You are viewing a plain text version of this content. The canonical link for it is here.
- [jira] Updated: (RAMPARTC-39) WS-Trust implementation for Ramapart/C - posted by "Kasun Indrasiri (JIRA)" <ji...@apache.org> on 2007/12/01 05:58:43 UTC, 3 replies.
- [jira] Resolved: (RAMPARTC-49) sample for symmetric encrypt before signature + encrypt signature - posted by "Malinda Kaushalye Kapuruge (JIRA)" <ji...@apache.org> on 2007/12/04 17:08:43 UTC, 0 replies.
- [jira] Resolved: (RAMPARTC-50) Need new sample scenarios for symmetric bindings - posted by "Malinda Kaushalye Kapuruge (JIRA)" <ji...@apache.org> on 2007/12/04 17:08:43 UTC, 0 replies.
- [jira] Resolved: (RAMPARTC-53) If the server has policy file with out signing enable server does not send an error message when the client send a message with signing enable - posted by "Malinda Kaushalye Kapuruge (JIRA)" <ji...@apache.org> on 2007/12/06 08:51:43 UTC, 0 replies.
- [jira] Resolved: (RAMPARTC-43) Need to use derived keys to sign the SOAP message - posted by "Malinda Kaushalye Kapuruge (JIRA)" <ji...@apache.org> on 2007/12/06 08:53:43 UTC, 0 replies.
- [jira] Closed: (RAMPARTC-43) Need to use derived keys to sign the SOAP message - posted by "Malinda Kaushalye Kapuruge (JIRA)" <ji...@apache.org> on 2007/12/06 08:53:43 UTC, 0 replies.
- [jira] Resolved: (RAMPARTC-36) Symmetric binding in WS Security Policy - posted by "Malinda Kaushalye Kapuruge (JIRA)" <ji...@apache.org> on 2007/12/06 09:00:43 UTC, 0 replies.
- [jira] Resolved: (RAMPARTC-46) Security header processing has to be changed to support the strict layout - posted by "Malinda Kaushalye Kapuruge (JIRA)" <ji...@apache.org> on 2007/12/07 11:57:43 UTC, 0 replies.
- [jira] Closed: (RAMPARTC-21) Rampart build fails on x86_64 platform. - posted by "Dumindu Pallewela (JIRA)" <ji...@apache.org> on 2007/12/10 11:44:43 UTC, 0 replies.
- [jira] Created: (RAMPARTC-54) Rampart need to follow the axis2 error definition pattern - posted by "Malinda Kaushalye Kapuruge (JIRA)" <ji...@apache.org> on 2007/12/13 09:31:42 UTC, 0 replies.