Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | More work exploring the policy extension model by implementing a token based ↵ | slaws | 2008-09-15 | 5 | -68/+25 |
| | | | | | | authentication schema across binding.ws and binding.jm. No authentication is actually performed here. That is left for users to provide their own policy interceptors. However tokens are passed and security Subjects/Principals are created. This exercise has highlighted some awkwardness in the process of building policy implementations. I'll post about this on the mail list. git-svn-id: http://svn.us.apache.org/repos/asf/tuscany@695374 13f79535-47bb-0310-9956-ffa450edef68 | ||||
* | Use basic authentication as a motivating scenario for looking at policy plug ↵ | slaws | 2008-09-05 | 7 | -0/+363 |
points. Generic username/password processing is added as an interceptor. Specific axis configuration is performed by new logic specific to binding.ws which is invoked if the basic auth policy is present (we need to think about this mechanism). I added a binding-ws-axis2-policy module as a replacement for policy-security-ws but haven't moved over to it yet. I also added a message header map to Message but have only been experimenting to date. git-svn-id: http://svn.us.apache.org/repos/asf/tuscany@692411 13f79535-47bb-0310-9956-ffa450edef68 |