSSO-Introduction">Introduction</a></li><ul><li><a
shape="rect" href="#SAMLWebSSO-TypicalFlow">Typical Flow</a></li></ul><li><a
shape="rect" href="#SAMLWebSSO-Mavendependencies">Maven dependencies</a></li><li><a
shape="rect" href="#SAMLWebSSO-IdentityProvider">Identity Provider</a></li><li><a
shape="rect" href="#SAMLWebSSO-ServiceProviderSecurityFilter">Service Provider Security
Filter</a></li><ul><li><a shape="rect" href="#SAMLWebSSO-RedirectBindingFilter">Redirect
Binding Filter</a></li><li><a shape="rect" href="#SAMLWebSSO-POSTBindingFilter">POST
Binding Filter</a></li><li><a shape="rect" href="#SAMLWebSSO-SigningSAMLAuthenticationRequests">Signing
SAML Authentication Requests</a></li><li><a shape="rect" href="#SAMLWebSSO-FiltersandStateManagement">Filters
and State Management</a></li></ul><li><a shape="rect" href="#SAMLWebSSO-RequestAssertionSecurityService">Request
Assertion Security Service</a></li><ul><li><a shape="rect" href="#SAM
 LWebSSO-DealingwithsignedSAMLResponses">Dealing with signed SAML Responses</a></li></ul><li><a
shape="rect" href="#SAMLWebSSO-SSOStateProvider">SSO State Provider</a></li></ul></div>
+<ul><li><a shape="rect" href="#SAMLWebSSO-Introduction">Introduction</a></li><ul><li><a
shape="rect" href="#SAMLWebSSO-TypicalFlow">Typical Flow</a></li></ul><li><a
shape="rect" href="#SAMLWebSSO-Mavendependencies">Maven dependencies</a></li><li><a
shape="rect" href="#SAMLWebSSO-IdentityProvider">Identity Provider</a></li><li><a
shape="rect" href="#SAMLWebSSO-ServiceProviderSecurityFilter">Service Provider Security
Filter</a></li><ul><li><a shape="rect" href="#SAMLWebSSO-RedirectBindingFilter">Redirect
Binding Filter</a></li><li><a shape="rect" href="#SAMLWebSSO-POSTBindingFilter">POST
Binding Filter</a></li><li><a shape="rect" href="#SAMLWebSSO-SigningSAMLAuthenticationRequests">Signing
SAML Authentication Requests</a></li><li><a shape="rect" href="#SAMLWebSSO-FiltersandStateManagement">Filters
and State Management</a></li></ul><li><a shape="rect" href="#SAMLWebSSO-RequestAssertionConsumerService">Request
Assertion Consumer Service</a></li><ul><li><a shape="rect" href="#SAM
 LWebSSO-DealingwithsignedSAMLResponses">Dealing with signed SAML Responses</a></li></ul><li><a
shape="rect" href="#SAMLWebSSO-SSOStateProvider">SSO State Provider</a></li></ul></div>
 
 <h1><a shape="rect" name="SAMLWebSSO-Introduction"></a>Introduction</h1>
 
@@ -364,9 +364,9 @@ If the custom SP application is 'spread'
 
 <p>Note that the stateTimeToLive property affects a Cookie 'Expires' property but also
used by filters and RACS to enforce that the internal state has not expired.</p>
 
-<h1><a shape="rect" name="SAMLWebSSO-RequestAssertionSecurityService"></a>Request
Assertion Security Service</h1>
+<h1><a shape="rect" name="SAMLWebSSO-RequestAssertionConsumerService"></a>Request
Assertion Consumer Service</h1>
 
-<p>Request Assertion Security Service receives a SAML Authentication Response and RelayState
token from IDP, uses the token to validate the response against the data available in the
original SAML Authentication Request, creates a security context if it does not already exists
for<br clear="none">
+<p>Request Assertion Consumer Service receives a SAML Authentication Response and RelayState
token from IDP, uses the token to validate the response against the data available in the
original SAML Authentication Request, creates a security context if it does not already exists
for<br clear="none">
 the current user, persists it and redirect the user back to the original endpoint. </p>
 
 <p>The RACS processes the SAML Response, and validates it in a number of ways:</p>



Mime
View raw message