Return-Path: X-Original-To: apmail-cxf-users-archive@www.apache.org Delivered-To: apmail-cxf-users-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id BF8D3177BE for ; Wed, 24 Jun 2015 12:56:45 +0000 (UTC) Received: (qmail 79967 invoked by uid 500); 24 Jun 2015 12:56:45 -0000 Delivered-To: apmail-cxf-users-archive@cxf.apache.org Received: (qmail 79901 invoked by uid 500); 24 Jun 2015 12:56:45 -0000 Mailing-List: contact users-help@cxf.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: users@cxf.apache.org Delivered-To: mailing list users@cxf.apache.org Received: (qmail 79885 invoked by uid 99); 24 Jun 2015 12:56:44 -0000 Received: from Unknown (HELO spamd4-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 24 Jun 2015 12:56:44 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd4-us-west.apache.org (ASF Mail Server at spamd4-us-west.apache.org) with ESMTP id 8B5CBC0F3C for ; Wed, 24 Jun 2015 12:56:44 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd4-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 2.233 X-Spam-Level: ** X-Spam-Status: No, score=2.233 tagged_above=-999 required=6.31 tests=[SPF_FAIL=0.919, URIBL_BLOCKED=0.001, URI_HEX=1.313] autolearn=disabled Received: from mx1-eu-west.apache.org ([10.40.0.8]) by localhost (spamd4-us-west.apache.org [10.40.0.11]) (amavisd-new, port 10024) with ESMTP id UYUvzRLC-M5G for ; Wed, 24 Jun 2015 12:56:35 +0000 (UTC) Received: from mbob.nabble.com (mbob.nabble.com [162.253.133.15]) by mx1-eu-west.apache.org (ASF Mail Server at mx1-eu-west.apache.org) with ESMTP id E49B32541E for ; Wed, 24 Jun 2015 12:56:34 +0000 (UTC) Received: from msam.nabble.com (unknown [162.253.133.85]) by mbob.nabble.com (Postfix) with ESMTP id 24DD4FA9A62 for ; Wed, 24 Jun 2015 05:57:11 -0700 (PDT) Date: Wed, 24 Jun 2015 05:56:33 -0700 (MST) From: Andrew To: users@cxf.apache.org Message-ID: <1435150593629-5758553.post@n5.nabble.com> In-Reply-To: References: <1434806070805-5758451.post@n5.nabble.com> Subject: Re: Caching and reusing SecureConversationToken - how? MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit coheigea wrote > What does your client code look like? Caching only works for the same > client proxy. If you are closing the proxy, or else creating a new one, > then the cached SecurityContextToken will not be retrieved. If you are > re-using the same client proxy, then the SecurityContextToken should be > retrieved from the cache + re-used. > > Colm. Right you are. My client is WSDL-first and uses the Java classes generated per the WSDL to get a new Proxy before each call. I changed it just now to reuse one and the same proxy for multiple requests, and the issued security token does indeed get reused. This is by design, right? Would it make sense / be possible for the same security token to be (re)used by distinct client proxy objects? In any event, I think my question is answered. Thanks! -- View this message in context: http://cxf.547215.n5.nabble.com/Caching-and-reusing-SecureConversationToken-how-tp5758451p5758553.html Sent from the cxf-user mailing list archive at Nabble.com.