Skip to content

RCBJ.NET Blog

The Intersection of Identity, Integration, API Management, and Application Security.

  • Contact Information
  • RCBJ.NET – About Us
  • Privacy Policy
  • rcbj.net Conventions
  • Quick Reference
  • Computer Measurements
  • Relevant Links

Category: Security

Convert an X509v3 Binary Security Token to PEM Format

December 30, 2012 RCBJ cryptography, diagnostics, Security, Uncategorized, xml

This tutorial describes how to convert a Binary Security Token extracted from a SOAP message into a valid PEM format[…]

Read more

XML Digital Signature (an Example)

November 4, 2012 RCBJ Security, Uncategorized, xml

In the last post, we looked at the steps involved in generating a digital signature using the XML Digital Signature[…]

Read more

XML Digital Signatures

October 28, 2012 RCBJ Security, Uncategorized, xml

The XML DSig specification is used to provide digital signature functionality to XML Documents.  It is is used by numerous[…]

Read more

What is Authentication?

October 14, 2012 RCBJ Security, Uncategorized

I’ve talked about authentication many times on ThinkMiddleware.com.  It recently occurred to me that I have never devoted a blog[…]

Read more

ShrewSoft VPN Client Has Problem After Windows 7 Laptop Sleeps with VPN Active

October 1, 2012 RCBJ Security, Uncategorized, VPN

A few months ago I switched from using Cisco’s QuickVPN software to the ShrewSoft VPN Client for Windows.  I’m not[…]

Read more

Active Directory Return Codes

September 2, 2012 RCBJ datapower, ldap, Security, Uncategorized

While working with DataPower and Active Directory (acting as the User Repository) I have often run into situation where AD[…]

Read more

JBoss/PicketLink WS-Trust Client and Third-Party Security Token Services

July 3, 2012 RCBJ JBoss, JBoss World, Security, soa, Uncategorized

Another use-case that I touched on during my JBoss World 2012 presentation was using the PicketLink WS-Trust Client implementation to[…]

Read more

JBoss and LTPAv2 support

July 3, 2012 RCBJ JBoss, JBoss World, Security, Speaking, Uncategorized

I’ve been at a couple of different client sites where there was a heavy IBM product presence, the use of[…]

Read more

JBoss World 2012 Session–Trusted Security with JBoss Enterprise Application Platform

July 1, 2012 RCBJ Security, Speaking, Uncategorized

It’s been a few weeks since I have posted any updates.  I started a new project at the beginning of[…]

Read more

Fine Grained Authorization versus Coarse Grained Authorization

June 5, 2012 RCBJ Security, Uncategorized

I was recently involved in a conversation where someone asked the question what is FGA (Fine Grained Authorization) versus Coarse[…]

Read more

Posts pagination

1 2 3 4 Next Posts»

Recent Posts

  • Using Curl With SPNEGO
  • SOFTWARE SUPPLY CHAIN SECURITY: CI/CD/CT PIPELINES AND SECURITY TOOLS: PART 2
  • SOFTWARE SUPPLY CHAIN SECURITY: CI/CD/CT PIPELINES AND SECURITY TOOLS: PART 1
  • Practical Business Continuity
  • Static Credentials Must Not Be Used In The Browser

Archives

  • November 2025
  • September 2025
  • September 2024
  • August 2024
  • May 2024
  • February 2021
  • July 2020
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • October 2016
  • August 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • October 2011
  • June 2011
  • April 2011
  • September 2010
  • July 2010
  • October 2009
  • August 2009
  • June 2009
  • May 2009
  • April 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • March 2008
  • December 2007
  • October 2007
  • February 2007
  • January 2007
  • November 2006
  • September 2006
  • August 2006

Categories

  • architecture
  • Browser
  • cryptography
  • datapower
  • development
  • diagnostics
  • ha
  • IBM JDK
  • internet
  • J2EE
  • java
  • JBoss
  • JBoss World
  • JEE
  • jvm
  • JVM Internals
  • ldap
  • networking
  • Performance
  • Recommended Reading
  • Security
  • Servlet
  • Servlet
  • soa
  • soa appliance
  • SOAP
  • Speaking
  • Sun JDK
  • Uncategorized
  • VPN
  • web
  • web service
  • Weblogic
  • websphere
  • xml
  • xpath
  • xslt
Log in
WordPress ThemeZee.
RCBJ.NET Blog
Proudly powered by WordPress Theme: Poseidon.
 

Loading Comments...