OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.


Help: OASIS Mailing Lists Help | MarkMail Help

ws-sx message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]

Subject: Groups - WS-SX-ExamplesDocAndInteropMessages-cd-04 (ws-sp-usecases-examples-1.0-cd-04.zip) uploaded

This document is being submitted with the intention of it being voted on at
the next TC meeting as CD-04 and then submitted to TC-Admin for a ballot
for vote for CS.
Changes in this version include:
Updates requested by TC-Admin described in this email:
All updates were applied, except part of number 8, where the interop
document links were not updated because they are not approved committee
work and do not appear in oasis docs repos. Also the saml 1.1 link was not
updated, because it does not appear to be in the oasis docs repos, and the
current link is the same as that in the TC site and the oasis list of
All other requested links were updated.

 -- Rich Levinson

The document named WS-SX-ExamplesDocAndInteropMessages-cd-04
(ws-sp-usecases-examples-1.0-cd-04.zip) has been submitted by Rich Levinson
to the OASIS Web Services Secure Exchange (WS-SX) TC document repository.

Document Description:
This zip file contains the WS-SecurityPolicy Examples 1.0 document plus
sample message traces from an internal ws-sx virtual Interop conducted to
validate several use cases from the document. 
(samples may be found at:
http://docs.oasis-open.org/ws-sx/security-policy/examples/ ) 

The following is from the document abstract: 
This document contains examples of how to set up WS-SecurityPolicy [WSSP]
policies for a variety of common token types that are described in
WS-Security 1.0 [WSS10] and WS-Security 1.1 [WSS11] token profiles. 

Actual messages that have been documented in WS-Security TC and other
WS-Security-based Interops that conform to some of the example policies are
referenced when appropriate. 

The purpose of this document is to give examples of how policies may be
defined for several existing use cases that have been part of the
WS-Security Interops that have been conducted. In addition, some example
use cases have been included which show some variations from the
WS-Security Interop use cases in order to demonstrate how different options
and security bindings impact the structure of the policies.

View Document Details:

Download Document:  

PLEASE NOTE:  If the above links do not work for you, your email application
may be breaking the link into two pieces.  You may be able to copy and paste
the entire link address into the address field of your web browser.

-OASIS Open Administration

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]