source: TI12-security/trunk/python/ndg.security.test/ndg/security/test/attributeauthorityclient/attAuthorityClientTest.cfg @ 4855

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/TI12-security/trunk/python/ndg.security.test/ndg/security/test/attributeauthorityclient/attAuthorityClientTest.cfg@5053
Revision 4855, 2.7 KB checked in by pjkersha, 11 years ago (diff)
  • Got rid of additional refs to Q Public licence in headers
  • Added ndg.security.server.wsgi.openid.relyingparty package and started OpenIDRelyingPartyMiddleware wrapper to AuthKit?
  • fixed classfactory import bug
  • tested Attribute Authority over SSL with mod_wsgi with AA and SM client unit tests
Line 
1# NERC Data Grid Project
2#
3# P J Kershaw 16/01/07
4#
5# Copyright (C) 2009 Science and Technology Facilities Council
6#
7# This software may be distributed under the terms of the Q Public License,
8# version 1.0 or later.
9
10[setUp]
11# ! SiteBMapConfig.xml trusted site A aaURI setting must agree with this
12# setting for test6GetMappedAttCert
13#uri = http://localhost:5000/AttributeAuthority
14
15# With TCP Mon:
16#uri = http://localhost:4999/AttributeAuthority
17
18# Over SSL with mod_wsgi
19#uri = https://localhost/ndg/AttributeAuthority
20
21# For https connections only.  !Omit ssl* settings if using http!
22# sslpeercertcn is the expected CommonName of peer cert.  Omit if it's the
23# same as peer hostname.
24sslPeerCertCN = 
25sslCACertFilePathList = $NDGSEC_UNITTEST_CONFIG_DIR/ca/ndg-test-ca.crt
26
27[test02GetTrustedHostInfo]
28role = postgrad
29
30[test03GetTrustedHostInfoWithNoMatchingRoleFound]
31# Set an alternative role to test no matching role found exception
32role = blah
33 
34[test06GetAttCert]
35# Setup for use by test08GetMappedAttCert test
36attCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt.xml
37
38[test07GetAttCertWithUserIdSet]
39userId = system
40attCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt-test6.xml
41
42[test08GetMappedAttCert]
43uri = http://localhost:5100/AttributeAuthority
44userAttCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt.xml
45mappedAttCertFilePath = $NDGSEC_AACLNT_UNITTEST_DIR/mapped-ac.xml
46
47[test09GetMappedAttCertStressTest]
48uri = http://localhost:5100/AttributeAuthority
49userAttCertFilePathList = $NDGSEC_AACLNT_UNITTEST_DIR/ac-clnt.xml
50
51[wsse]
52# WS-Security settings for unit test AA clients
53#
54# OUTBOUND MESSAGE CONFIG
55
56# Signature of an outbound message
57
58# Certificate associated with private key used to sign a message.  The sign
59# method will add this to the BinarySecurityToken element of the WSSE header. 
60signingCertFilePath=$NDGSEC_UNITTEST_CONFIG_DIR/pki/wsse-clnt.crt
61
62# PEM encoded private key file
63signingPriKeyFilePath=$NDGSEC_UNITTEST_CONFIG_DIR/pki/wsse-clnt.key
64
65# Set the ValueType for the BinarySecurityToken added to the WSSE header for a
66# signed message.  See __setReqBinSecTokValType method and binSecTokValType
67# class variable for options - it may be one of X509, X509v3, X509PKIPathv1 or
68# give full namespace to alternative - see
69# ZSI.wstools.Namespaces.OASIS.X509TOKEN
70#
71# binSecTokValType determines whether signingCert or signingCertChain
72# attributes will be used.
73reqBinSecTokValType=X509v3
74
75# Add a timestamp element to an outbound message
76addTimestamp=True
77
78# For WSSE 1.1 - service returns signature confirmation containing signature
79# value sent by client
80applySignatureConfirmation=False
81
82#
83# INBOUND MESSAGE CONFIG
84
85# Provide a space separated list of file paths
86caCertFilePathList=$NDGSEC_UNITTEST_CONFIG_DIR/ca/ndg-test-ca.crt
87
Note: See TracBrowser for help on using the repository browser.