OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.


Help: OASIS Mailing Lists Help | MarkMail Help

ws-sx message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]

Subject: Groups - WS-SX-ExamplesDocAndInteropMessages-wd-22.zip (WS-SX-ExamplesDocAndInteropMessages-wd-22.zip) uploaded

This draft (WD-22) is a modification of WD-21: 
This draft (WD-22) corrects the OASIS citations to have the proper format as
described in TC-Admin comments:
The purpose of this draft, WD-22, is the same as WD-21, which is to modify
the list of acknowledgements and get back to CS, whereby, the OASIS process
1. re-vote to CD (no pub rev reqd): vote was held and approved to move this
document (wd-21, now wd-22) to cd-02 at 3-Feb-10 TC mtg
2. revote to CS: the TC mtg above also voted to send the new cd-02 version
to TC-Admin for submission of ballot for revote of the TC. (This submission
is the document that has been created for that purpose.) 

 -- Rich Levinson

The document named WS-SX-ExamplesDocAndInteropMessages-wd-22.zip
(WS-SX-ExamplesDocAndInteropMessages-wd-22.zip) has been submitted by Rich
Levinson to the OASIS Web Services Secure Exchange (WS-SX) TC document

Document Description:
This zip file contains the WS-SecurityPolicy Examples 1.0 document plus
sample message traces from an internal ws-sx virtual Interop conducted to
validate several use cases from the document. 
The following is from the document abstract: 
This document contains examples of how to set up WS-SecurityPolicy [WSSP]
policies for a variety of common token types that are described in
WS-Security 1.0 [WSS10] and WS-Security 1.1 [WSS11] token profiles. 

Actual messages that have been documented in WS-Security TC and other
WS-Security-based Interops that conform to some of the example policies are
referenced when appropriate. 

The purpose of this document is to give examples of how policies may be
defined for several existing use cases that have been part of the
WS-Security Interops that have been conducted. In addition, some example
use cases have been included which show some variations from the
WS-Security Interop use cases in order to demonstrate how different options
and security bindings impact the structure of the policies.

View Document Details:

Download Document:  

PLEASE NOTE:  If the above links do not work for you, your email application
may be breaking the link into two pieces.  You may be able to copy and paste
the entire link address into the address field of your web browser.

-OASIS Open Administration

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]