Patterns on the wall. /Â John In this post, we are going to configure Red Hat SSO v7.1 for OpenID Connect[…]
Read moreAuthor: Robert Broeckelmann
Convert an X509v3 Binary Security Token to PEM Format
This tutorial describes how to convert a Binary Security Token extracted from a SOAP message into a valid PEM format[…]
Read moreWS-Security Integrity (XML Digital Signature)
This post continues exploring the use of XML Digital Signature; this time we look at WS-Security Integrity (use of XML[…]
Read moreXML Digital Signature (an Example)
In the last post, we looked at the steps involved in generating a digital signature using the XML Digital Signature[…]
Read moreXML Digital Signatures
The XML DSig specification is used to provide digital signature functionality to XML Documents. It is is used by numerous[…]
Read more XML Editor…
I was asked recently what XML, XSD and XSLT editor I use. Given that I am an independent/small consulting firm[…]
Read moreWhat is Authentication?
I’ve talked about authentication many times on ThinkMiddleware.com. It recently occurred to me that I have never devoted a blog[…]
Read moreDatapower SOMA Calls
The primary administration automation mechanism on IBM WebSphere DataPower appliances is the XML Management Interface. The XMI interface allows one[…]
Read moreShrewSoft VPN Client Has Problem After Windows 7 Laptop Sleeps with VPN Active
A few months ago I switched from using Cisco’s QuickVPN software to the ShrewSoft VPN Client for Windows. I’m not[…]
Read moreSOA Specs Visualized
In a previous blog post, I listed a number of SOA Specs and Security Specs that I thought were important[…]
Read more