Ignore:
Timestamp:
29/09/08 16:05:29 (11 years ago)
Author:
pjkersha
Message:

Working unit tests for WSGI based Attribute Authority.

  • Altered so that all Attribute Config is picked up from the Paste ini file. Separate cfg or xml based config file is still supported.

TODO:

  • Simplify unit test config for client.
File:
1 edited

Legend:

Unmodified
Added
Removed
  • TI12-security/trunk/java/axis2/xmlbWsseEchoClient/src/wssecurity/test/security/ndg/README.txt

    r4112 r4245  
    3636 avoid this step by setting up the build path to include the original axis2 install home?) 
    3737 14. Copy the $AXIS2_HOME\conf directory to the top level of the project 
    38  15. Copy the client.properties file from this project into the top level project directory 
     38 15. Copy the client.properties file from this project into the top level directory of your project 
    3939 16. Set up security keys to use: 
    40         a) $JAVA_HOME\bin\keytool -genkey -alias client -keystore client.jks -keypass apache -storepass apache -keyalg RSA 
     40        a) $JAVA_HOME/bin/keytool -genkey -alias client -keystore client.jks -keypass apache -storepass apache -keyalg RSA 
    4141        (NB, can adjust names, but key needs to be RSA format to be accepted by the python ZSI webservice library also, 
    4242        best to use the default keystore type of 'JKS' - since 'PKCS12' doesn't allow trusted certificates to be stored - so 
     
    4646                i) Firstly generate a certificate request via: 
    4747 
    48 $JAVA_HOME\bin\keytool -certreq -keystore client.jks -storepass apache -alias client -file client.cert.req 
     48$JAVA_HOME/bin/keytool -certreq -keystore client.jks -storepass apache -alias client -file client.cert.req 
    4949 
    5050                ii) Now, to get hold of a Certificate Authority key pair, copy the index.txt. openssl.cnf and serial files from  
     
    5353                 
    5454openssl req -x509 -newkey rsa:1024 -keyout cakey.pem -out cacert.pem -config openssl.cnf 
     55                Enter a password for the CA private key when prompted. 
    5556                (NB, some of the DN data that you input whilst running this command will need to match the DN 
    5657                data of the generated key that you want to sign - so try and ensure the data is similar - especially, avoid 
     
    7374                therwise you'll get a 'keytool error: java.lang.Exception: Failed to establish chain from reply') 
    7475                                 
    75 $JAVA_HOME\bin\keytool -import -file cacert.cert -keystore client.jks -storepass apache -alias ca 
    76 $JAVA_HOME\bin\keytool -import -file client.cert -keystore client.jks -storepass apache -alias client 
     76$JAVA_HOME/bin/keytool -import -file cacert.cert -keystore client.jks -storepass apache -alias ca 
     77$JAVA_HOME/bin/keytool -import -file client.cert -keystore client.jks -storepass apache -alias client 
    7778 
    7879        c) The last thing to do is import the public key of the service into the client keystore: 
    7980 
    80 %JAVA_HOME%\bin\keytool -import -alias service -file service.cert -keystore client -storepass apache 
     81$JAVA_HOME/bin/keytool -import -alias service -file service.cert -keystore client -storepass apache 
    8182 
    828317. Edit the contents of client.properties to ensure the file and password properties are set correctly. 
Note: See TracChangeset for help on using the changeset viewer.