<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="ru">
		<id>http://www.jexp.ru/index.php?action=history&amp;feed=atom&amp;title=Java%2FWeb_Services_SOA%2FHTTPS</id>
		<title>Java/Web Services SOA/HTTPS - История изменений</title>
		<link rel="self" type="application/atom+xml" href="http://www.jexp.ru/index.php?action=history&amp;feed=atom&amp;title=Java%2FWeb_Services_SOA%2FHTTPS"/>
		<link rel="alternate" type="text/html" href="http://www.jexp.ru/index.php?title=Java/Web_Services_SOA/HTTPS&amp;action=history"/>
		<updated>2026-04-18T19:35:20Z</updated>
		<subtitle>История изменений этой страницы в вики</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>http://www.jexp.ru/index.php?title=Java/Web_Services_SOA/HTTPS&amp;diff=9221&amp;oldid=prev</id>
		<title>Admin: 1 версия</title>
		<link rel="alternate" type="text/html" href="http://www.jexp.ru/index.php?title=Java/Web_Services_SOA/HTTPS&amp;diff=9221&amp;oldid=prev"/>
				<updated>2010-06-01T07:27:44Z</updated>
		
		<summary type="html">&lt;p&gt;1 версия&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr style=&quot;vertical-align: top;&quot; lang=&quot;ru&quot;&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Предыдущая&lt;/td&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Версия 07:27, 1 июня 2010&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; style=&quot;text-align: center;&quot; lang=&quot;ru&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(нет различий)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>Admin</name></author>	</entry>

	<entry>
		<id>http://www.jexp.ru/index.php?title=Java/Web_Services_SOA/HTTPS&amp;diff=9220&amp;oldid=prev</id>
		<title> в 18:01, 31 мая 2010</title>
		<link rel="alternate" type="text/html" href="http://www.jexp.ru/index.php?title=Java/Web_Services_SOA/HTTPS&amp;diff=9220&amp;oldid=prev"/>
				<updated>2010-05-31T18:01:50Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Новая страница&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Doing the communication using HTTPS ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
  &amp;lt;!-- start source code --&amp;gt;&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;source lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Hello World Demo using HTTPS communications&lt;br /&gt;
=============================================&lt;br /&gt;
This demo takes the hello world demo a step further &lt;br /&gt;
by doing the communication using HTTPS.&lt;br /&gt;
Please review the README in the samples directory before&lt;br /&gt;
continuing.&lt;br /&gt;
&lt;br /&gt;
Prerequisite&lt;br /&gt;
------------&lt;br /&gt;
If your environment already includes cxf-manifest-incubator.jar on the&lt;br /&gt;
CLASSPATH, and the JDK and ant bin directories on the PATH&lt;br /&gt;
it is not necessary to run the environment script described in&lt;br /&gt;
the samples directory README.  If your environment is not&lt;br /&gt;
properly configured, or if you are planning on using wsdl2java,&lt;br /&gt;
javac, and java to build and run the demos, you must set the&lt;br /&gt;
environment by running the script.&lt;br /&gt;
&lt;br /&gt;
Building and running the demo using ant&lt;br /&gt;
---------------------------------------&lt;br /&gt;
From the samples/hello_world_https directory, the ant build script&lt;br /&gt;
can be used to build demo.&lt;br /&gt;
Using either UNIX or Windows:&lt;br /&gt;
  ant build&lt;br /&gt;
    &lt;br /&gt;
To remove the code generated from the WSDL file and the .class&lt;br /&gt;
files, run:&lt;br /&gt;
  ant clean&lt;br /&gt;
&lt;br /&gt;
The demo illustrates how authentication can be achieved through&lt;br /&gt;
configuration using 2 different scenarios. The non-defaulted security&lt;br /&gt;
policy values are be specified via configuration files.&lt;br /&gt;
Scenario 1:&lt;br /&gt;
A HTTPS listener is started up. The listener requires&lt;br /&gt;
client authentication so the client must provide suitable credentials.&lt;br /&gt;
The listener configuration is taken from the &amp;quot;CherryServer.cxf&amp;quot; file&lt;br /&gt;
located in this directory.  The client&amp;quot;s security data is taken from&lt;br /&gt;
from the &amp;quot;InsecureClient.cxf&amp;quot; file in this directory, using the bean name:&lt;br /&gt;
&amp;quot;{http://apache.org/hello_world_soap_http}SoapPort.http-conduit&amp;quot;. The&lt;br /&gt;
client does NOT provide the appropriate credentials and so the&lt;br /&gt;
invocation on the server fails.&lt;br /&gt;
To run:&lt;br /&gt;
  ant server&lt;br /&gt;
  ant insecure.client&lt;br /&gt;
Scenario 2: &lt;br /&gt;
The same HTTPS listener is used. The client&amp;quot;s security data is taken&lt;br /&gt;
from the &amp;quot;WibbleClient.cxf&amp;quot; configuration file in this directory, &lt;br /&gt;
using the bean name:&lt;br /&gt;
&amp;quot;{http://apache.org/hello_world_soap_http}SoapPort.http-conduit&amp;quot;. &lt;br /&gt;
The client is configured to provide its certificate &amp;quot;CN=Wibble&amp;quot; and&lt;br /&gt;
chain stored in the Java KeyStore &amp;quot;certs/wibble.jks&amp;quot; to the server. The&lt;br /&gt;
server authenticates the client&amp;quot;s certificate using its trust store&lt;br /&gt;
&amp;quot;certs/truststore.jks&amp;quot;, which holds the Certificate Authorities&amp;quot;&lt;br /&gt;
certificates.&lt;br /&gt;
Likewise the client authenticates the server&amp;quot;s certificate &amp;quot;CN=Cherry&amp;quot;&lt;br /&gt;
and chain against the same trust store.  Note also the usage of the&lt;br /&gt;
cipherSuitesFilter configuration in the configuration files,&lt;br /&gt;
where each party imposes different ciphersuites contraints, so that the&lt;br /&gt;
ciphersuite eventually negotiated during the TLS handshake is acceptable&lt;br /&gt;
to both sides. This may be viewed by adding a -Djavax.net.debug=all &lt;br /&gt;
argument to the JVM.&lt;br /&gt;
But please note that it is not adviseable to store sensitive data such&lt;br /&gt;
as passwords stored in a clear text configuration file, unless the&lt;br /&gt;
file is sufficiently protected by OS level permissions. The KeyStores&lt;br /&gt;
may be configured programatically so using user interaction may be&lt;br /&gt;
employed to keep passwords from being stored in configuration files.&lt;br /&gt;
The approach taken here is for demonstration reasons only. &lt;br /&gt;
&lt;br /&gt;
To run:&lt;br /&gt;
  ant server&lt;br /&gt;
  ant secure.client&lt;br /&gt;
Certificates:&lt;br /&gt;
If the certificates are expired for some reason, a shell script in &lt;br /&gt;
bin/gencerts.sh will generate the set of certificates needed for&lt;br /&gt;
this sample. Just do the following:&lt;br /&gt;
        cd certs&lt;br /&gt;
        sh ../bin/gencerts.sh&lt;br /&gt;
       &lt;br /&gt;
   &lt;br /&gt;
        &amp;lt;/source&amp;gt;&lt;br /&gt;
    &lt;br /&gt;
   &lt;br /&gt;
  &amp;lt;!-- end source code --&amp;gt;&lt;/div&gt;</summary>
			</entry>

	</feed>