You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@cxf.apache.org by bu...@apache.org on 2015/11/27 13:47:49 UTC

svn commit: r973738 - in /websites/production/cxf/content: cache/docs.pageCache docs/jaxrs-oauth2-assertions.html

Author: buildbot
Date: Fri Nov 27 12:47:49 2015
New Revision: 973738

Log:
Production update by buildbot for cxf

Modified:
    websites/production/cxf/content/cache/docs.pageCache
    websites/production/cxf/content/docs/jaxrs-oauth2-assertions.html

Modified: websites/production/cxf/content/cache/docs.pageCache
==============================================================================
Binary files - no diff available.

Modified: websites/production/cxf/content/docs/jaxrs-oauth2-assertions.html
==============================================================================
--- websites/production/cxf/content/docs/jaxrs-oauth2-assertions.html (original)
+++ websites/production/cxf/content/docs/jaxrs-oauth2-assertions.html Fri Nov 27 12:47:49 2015
@@ -118,11 +118,11 @@ Apache CXF -- JAXRS OAuth2 Assertions
            <!-- Content -->
            <div class="wiki-content">
 <div id="ConfluenceContent"><h1 id="JAXRSOAuth2Assertions-JAXRS:OAuth2Assertions">JAXRS: OAuth2 Assertions</h1><p><style type="text/css">/*<![CDATA[*/
-div.rbtoc1435780229694 {padding: 0px;}
-div.rbtoc1435780229694 ul {list-style: disc;margin-left: 0px;}
-div.rbtoc1435780229694 li {margin-left: 0px;padding-left: 0px;}
+div.rbtoc1448628420980 {padding: 0px;}
+div.rbtoc1448628420980 ul {list-style: disc;margin-left: 0px;}
+div.rbtoc1448628420980 li {margin-left: 0px;padding-left: 0px;}
 
-/*]]>*/</style></p><div class="toc-macro rbtoc1435780229694">
+/*]]>*/</style></p><div class="toc-macro rbtoc1448628420980">
 <ul class="toc-indentation"><li><a shape="rect" href="#JAXRSOAuth2Assertions-JAXRS:OAuth2Assertions">JAXRS: OAuth2 Assertions</a></li><li><a shape="rect" href="#JAXRSOAuth2Assertions-Introduction">Introduction</a></li><li><a shape="rect" href="#JAXRSOAuth2Assertions-Mavendependencies">Maven dependencies</a></li><li><a shape="rect" href="#JAXRSOAuth2Assertions-SAML2Bearer">SAML2 Bearer</a>
 <ul class="toc-indentation"><li><a shape="rect" href="#JAXRSOAuth2Assertions-AccessTokenGrant">Access Token Grant</a>
 <ul class="toc-indentation"><li><a shape="rect" href="#JAXRSOAuth2Assertions-Clientcode">Client code</a></li><li><a shape="rect" href="#JAXRSOAuth2Assertions-AccessTokenService">Access Token Service</a></li></ul>
@@ -130,7 +130,7 @@ div.rbtoc1435780229694 li {margin-left:
 <ul class="toc-indentation"><li><a shape="rect" href="#JAXRSOAuth2Assertions-ClientCode">Client Code</a></li><li><a shape="rect" href="#JAXRSOAuth2Assertions-AccessTokenService.1">Access Token Service</a></li></ul>
 </li><li><a shape="rect" href="#JAXRSOAuth2Assertions-ClientActingonBehalfofItself">Client Acting on Behalf of Itself</a></li></ul>
 </li><li><a shape="rect" href="#JAXRSOAuth2Assertions-JWTBearer">JWT Bearer</a></li></ul>
-</div><h1 id="JAXRSOAuth2Assertions-Introduction">Introduction</h1><p><a shape="rect" class="external-link" href="http://tools.ietf.org/html/draft-ietf-oauth-v2" rel="nofollow">OAuth 2.0</a> supports different types of access token grants. <a shape="rect" class="external-link" href="http://tools.ietf.org/html/draft-ietf-oauth-assertions-10" rel="nofollow">OAuth2 Assertions</a> draft "provides a framework for the use of assertions<br clear="none"> with OAuth 2.0" and <a shape="rect" class="external-link" href="http://tools.ietf.org/html/draft-ietf-oauth-saml2-bearer-15" rel="nofollow">SAML2 Bearer Assertion Profiles for OAuth2</a> draft specifically provides for the use of SAML2 Bearer assertions.</p><p>These assertions can be used as token grants, but also, if needed, for getting 3rd party clients authenticated. Note the clients can use assertions as grants but use for example Basic authentication mechanism, or use say an authorization code grant and the assertion to authenticate, a
 nd finally, they can use assertions as a grant and as an authentication token.</p><p>Currently CXF supports SAML2 Bearer assertions as grants and authentication tokens.</p><p>See the <a shape="rect" href="jax-rs-oauth2.html">JAX-RS OAuth2</a> page for information about OAuth 2.0 support in CXF. Please also check the <a shape="rect" href="jax-rs-saml.html">JAX-RS SAML</a> page for more information about SAML support.</p><h1 id="JAXRSOAuth2Assertions-Mavendependencies">Maven dependencies</h1><div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent pdl">
+</div><h1 id="JAXRSOAuth2Assertions-Introduction">Introduction</h1><p><a shape="rect" class="external-link" href="http://tools.ietf.org/html/draft-ietf-oauth-v2" rel="nofollow">OAuth 2.0</a> supports different types of access token grants. <a shape="rect" class="external-link" href="http://tools.ietf.org/html/draft-ietf-oauth-assertions-10" rel="nofollow">OAuth2 Assertions</a> draft "provides a framework for the use of assertions with OAuth 2.0" and <a shape="rect" class="external-link" href="http://tools.ietf.org/html/draft-ietf-oauth-saml2-bearer-15" rel="nofollow">SAML2 Bearer Assertion Profiles for OAuth2</a> draft specifically provides for the use of SAML2 Bearer assertions.</p><p>These assertions can be used as token grants, but also, if needed, for getting 3rd party clients authenticated. Note the clients can use assertions as grants but use for example Basic authentication mechanism, or use say an authorization code grant and the assertion to authenticate, and finally, they 
 can use assertions as a grant and as an authentication token.</p><p>Currently CXF supports SAML2 Bearer assertions as grants and authentication tokens.</p><p>See the <a shape="rect" href="jax-rs-oauth2.html">JAX-RS OAuth2</a> page for information about OAuth 2.0 support in CXF. Please also check the <a shape="rect" href="jax-rs-saml.html">JAX-RS SAML</a> page for more information about SAML support.</p><h1 id="JAXRSOAuth2Assertions-Mavendependencies">Maven dependencies</h1><div class="code panel pdl" style="border-width: 1px;"><div class="codeContent panelContent pdl">
 <pre class="brush: xml; gutter: false; theme: Default" style="font-size:12px;">&lt;dependency&gt;
   &lt;groupId&gt;org.apache.cxf&lt;/groupId&gt;
   &lt;artifactId&gt;cxf-rt-rs-security-oauth2-saml&lt;/artifactId&gt;
@@ -198,7 +198,7 @@ ClientAccessToken at = OAuthClientUtils.
       &lt;ref bean="oauthJson"/&gt;
    &lt;/jaxrs:providers&gt;
    &lt;jaxrs:properties&gt;
-     &lt;entry key="ws-security.signature.properties" value="org/apache/cxf/systest/jaxrs/security/alice.properties"/&gt;
+     &lt;entry key="security.signature.properties" value="org/apache/cxf/systest/jaxrs/security/alice.properties"/&gt;
    &lt;/jaxrs:properties&gt;
 &lt;/jaxrs:server&gt;
 </pre>
@@ -254,13 +254,13 @@ ClientAccessToken at = OAuthClientUtils.
 <pre class="brush: java; gutter: false; theme: Default" style="font-size:12px;">JAXRSClientFactoryBean bean = new JAXRSClientFactoryBean();
 
 Map&lt;String, Object&gt; properties = new HashMap&lt;String, Object&gt;();
-properties.put("ws-security.callback-handler", 
+properties.put("security.callback-handler", 
                "org.apache.cxf.systest.jaxrs.security.saml.KeystorePasswordCallback");
-properties.put("ws-security.saml-callback-handler", 
+properties.put("security.saml-callback-handler", 
                "org.apache.cxf.systest.jaxrs.security.oauth2.SamlCallbackHandler2");
-properties.put("ws-security.signature.username", "alice");
-properties.put("ws-security.signature.properties", CRYPTO_RESOURCE_PROPERTIES);
-properties.put("ws-security.self-sign-saml-assertion", "true");
+properties.put("security.signature.username", "alice");
+properties.put("security.signature.properties", CRYPTO_RESOURCE_PROPERTIES);
+properties.put("security.self-sign-saml-assertion", "true");
 bean.setProperties(properties);
         
 bean.getOutInterceptors().add(new Saml2BearerAuthOutInterceptor());
@@ -299,7 +299,7 @@ ClientAccessToken at = OAuthClientUtils.
        &lt;/jaxrs:providers&gt;
        
        &lt;jaxrs:properties&gt;
-           &lt;entry key="ws-security.signature.properties" 
+           &lt;entry key="security.signature.properties" 
                   value="org/apache/cxf/systest/jaxrs/security/alice.properties"/&gt;
        &lt;/jaxrs:properties&gt;
         
@@ -338,13 +338,13 @@ ClientAccessToken at = OAuthClientUtils.
 <pre class="brush: java; gutter: false; theme: Default" style="font-size:12px;">JAXRSClientFactoryBean bean = new JAXRSClientFactoryBean();
 
 Map&lt;String, Object&gt; properties = new HashMap&lt;String, Object&gt;();
-properties.put("ws-security.callback-handler", 
+properties.put("security.callback-handler", 
                "org.apache.cxf.systest.jaxrs.security.saml.KeystorePasswordCallback");
-properties.put("ws-security.saml-callback-handler", 
+properties.put("security.saml-callback-handler", 
                "org.apache.cxf.systest.jaxrs.security.oauth2.SamlCallbackHandler2");
-properties.put("ws-security.signature.username", "alice");
-properties.put("ws-security.signature.properties", CRYPTO_RESOURCE_PROPERTIES);
-properties.put("ws-security.self-sign-saml-assertion", "true");
+properties.put("security.signature.username", "alice");
+properties.put("security.signature.properties", CRYPTO_RESOURCE_PROPERTIES);
+properties.put("security.self-sign-saml-assertion", "true");
 bean.setProperties(properties);
         
 bean.getOutInterceptors().add(new Saml2BearerAuthOutInterceptor());