
git-svn-id: http://svn.us.apache.org/repos/asf/tuscany@965346 13f79535-47bb-0310-9956-ffa450edef68
68 lines
No EOL
2.8 KiB
Text
68 lines
No EOL
2.8 KiB
Text
The module tests web service communications running over HTTPS. HTTPS is configured
|
|
in this embedded test environment by adding the confidentiality intent to both
|
|
reference and service and by configuring reference and service side policy sets
|
|
to configure the web service binding appropriately to enable SSL.
|
|
|
|
When running the web service binding in a container that itself is configured
|
|
to provide SSL support these policy sets are not required. TODO can they themselves
|
|
detect that they are not required.
|
|
|
|
The SSL configuration depends on public/private key pairs and a keystore. This is how
|
|
they are organized and generated
|
|
|
|
|
|
Generate Private/Public keys into a keystore for use at the server
|
|
------------------------------------------------------------------
|
|
|
|
keytool -genkey -keyalg RSA -sigalg MD5withRSA -keysize 1024 -alias TuscanyUser -dname "CN=Tuscany Service, OU=Tuscany, O=Apache, L=Hursley, S=Hampshire, C=UK" -storetype JKS -keystore tuscany.jks -validity 9999 -keypass tuscany -storepass tuscany
|
|
|
|
View the contents of the key store that result
|
|
----------------------------------------------
|
|
|
|
keytool -list -v -keystore tuscany.jks -storepass tuscany
|
|
|
|
Keystore type: JKS
|
|
Keystore provider: SUN
|
|
|
|
Your keystore contains 1 entry
|
|
|
|
Alias name: tuscanyuser
|
|
Creation date: 26-Feb-2010
|
|
Entry type: PrivateKeyEntry
|
|
Certificate chain length: 1
|
|
Certificate[1]:
|
|
Owner: CN=Tuscany Service, OU=Tuscany, O=Apache, L=Hursley, ST=Hampshire, C=UK
|
|
Issuer: CN=Tuscany Service, OU=Tuscany, O=Apache, L=Hursley, ST=Hampshire, C=UK
|
|
Serial number: 4b87b4d7
|
|
Valid from: Fri Feb 26 11:47:35 GMT 2010 until: Mon Jul 13 12:47:35 BST 2037
|
|
Certificate fingerprints:
|
|
MD5: C3:0C:D6:DF:F6:27:26:47:AD:41:44:CA:D7:98:FA:41
|
|
SHA1: 2E:82:AD:F6:54:E0:C6:A5:47:5C:8C:9F:3B:5A:65:8E:F9:5A:40:07
|
|
Signature algorithm name: MD5withRSA
|
|
Version: 3
|
|
|
|
|
|
IN THIS EMBEDDED TEST THE FOLLOWING ARE NOT REQUIRED AS BOTH REFERENCE AND SERVICES
|
|
ARE RUNNING IN THE SAME JVM AND HAVE ACCESS TO THE SERVICE SIDE KEY STORE
|
|
|
|
Generate the client side certificate
|
|
------------------------------------
|
|
|
|
keytool -export -alias TuscanyUser -file tuscany.cer -keystore tuscany.jks -storepass tuscany
|
|
|
|
Print the contents of the generated certificate file
|
|
----------------------------------------------------
|
|
|
|
keytool -printcert -v -file tuscany.cer
|
|
|
|
Owner: CN=Tuscany Service, OU=Tuscany, O=Apache, L=Hursley, ST=Hampshire, C=UK
|
|
Issuer: CN=Tuscany Service, OU=Tuscany, O=Apache, L=Hursley, ST=Hampshire, C=UK
|
|
Serial number: 4b87b4d7
|
|
Valid from: Fri Feb 26 11:47:35 GMT 2010 until: Mon Jul 13 12:47:35 BST 2037
|
|
Certificate fingerprints:
|
|
MD5: C3:0C:D6:DF:F6:27:26:47:AD:41:44:CA:D7:98:FA:41
|
|
SHA1: 2E:82:AD:F6:54:E0:C6:A5:47:5C:8C:9F:3B:5A:65:8E:F9:5A:40:07
|
|
Signature algorithm name: MD5withRSA
|
|
Version: 3
|
|
|
|
|