summaryrefslogtreecommitdiffstats
path: root/sca-java-2.x/branches/2.0-Beta1/testing/itest/ws/http-ssl/README
diff options
context:
space:
mode:
Diffstat (limited to 'sca-java-2.x/branches/2.0-Beta1/testing/itest/ws/http-ssl/README')
-rw-r--r--sca-java-2.x/branches/2.0-Beta1/testing/itest/ws/http-ssl/README68
1 files changed, 0 insertions, 68 deletions
diff --git a/sca-java-2.x/branches/2.0-Beta1/testing/itest/ws/http-ssl/README b/sca-java-2.x/branches/2.0-Beta1/testing/itest/ws/http-ssl/README
deleted file mode 100644
index 41dcb8680b..0000000000
--- a/sca-java-2.x/branches/2.0-Beta1/testing/itest/ws/http-ssl/README
+++ /dev/null
@@ -1,68 +0,0 @@
-The module tests web service communications running over HTTPS. HTTPS is configured
-in this embedded test environment by adding the confidentiality intent to both
-reference and service and by configuring reference and service side policy sets
-to configure the web service binding appropriately to enable SSL.
-
-When running the web service binding in a container that itself is configured
-to provide SSL support these policy sets are not required. TODO can they themselves
-detect that they are not required.
-
-The SSL configuration depends on public/private key pairs and a keystore. This is how
-they are organized and generated
-
-
-Generate Private/Public keys into a keystore for use at the server
-------------------------------------------------------------------
-
-keytool -genkey -keyalg RSA -sigalg MD5withRSA -keysize 1024 -alias TuscanyUser -dname "CN=Tuscany Service, OU=Tuscany, O=Apache, L=Hursley, S=Hampshire, C=UK" -storetype JKS -keystore tuscany.jks -validity 9999 -keypass tuscany -storepass tuscany
-
-View the contents of the key store that result
-----------------------------------------------
-
-keytool -list -v -keystore tuscany.jks -storepass tuscany
-
-Keystore type: JKS
-Keystore provider: SUN
-
-Your keystore contains 1 entry
-
-Alias name: tuscanyuser
-Creation date: 26-Feb-2010
-Entry type: PrivateKeyEntry
-Certificate chain length: 1
-Certificate[1]:
-Owner: CN=Tuscany Service, OU=Tuscany, O=Apache, L=Hursley, ST=Hampshire, C=UK
-Issuer: CN=Tuscany Service, OU=Tuscany, O=Apache, L=Hursley, ST=Hampshire, C=UK
-Serial number: 4b87b4d7
-Valid from: Fri Feb 26 11:47:35 GMT 2010 until: Mon Jul 13 12:47:35 BST 2037
-Certificate fingerprints:
- MD5: C3:0C:D6:DF:F6:27:26:47:AD:41:44:CA:D7:98:FA:41
- SHA1: 2E:82:AD:F6:54:E0:C6:A5:47:5C:8C:9F:3B:5A:65:8E:F9:5A:40:07
- Signature algorithm name: MD5withRSA
- Version: 3
-
-
-IN THIS EMBEDDED TEST THE FOLLOWING ARE NOT REQUIRED AS BOTH REFERENCE AND SERVICES
-ARE RUNNING IN THE SAME JVM AND HAVE ACCESS TO THE SERVICE SIDE KEY STORE
-
-Generate the client side certificate
-------------------------------------
-
-keytool -export -alias TuscanyUser -file tuscany.cer -keystore tuscany.jks -storepass tuscany
-
-Print the contents of the generated certificate file
-----------------------------------------------------
-
-keytool -printcert -v -file tuscany.cer
-
-Owner: CN=Tuscany Service, OU=Tuscany, O=Apache, L=Hursley, ST=Hampshire, C=UK
-Issuer: CN=Tuscany Service, OU=Tuscany, O=Apache, L=Hursley, ST=Hampshire, C=UK
-Serial number: 4b87b4d7
-Valid from: Fri Feb 26 11:47:35 GMT 2010 until: Mon Jul 13 12:47:35 BST 2037
-Certificate fingerprints:
- MD5: C3:0C:D6:DF:F6:27:26:47:AD:41:44:CA:D7:98:FA:41
- SHA1: 2E:82:AD:F6:54:E0:C6:A5:47:5C:8C:9F:3B:5A:65:8E:F9:5A:40:07
- Signature algorithm name: MD5withRSA
- Version: 3
-
- \ No newline at end of file