Package org.apache.wss4j.dom
Class WSConstants
java.lang.Object
org.apache.wss4j.common.WSS4JConstants
org.apache.wss4j.dom.WSConstants
Constants in WS-Security spec.
-
Field Summary
FieldsModifier and TypeFieldDescriptionstatic final QNamewsse:BinarySecurityTokenas defined by WS Security specificationstatic final intstatic final intSets theorg.apache.wss4j.dom.message.WSSecSignature#build(Document, Crypto, WSSecHeader)method to send the signing certificate as aBinarySecurityToken.static final intCUSTOM_KEY_IDENTIFIERis used to set a KeyIdentifier to a particular ID The reference id and value type are set externally.static final intCUSTOM_SYMM_SIGNINGis used internally only to set a specific Signature behavior.static final intCUSTOM_SYMM_SIGNING_DIRECTis used internally only to set a specific Signature behavior.static final intstatic final QNamewsc:DerivedKeyTokenas defined by WS-SecureConversation specificationstatic final QNamewsc:DerivedKeyTokenas defined by WS-SecureConversation specification in WS-SXstatic final intstatic final intstatic final intstatic final intDeprecated.static final intDeprecated.static final intstatic final QNamesaml:EncryptedAssertionas defined by SAML v2.0 specificationstatic final QNamexenc:EncryptedDataas defined by XML Encryption specification, enhanced by WS Security specificationstatic final QNamexenc:EncryptedKeyas defined by XML Encryption specification, enhanced by WS Security specificationstatic final intENCRYPTED_KEY_SHA1_IDENTIFIERis used to set the specific key identifier EncryptedKeySHA1.static final intENDPOINT_KEY_IDENTIFIERis used to specify service endpoint as public key identifier.static final QNameThe security token could not be authenticated or authorizedstatic final QNameThe signature or decryption was invalidstatic final QNameAn error was discovered processing theheader static final QNameAn invalid security token was providedstatic final intSets theWSSecSignature.build(Crypto)or theWSSecEncrypt.build(Crypto, SecretKey)method to send the issuer name and the serial number of a certificate to the receiver.static final intSets theWSSecSignature.build(Crypto)or theWSSecEncrypt.build(Crypto, SecretKey)method to send the issuer name and the serial number of a certificate to the receiver.static final intKEY_VALUEis used to set a ds:KeyInfo/ds:KeyValue element to refer to either an RSA or DSA public key.static final QNameThe message has expiredstatic final intstatic final intstatic final QNamexenc:ReferenceListas defined by XML Encryption specification,static final QNamesaml:Assertionas defined by SAML v1.1 specificationstatic final QNamesaml:Assertionas defined by SAML v2.0 specificationstatic final intstatic final intstatic final QNamewsc:SecurityContextTokenas defined by WS-SecureConversation specificationstatic final QNamewsc:SecurityContextTokenas defined by WS-SecureConversation specification in WS-SXstatic final QNameReferenced security token could not be retrievedstatic final intstatic final intstatic final QNameds:Signatureas defined by XML Signature specification, enhanced by WS Security specificationstatic final QNamewsse11:signatureConfirmationas defined by OASIS WS Security specification,static final intSets theorg.apache.wss4j.dom.message.WSSecSignature#build(Document, Crypto, WSSecHeader)method to send aSubjectKeyIdentifierto identify the signing certificate.static final intstatic final intstatic final intTHUMPRINT_IDENTIFIERis used to set the specific key identifier ThumbprintSHA1.static final QNamewsu:Timestampas defined by OASIS WS Security specification,static final intstatic final QNameAn unsupported signature or encryption algorithm was usedstatic final QNameAn unsupported token was providedstatic final QNamewsse:UsernameTokenas defined by WS Security specificationstatic final intstatic final intstatic final intstatic final intUT_SIGNINGis used internally only to set a specific Signature behavior.static final intSets theorg.apache.wss4j.dom.message.WSSecSignature#build(Document, Crypto, WSSecHeader)or theorg.apache.wss4j.dom.message.WSSecEncrypt#build(Document, Crypto, WSSecHeader)method to send the certificate used to encrypt the symmetric key.static final intX509_SKIis used to set a ds:X509Data/ds:KeyValue element to refer to the base64 encoded plain value of a X509 V.3 SubjectKeyIdentifier extensionFields inherited from class org.apache.wss4j.common.WSS4JConstants
AES_128, AES_128_GCM, AES_192, AES_192_GCM, AES_256, AES_256_GCM, AGREEMENT_METHOD_ECDH_ES, AGREEMENT_METHOD_X25519, AGREEMENT_METHOD_X448, ASSERTION_LN, ATTR_ACTOR, ATTR_MUST_UNDERSTAND, ATTR_ROLE, BASE64_ENCODING, BINARY_TOKEN_LN, C14N_EXCL_OMIT_COMMENTS, C14N_EXCL_OMIT_COMMENTS_PREFIX, C14N_EXCL_WITH_COMMENTS, C14N_OMIT_COMMENTS, C14N_WITH_COMMENTS, CREATED_LN, DEFAULT_SOAP_PREFIX, DSA, ECDSA_SHA1, ECDSA_SHA256, ECDSA_SHA384, ECDSA_SHA512, ED25519, ED448, ELEM_BODY, ELEM_ENVELOPE, ELEM_HEADER, ENC_DATA_LN, ENC_KEY_LN, ENC_KEY_SHA1_URI, ENC_KEY_VALUE_TYPE, ENC_NS, ENC_PREFIX, ENC11_NS, ENC11_PREFIX, ENCRYPED_ASSERTION_LN, ENCRYPTED_HEADER, EXPIRES_LN, HMAC_MD5, HMAC_SHA1, HMAC_SHA256, HMAC_SHA384, HMAC_SHA512, ITERATION_LN, KERBEROS_NS11, KEYDERIVATION_CONCATKDF, KEYDERIVATION_HKDF, KEYINFO_LN, KEYTRANSPORT_RSA15, KEYTRANSPORT_RSAOAEP, KEYTRANSPORT_RSAOAEP_XENC11, KEYVALUE_LN, KEYWRAP_AES128, KEYWRAP_AES192, KEYWRAP_AES256, KEYWRAP_TRIPLEDES, MGF_SHA1, MGF_SHA224, MGF_SHA256, MGF_SHA384, MGF_SHA512, NONCE_LN, NS_XMLDSIG_ENVELOPED_SIGNATURE, NS_XMLDSIG_FILTER2, NULL_NS, OLD_WSSE_NS, PASSWORD_DIGEST, PASSWORD_LN, PASSWORD_TEXT, PASSWORD_TYPE_ATTR, PW_DIGEST, PW_NONE, PW_TEXT, REF_LIST_LN, REF_LN, RSA, RSA_SHA1, RSA_SHA256, RSA_SHA512, SALT_LN, SAML_ASSERTION_ID, SAML_NS, SAML2_ASSERTION_ID, SAML2_NS, SAMLP_NS, SAMLP2_NS, SAMLTOKEN_NS, SAMLTOKEN_NS11, SHA1, SHA256, SHA384, SHA512, SIG_INFO_LN, SIG_LN, SIG_NS, SIG_PREFIX, SIGNATURE_CONFIRMATION_LN, SOAPMESSAGE_NS, SOAPMESSAGE_NS11, SWA_ATTACHMENT_CIPHERTEXT_TRANS, SWA_ATTACHMENT_COMPLETE_SIG_TRANS, SWA_ATTACHMENT_CONTENT_SIG_TRANS, SWA_ATTACHMENT_ENCRYPTED_DATA_TYPE_COMPLETE, SWA_ATTACHMENT_ENCRYPTED_DATA_TYPE_CONTENT_ONLY, THUMBPRINT, TIMESTAMP_TOKEN_LN, TOKEN_TYPE, TRIPLE_DES, URI_SOAP11_ENV, URI_SOAP11_NEXT_ACTOR, URI_SOAP12_ENV, URI_SOAP12_NEXT_ROLE, URI_SOAP12_NONE_ROLE, URI_SOAP12_ULTIMATE_ROLE, URIS_SOAP_ENV, USERNAME_LN, USERNAME_TOKEN_LN, USERNAMETOKEN_NS, WSC_SCT, WSC_SCT_05_12, WSS_ENC_KEY_VALUE_TYPE, WSS_GSS_KRB_V5_AP_REQ, WSS_GSS_KRB_V5_AP_REQ1510, WSS_GSS_KRB_V5_AP_REQ4120, WSS_KRB_KI_VALUE_TYPE, WSS_KRB_V5_AP_REQ, WSS_KRB_V5_AP_REQ1510, WSS_KRB_V5_AP_REQ4120, WSS_SAML_KI_VALUE_TYPE, WSS_SAML_TOKEN_TYPE, WSS_SAML2_KI_VALUE_TYPE, WSS_SAML2_TOKEN_TYPE, WSS_USERNAME_TOKEN_VALUE_TYPE, WSSE_LN, WSSE_NS, WSSE_PREFIX, WSSE11_NS, WSSE11_PREFIX, WST_NS, WST_NS_05_12, WST_NS_08_02, WSU_NS, WSU_PREFIX, X509_CERT_LN, X509_DATA_LN, X509_ISSUER_NAME_LN, X509_ISSUER_SERIAL_LN, X509_SERIAL_NUMBER_LN, X509_SKI_LN, X509TOKEN_NS, XML_NS, XMLNS_NS, XOP_NS -
Method Summary
-
Field Details
-
BINARY_TOKEN
wsse:BinarySecurityTokenas defined by WS Security specification -
USERNAME_TOKEN
wsse:UsernameTokenas defined by WS Security specification -
TIMESTAMP
wsu:Timestampas defined by OASIS WS Security specification, -
SIGNATURE_CONFIRMATION
wsse11:signatureConfirmationas defined by OASIS WS Security specification, -
SIGNATURE
ds:Signatureas defined by XML Signature specification, enhanced by WS Security specification -
ENCRYPTED_KEY
xenc:EncryptedKeyas defined by XML Encryption specification, enhanced by WS Security specification -
ENCRYPTED_DATA
xenc:EncryptedDataas defined by XML Encryption specification, enhanced by WS Security specification -
REFERENCE_LIST
xenc:ReferenceListas defined by XML Encryption specification, -
SAML_TOKEN
saml:Assertionas defined by SAML v1.1 specification -
SAML2_TOKEN
saml:Assertionas defined by SAML v2.0 specification -
ENCRYPTED_ASSERTION
saml:EncryptedAssertionas defined by SAML v2.0 specification -
DERIVED_KEY_TOKEN_05_02
wsc:DerivedKeyTokenas defined by WS-SecureConversation specification -
SECURITY_CONTEXT_TOKEN_05_02
wsc:SecurityContextTokenas defined by WS-SecureConversation specification -
DERIVED_KEY_TOKEN_05_12
wsc:DerivedKeyTokenas defined by WS-SecureConversation specification in WS-SX -
SECURITY_CONTEXT_TOKEN_05_12
wsc:SecurityContextTokenas defined by WS-SecureConversation specification in WS-SX -
UNSUPPORTED_SECURITY_TOKEN
An unsupported token was provided -
UNSUPPORTED_ALGORITHM
An unsupported signature or encryption algorithm was used -
INVALID_SECURITY
An error was discovered processing theheader -
INVALID_SECURITY_TOKEN
An invalid security token was provided -
FAILED_AUTHENTICATION
The security token could not be authenticated or authorized -
FAILED_CHECK
The signature or decryption was invalid -
SECURITY_TOKEN_UNAVAILABLE
Referenced security token could not be retrieved -
MESSAGE_EXPIRED
The message has expired -
BST_DIRECT_REFERENCE
public static final int BST_DIRECT_REFERENCESets theorg.apache.wss4j.dom.message.WSSecSignature#build(Document, Crypto, WSSecHeader)method to send the signing certificate as aBinarySecurityToken. The signing method takes the signing certificate, converts it to aBinarySecurityToken, puts it in the security header, and inserts aReferenceto the binary security token into thewsse:SecurityReferenceToken. Thus the whole signing certificate is transfered to the receiver. The X509 profile recommends to useISSUER_SERIALinstead of sending the whole certificate. Please refer to WS Security specification X509 1.1 profile, chapter 3.3.2 and to WS Security SOAP Message security 1.1 specification, chapter 7.2 Note: only local references to BinarySecurityToken are supported- See Also:
-
ISSUER_SERIAL
public static final int ISSUER_SERIALSets theWSSecSignature.build(Crypto)or theWSSecEncrypt.build(Crypto, SecretKey)method to send the issuer name and the serial number of a certificate to the receiver. In contrast toBST_DIRECT_REFERENCEonly the issuer name and the serial number of the signing certificate are sent to the receiver. This reduces the amount of data being sent. The encryption method uses the public key associated with this certificate to encrypt the symmetric key used to encrypt data. The name format will delimit unicode characters with a '\' which is not compatible with Microsoft's WCF stack. To send issuer name with format that is compatible with WCF and Java useISSUER_SERIAL_QUOTE_FORMATPlease refer to WS Security specification X509 1.1 profile, chapter 3.3.3- See Also:
-
X509_KEY_IDENTIFIER
public static final int X509_KEY_IDENTIFIERSets theorg.apache.wss4j.dom.message.WSSecSignature#build(Document, Crypto, WSSecHeader)or theorg.apache.wss4j.dom.message.WSSecEncrypt#build(Document, Crypto, WSSecHeader)method to send the certificate used to encrypt the symmetric key. The encryption method uses the public key associated with this certificate to encrypt the symmetric key used to encrypt data. The certificate is converted into aKeyIdentifiertoken and sent to the receiver. Thus the complete certificate data is transferred to receiver. The X509 profile recommends to useISSUER_SERIALinstead of sending the whole certificate. Please refer to WS Security SOAP Message security 1.1 specification, chapter 7.3. Note that this is a NON-STANDARD method. The standard way to refer to an X.509 Certificate via a KeyIdentifier is to useSKI_KEY_IDENTIFIER- See Also:
-
SKI_KEY_IDENTIFIER
public static final int SKI_KEY_IDENTIFIERSets theorg.apache.wss4j.dom.message.WSSecSignature#build(Document, Crypto, WSSecHeader)method to send aSubjectKeyIdentifierto identify the signing certificate. Refer to WS Security specification X509 1.1 profile, chapter 3.3.1- See Also:
-
EMBEDDED_KEYNAME
Deprecated.Embeds a keyinfo/key name into the EncryptedData element.- See Also:
-
EMBED_SECURITY_TOKEN_REF
Deprecated.Embeds a keyinfo/wsse:SecurityTokenReference into EncryptedData element.- See Also:
-
UT_SIGNING
public static final int UT_SIGNINGUT_SIGNINGis used internally only to set a specific Signature behavior. The signing token is constructed from values in the UsernameToken according to WS-Trust specification.- See Also:
-
THUMBPRINT_IDENTIFIER
public static final int THUMBPRINT_IDENTIFIERTHUMPRINT_IDENTIFIERis used to set the specific key identifier ThumbprintSHA1. This identifier uses the SHA-1 digest of a security token to identify the security token. Please refer to chapter 7.2 of the OASIS WSS 1.1 specification.- See Also:
-
CUSTOM_SYMM_SIGNING
public static final int CUSTOM_SYMM_SIGNINGCUSTOM_SYMM_SIGNINGis used internally only to set a specific Signature behavior. The signing key, reference id and value type are set externally.- See Also:
-
ENCRYPTED_KEY_SHA1_IDENTIFIER
public static final int ENCRYPTED_KEY_SHA1_IDENTIFIERENCRYPTED_KEY_SHA1_IDENTIFIERis used to set the specific key identifier EncryptedKeySHA1. This identifier uses the SHA-1 digest of a security token to identify the security token. Please refer to chapter 7.3 of the OASIS WSS 1.1 specification.- See Also:
-
CUSTOM_SYMM_SIGNING_DIRECT
public static final int CUSTOM_SYMM_SIGNING_DIRECTCUSTOM_SYMM_SIGNING_DIRECTis used internally only to set a specific Signature behavior. The signing key, reference id and value type are set externally.- See Also:
-
CUSTOM_KEY_IDENTIFIER
public static final int CUSTOM_KEY_IDENTIFIERCUSTOM_KEY_IDENTIFIERis used to set a KeyIdentifier to a particular ID The reference id and value type are set externally.- See Also:
-
KEY_VALUE
public static final int KEY_VALUEKEY_VALUEis used to set a ds:KeyInfo/ds:KeyValue element to refer to either an RSA or DSA public key.- See Also:
-
ENDPOINT_KEY_IDENTIFIER
public static final int ENDPOINT_KEY_IDENTIFIERENDPOINT_KEY_IDENTIFIERis used to specify service endpoint as public key identifier. Constant is useful in case of symmetric holder of key, where token service can determine target service public key to encrypt shared secret.- See Also:
-
ISSUER_SERIAL_QUOTE_FORMAT
public static final int ISSUER_SERIAL_QUOTE_FORMATSets theWSSecSignature.build(Crypto)or theWSSecEncrypt.build(Crypto, SecretKey)method to send the issuer name and the serial number of a certificate to the receiver. In contrast toBST_DIRECT_REFERENCEonly the issuer name and the serial number of the signing certificate are sent to the receiver. This reduces the amount of data being sent. The encryption method uses the public key associated with this certificate to encrypt the symmetric key used to encrypt data. The issuer name format will use a quote delimited Rfc 2253 format if necessary which is recognized by the Microsoft's WCF stack. It also places a space before each subsequent RDN also required for WCF interoperability. In addition, this format is know to be correctly interpreted by Java. Please refer to WS Security specification X509 1.1 profile, chapter 3.3.3- See Also:
-
X509_SKI
public static final int X509_SKIX509_SKIis used to set a ds:X509Data/ds:KeyValue element to refer to the base64 encoded plain value of a X509 V.3 SubjectKeyIdentifier extension- See Also:
-
NO_SECURITY
public static final int NO_SECURITY- See Also:
-
UT
public static final int UT- See Also:
-
SIGN
public static final int SIGN- See Also:
-
ENCR
public static final int ENCR- See Also:
-
ST_UNSIGNED
public static final int ST_UNSIGNED- See Also:
-
ST_SIGNED
public static final int ST_SIGNED- See Also:
-
TS
public static final int TS- See Also:
-
UT_SIGN
public static final int UT_SIGN- See Also:
-
SC
public static final int SC- See Also:
-
NO_SERIALIZE
public static final int NO_SERIALIZE- See Also:
-
SERIALIZE
public static final int SERIALIZE- See Also:
-
SCT
public static final int SCT- See Also:
-
DKT
public static final int DKT- See Also:
-
BST
public static final int BST- See Also:
-
UT_NOPASSWORD
public static final int UT_NOPASSWORD- See Also:
-
CUSTOM_TOKEN
public static final int CUSTOM_TOKEN- See Also:
-
DKT_SIGN
public static final int DKT_SIGN- See Also:
-
DKT_ENCR
public static final int DKT_ENCR- See Also:
-