Ce contenu n'est pas disponible dans la langue sélectionnée.
1.8. SwitchYard Security Quickstarts
The SwitchYard distribution contains security examples in the form of quickstart demos. The following is a brief description of each of the quickstarts:
Note
All the security quickstarts for SwitchYard are located in the
EAP_HOME/quickstarts/switchyard/demos
directory. You can find out more information from the Readme.md
file packaged with each.
- policy-security-basic
- This quickstart exposes a bean service through a soap binding. Confidentiality is provided via SSL, and client authentication via a HTTP Basic Authorization header.
- policy-security-basic-propagate
- This quickstart is similar to policy-security-basic, however the bean service additionally invokes a different back end bean service which also has security policy requirements. The client's security context (authenticated subject and credentials) is propagated to this secondary service.
- policy-security-cert
- This quickstart exposes a bean service through a soap binding. Confidentiality is provided via SSL, and client authentication via an X509 Certificate.
- policy-security-saml
- This quickstart exposes a bean service through a soap binding. Confidentiality is provided via SSL, and client authentication via a SAML assertion in the form of a token retrieved from PicketLink STS.
- policy-security-wss-signencrypt
- This quickstart exposes a bean service through a soap binding. Proper Signature and Encryption are enforced by JBossWS-CXF.
- policy-security-wss-username
- This quickstart exposes a bean service through a soap binding. Confidentiality is provided via SSL, and client authentication via a WS-Security UsernameToken which is handled by JBossWS-CXF.