This tutorial describes how to convert a Binary Security Token extracted from a SOAP message into a valid PEM format[…]
Read moreCategory: Security
XML Digital Signature (an Example)
In the last post, we looked at the steps involved in generating a digital signature using the XML Digital Signature[…]
Read moreXML Digital Signatures
The XML DSig specification is used to provide digital signature functionality to XML Documents. It is is used by numerous[…]
Read moreWhat is Authentication?
I’ve talked about authentication many times on ThinkMiddleware.com. It recently occurred to me that I have never devoted a blog[…]
Read moreShrewSoft VPN Client Has Problem After Windows 7 Laptop Sleeps with VPN Active
A few months ago I switched from using Cisco’s QuickVPN software to the ShrewSoft VPN Client for Windows. I’m not[…]
Read moreActive Directory Return Codes
While working with DataPower and Active Directory (acting as the User Repository) I have often run into situation where AD[…]
Read moreJBoss/PicketLink WS-Trust Client and Third-Party Security Token Services
Another use-case that I touched on during my JBoss World 2012 presentation was using the PicketLink WS-Trust Client implementation to[…]
Read moreJBoss and LTPAv2 support
I’ve been at a couple of different client sites where there was a heavy IBM product presence, the use of[…]
Read moreJBoss World 2012 Session–Trusted Security with JBoss Enterprise Application Platform
It’s been a few weeks since I have posted any updates. I started a new project at the beginning of[…]
Read moreFine Grained Authorization versus Coarse Grained Authorization
I was recently involved in a conversation where someone asked the question what is FGA (Fine Grained Authorization) versus Coarse[…]
Read more