In the IVOA security standards, SOAP requests are authenticated by digital signature in the XML, following the WS-Security standard. The security facade includes an implementation of this authentication method for clients and services built with Apache Axis 1. The implementation is based on an old version of Apache WSS4J, adapted to support proxy certificates.
The signature on the message is performed by an Axis handler which is provided as a class in the security facade (org.astrogrid.security.AxisClientCredentialHandler). This handler canonicalizes the XML of the message, signs it and records the signature in a SOAP header.
The handler mechanism is specific to Axis; it is not the standard, JAX-RPC mechanism. If the client code can be broken into an Axis-specific part and a part that works generally with SOAP, then the handler should be set up in the Ais specific part.
The Axis handler must be configured when the AxisEngine for the client is configured. Axis' handler chains are effectively immutable and the security handler cannot easily be injected later.
If the client uses stub-classes created by Axis' WSDL2J, then the AxisEngine is configured programmatically. In this case, the security configuration must be passed when constructing the 'locator' object for the service in question.
import org.astrogrid.security.AxisClientSecurityGuard; XyzLocator locator = new XyzLocator(AxisClientSecurityGuard.getEngineConfiguration());
Note the use of a static method on AxisClientSecurityGuard to provide the configuration object. This configures the 'java', 'local' and 'http' transports with the signature handler and no other special handlers.
With the locator configured in this way, all proxy objects created from the locator will have the signature handler.
If the client's AxisEngine is being configured from a WSDD document, then the method above does not work. Instead, the WSDD document should declare org.astrogrid.security.AxisClientCredentialHandler as a request handler.
Credentials for the signature must be provided in a SecurityGuard object. The signature needs a certificate chain and a matching private-key. These are normally obtained when a user signs on to the IVO and are stored in the security guard.
The Axis part of the client needs an AxisClientSecurityGuard (a sub-class of SecurityGuard) to be able to pass the credentials to the signature handler. If the entire client is Axis-specific, then it can construct the AxisClientSecurityGuard directly and use that object to sign on.
import org.astrogrid.security.AxisClientSecurityGuard; AxisClientSecurityGuard sg = new AxisClientSecurityGuard(); sg.signOn( ... );
More commonly, the object that signs on is a generic SecurityGuard driven from an Axis-independent part of the application. In this case, the AxisClientSecurityGuard is constructed from the given guard.
import org.astrogrid.security.AxisClientSecurityGuard; import org.astrogrid.security.SecurityGuard; SecurityGuard sg1 = new SecurityGuard(); sg1.signOn( ... ); ... AxisClientSecurityGuard sg2 = new AxisClientSecurityGuard(sg1);
The Axis-specific guard must then be told to pass its credentials to the handler.
XyzPortType proxy = locator.getXyzPort(endpoint); axisGuard.configureStub((org.apache.axis.client.Stub)proxy);
This stub will now send signed messages when activated.
The signatures on incoming SOAP requests are checked by another Axis handler. If a message is correctly signed, then the associated principal (i.e. identity) is stored in the Axis message-context for later use in authorization checks.
The handler should be declared in the WSDD deployment-descriptor for the service. This is an example of a service configured with the handler.
<service name="SamplePort" provider="java:RPC"> <parameter name="className" value="org.astrogrid.security.sample.SampleImpl"/> <requestFlow> <handler type="java:org.astrogrid.security.AxisServiceCredentialHandler"/> </requestFlow> </service>
The type (class) of the handler must be exactly as shown above.
The service must be provided with a set of trust-anchor certificates written in PEM format. Each certificate is stored in a .pem file. There is a naming convention: the name of each file must be the hash value of the certificate it contains, suffixed with .0. In the unlikely event of certificates having the same has value, one should instead be given the suffix .1, .2, etc. as necessary to produce unique names.
The certificates should be grouped in directories. Ideally, just one directory contains all the trust anchors. Grid conventions, set by the Globus toolkit, say that the directory should be /etc/grid-security/certificates.
Your client will need a number of additional jars in order to operate the security handlers.