Return-Path: X-Original-To: apmail-cxf-commits-archive@www.apache.org Delivered-To: apmail-cxf-commits-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 3EFADDC1B for ; Fri, 3 Aug 2012 15:48:11 +0000 (UTC) Received: (qmail 60278 invoked by uid 500); 3 Aug 2012 15:48:11 -0000 Delivered-To: apmail-cxf-commits-archive@cxf.apache.org Received: (qmail 60219 invoked by uid 500); 3 Aug 2012 15:48:11 -0000 Mailing-List: contact commits-help@cxf.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cxf.apache.org Delivered-To: mailing list commits@cxf.apache.org Received: (qmail 60206 invoked by uid 99); 3 Aug 2012 15:48:11 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 03 Aug 2012 15:48:11 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=5.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.4] (HELO eris.apache.org) (140.211.11.4) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 03 Aug 2012 15:48:09 +0000 Received: from eris.apache.org (localhost [127.0.0.1]) by eris.apache.org (Postfix) with ESMTP id 1A51A238889B for ; Fri, 3 Aug 2012 15:47:26 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: svn commit: r827840 - in /websites/production/cxf/content: cache/docs.pageCache docs/ws-securitypolicy.html Date: Fri, 03 Aug 2012 15:47:26 -0000 To: commits@cxf.apache.org From: buildbot@apache.org X-Mailer: svnmailer-1.0.8-patched Message-Id: <20120803154726.1A51A238889B@eris.apache.org> X-Virus-Checked: Checked by ClamAV on apache.org Author: buildbot Date: Fri Aug 3 15:47:25 2012 New Revision: 827840 Log: Production update by buildbot for cxf Modified: websites/production/cxf/content/cache/docs.pageCache websites/production/cxf/content/docs/ws-securitypolicy.html Modified: websites/production/cxf/content/cache/docs.pageCache ============================================================================== Binary files - no diff available. Modified: websites/production/cxf/content/docs/ws-securitypolicy.html ============================================================================== --- websites/production/cxf/content/docs/ws-securitypolicy.html (original) +++ websites/production/cxf/content/docs/ws-securitypolicy.html Fri Aug 3 15:47:25 2012 @@ -184,7 +184,7 @@ Apache CXF -- WS-SecurityPolicy

STS Client Configuration tags

-
ws-security.sts.client A reference to the STSClient class used to communicate with the STS.
ws-security.sts.applies-to The "AppliesTo" address to send to the STS. The default is the endpoint address of the service provider.
ws-security.sts.token.usecert Whether to write out an X509Certificate structure in UseKey/KeyInfo, or whether to write out a KeyValue structure. The default value is "false".
ws-security.sts.token.do.cancel Whether to cancel a token when using SecureConversation a fter successful invocation. The default is "false".
ws-security.cache.issued.token.in.endpoint Set this to "false" to not cache a SecurityToken per proxy object in the IssuedTokenInterceptorProvider. This should be done if a token is being retrieved from an STS in an intermediary. The default value is "true".
ws-security.sts.disable-wsmex-call-using-epr-address Whether to avoid STS client trying send WS-MetadataExchange call using STS EPR WSA address when the endpoint contract contains no WS-MetadataExchange info. The default value is "false".
ws-security.sts.token.crypto A Crypto object to be used for the STS. See here for more information.
ws-security.sts.token.properties The Crypto property configuration to use for the STS. See here for more information.
ws-security.sts.token.username The alias name in the keystore to get the user's public key to send to the STS for the PublicKey KeyType case.
ws-security.sts.token.act-as The token to be sent to the STS in an "ActAs" field. See here for more information.
ws-security.sts.token.on-behalf-of The token to be sent to the STS in an "OnBehalfOf" field. See here for more information.
+
ws-security.sts.client A reference to the STSClient class used to communicate with the STS.
ws-security.sts.applies-to The "AppliesTo" address to send to the STS. The default is the endpoint address of the service provider.
ws-security.sts.token.usecert If true, writes out an X509Certificate structure in UseKey/KeyInfo. If false (the default), writes out a KeyValue structure instead.
ws-security.sts.token.do.cancel Whether to cancel a token when using SecureConversation after succe ssful invocation. The default is "false".
ws-security.cache.issued.token.in.endpoint Set this to "false" to not cache a SecurityToken per proxy object in the IssuedTokenInterceptorProvider. This should be done if a token is being retrieved from an STS in an intermediary. The default value is "true".
ws-security.sts.disable-wsmex-call-using-epr-address Whether to avoid STS client trying send WS-MetadataExchange call using STS EPR WSA address when the endpoint contract contains no WS-MetadataExchange info. The default value is "false".
ws-security.sts.token.crypto A Crypto object to be used for the STS. See here for more information.
ws-security.sts.token.properties The Crypto property configuration to use for the STS. See here for more information.
ws-security.sts.token.username The alias name in the keystore to get the user's public key to send to the STS for the PublicKey KeyType case.
ws-security.sts.token.act-as The token to be sent to the STS in an "ActAs" field. See here for more information.
ws-security.sts.token.on-behalf-of The token to be sent to the STS in an "OnBehalfOf" field. See here for more information.