473,396 Members | 2,090 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

WSE 2.0 Signing messages

In order to sign a message, you can use a UserName token from the client
(endpoint) , however must you use a X509 certificate to sign the response
message from the service (endpoint) ?

I am trying to figure out if I have to use X509 certs., service side, in
terms of signing messages, if not what alternatives could I use ?

Thanks in advance.
Nov 12 '05 #1
3 1957
Hi,

First of all, I would like to confirm my understanding of your issue. From
your description, I understand that you need to know if it is necessary to
sign the response message from the service when the request is signed. If
there is any misunderstanding, please feel free to let me know.

As far as I know, we can sign the response message but it is not required.
You can find more information with the following article: WS-Security
Drilldown in Web Services Enhancements 2.0.

http://msdn.microsoft.com/library/de...us/dnwse/html/
wssecdrill.asp

HTH.

Kevin Yu
=======
"This posting is provided "AS IS" with no warranties, and confers no
rights."

Nov 12 '05 #2
Actually the question was a bit more specific, I am aware that signing is
optional. Thanks for the link, however, I only found an example of signing
with the KerberosToken.

My question is as follows:
Can you sign a token on the service (i.e. server) endpoint with
UserNameToken, that would then be sent to the client endpoint ? If so, do you
know where I can find an example (code or reference) ?

Thanks.

"Kevin Yu [MSFT]" wrote:
Hi,

First of all, I would like to confirm my understanding of your issue. From
your description, I understand that you need to know if it is necessary to
sign the response message from the service when the request is signed. If
there is any misunderstanding, please feel free to let me know.

As far as I know, we can sign the response message but it is not required.
You can find more information with the following article: WS-Security
Drilldown in Web Services Enhancements 2.0.

http://msdn.microsoft.com/library/de...us/dnwse/html/
wssecdrill.asp

HTH.

Kevin Yu
=======
"This posting is provided "AS IS" with no warranties, and confers no
rights."

Nov 12 '05 #3
Yes, you can. You can sign a SOAP request by using a UsernameToken with
policy or code. A Web service can also sign the SOAP response by using
similar steps. Here is an article about this:

http://msdn.microsoft.com/library/de...us/wse/html/gx
consigningsoapmessageusingusernamepassword.asp

Another article with more information:
http://msdn.microsoft.com/msdnmag/is...n/default.aspx

HTH. Does this answer your question? If anything is unclear, please feel
free to let me know.

Kevin Yu
=======
"This posting is provided "AS IS" with no warranties, and confers no
rights."

Nov 12 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

10
by: Nick Mudge | last post by:
I currently have Windows XP, but I am thinking of changing my operating system to linux because all i want to do is web development with PHP, MySQL and Apache. Does anybody recommend the best...
3
by: Joel Leong | last post by:
I wish to know the industrial practices for signing assemblies with key files. I genereted a key file to sign my assemblies. Should I sign all my assemblies with a single key files or I shall...
1
by: Martin | last post by:
I have a couple of questions around code signing with MS technology: 1. Is there a way to transfer the generated strong name signing private key directly to a smartcard (or generate it on the...
0
by: cl | last post by:
I am using the "VeriSign Class 3 Code Signing" certificate for signing my Access program in Office 2003. Up to now, when program was installed on client machine, a form was appearing and user...
10
by: DBC User | last post by:
Hi All, Someone shed some light in to this strong name signing issue I have. My assembly uses a 3rd party controls so I end up distributing their dlls along with my assembly. I put this app in...
1
by: Jason Richmeier | last post by:
I have encountered an error while attempting to sign an assembly. I have become quite frustrated since I seem to be going in circles and making no progress. Hopefully someone will have the magic...
0
by: =?Utf-8?B?UmF2ZW4=?= | last post by:
I want to sign request messages with the private key of the X509 used by the client and the response messages must be signed by the server. Unfortunately, every binding in WCF seems to demand that...
2
by: elgin | last post by:
I have a split Access 2003 database. I have signed the database with a Code Signing Certificate from Small Business Server. This works fine and users can have Access macro security on high or...
6
by: raylopez99 | last post by:
Anybody use Strong Name Signing? I think this is used by default for Resource files, which is one reason perhaps I can't get my resource files to work (somehow the public key is messed up, perhaps...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.