??xml version="1.0" encoding="utf-8" standalone="yes"?>91成人高清,超碰在线免费看,精品久久人人做人人爱 http://www.aygfsteel.com/security/category/8296.htmlJava Security, CAPICOM, CryptoAPI/CSP, BouncyCastle, Openssl, JCE/JCA, SSO, CAS, Tivoli, CA, PKI
<br>
<font color="#00f100">本站内容只兼容IE览?lt;/font>
<br>
<font color="#00f100">重要的文章包均含本h的PGP{Q本人愿意对自己的言?lt;/font>
<br> zh-cn Tue, 04 Sep 2007 17:51:02 GMT Tue, 04 Sep 2007 17:51:02 GMT 60 关于配置Weblogic的NodeManager服务 http://www.aygfsteel.com/security/archive/2007/09/04/weblogic_Nodemanager_configuration.htmldavid.turing david.turing Tue, 04 Sep 2007 07:20:00 GMT http://www.aygfsteel.com/security/archive/2007/09/04/weblogic_Nodemanager_configuration.html http://www.aygfsteel.com/security/comments/142632.html http://www.aygfsteel.com/security/archive/2007/09/04/weblogic_Nodemanager_configuration.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/142632.html http://www.aygfsteel.com/security/services/trackbacks/142632.html 阅读全文 ]]> [原创] Pass SSL Certificate to Weblogic Cluster through Apache Proxy under SSL http://www.aygfsteel.com/security/archive/2007/01/13/PassSSLCertificateToApacheProxy.htmldavid.turing david.turing Sat, 13 Jan 2007 11:19:00 GMT http://www.aygfsteel.com/security/archive/2007/01/13/PassSSLCertificateToApacheProxy.html http://www.aygfsteel.com/security/comments/93632.html http://www.aygfsteel.com/security/archive/2007/01/13/PassSSLCertificateToApacheProxy.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/93632.html http://www.aygfsteel.com/security/services/trackbacks/93632.html through Apache Proxy under SSL.
Before you read this paper, please read another blog of mine( but not
necessary).
<>
http://www.aygfsteel.com/security/archive/2007/01/07/WeblogicClusterWithApacheProxyUnderSSL.html 阅读全文 ]]> [原创]Apache Proxy with Weblogic Cluster under SSL http://www.aygfsteel.com/security/archive/2007/01/07/WeblogicClusterWithApacheProxyUnderSSL.htmldavid.turing david.turing Sun, 07 Jan 2007 06:34:00 GMT http://www.aygfsteel.com/security/archive/2007/01/07/WeblogicClusterWithApacheProxyUnderSSL.html http://www.aygfsteel.com/security/comments/92211.html http://www.aygfsteel.com/security/archive/2007/01/07/WeblogicClusterWithApacheProxyUnderSSL.html#Feedback 1 http://www.aygfsteel.com/security/comments/commentRss/92211.html http://www.aygfsteel.com/security/services/trackbacks/92211.html 阅读全文 ]]> 发布一个简易版本的SecureXRCP http://www.aygfsteel.com/security/archive/2007/01/07/SecureXRCP.htmldavid.turing david.turing Sun, 07 Jan 2007 03:16:00 GMT http://www.aygfsteel.com/security/archive/2007/01/07/SecureXRCP.html http://www.aygfsteel.com/security/comments/92191.html http://www.aygfsteel.com/security/archive/2007/01/07/SecureXRCP.html#Feedback 1 http://www.aygfsteel.com/security/comments/commentRss/92191.html http://www.aygfsteel.com/security/services/trackbacks/92191.html 阅读全文 ]]> [原创]国内大部分的USBKey通过B/S方式QCAPICOMQ生数字签名的严重安全漏洞 http://www.aygfsteel.com/security/archive/2006/11/13/capicom_usbkey_danger.htmldavid.turing david.turing Mon, 13 Nov 2006 03:06:00 GMT http://www.aygfsteel.com/security/archive/2006/11/13/capicom_usbkey_danger.html http://www.aygfsteel.com/security/comments/80837.html http://www.aygfsteel.com/security/archive/2006/11/13/capicom_usbkey_danger.html#Feedback 6 http://www.aygfsteel.com/security/comments/commentRss/80837.html http://www.aygfsteel.com/security/services/trackbacks/80837.html 阅读全文 ]]> SecureX Eclipse Plugin Alpha2发布 http://www.aygfsteel.com/security/archive/2006/11/11/SecureX_Keytool_Eclipse_Plugin.htmldavid.turing david.turing Sat, 11 Nov 2006 05:56:00 GMT http://www.aygfsteel.com/security/archive/2006/11/11/SecureX_Keytool_Eclipse_Plugin.html http://www.aygfsteel.com/security/comments/80572.html http://www.aygfsteel.com/security/archive/2006/11/11/SecureX_Keytool_Eclipse_Plugin.html#Feedback 9 http://www.aygfsteel.com/security/comments/commentRss/80572.html http://www.aygfsteel.com/security/services/trackbacks/80572.html 阅读全文 ]]> 发布SecureX Eclipse Plugin 2.0.0 alpha版本 http://www.aygfsteel.com/security/archive/2006/11/08/SecureX-EclipsePlugin.htmldavid.turing david.turing Wed, 08 Nov 2006 08:45:00 GMT http://www.aygfsteel.com/security/archive/2006/11/08/SecureX-EclipsePlugin.html http://www.aygfsteel.com/security/comments/79890.html http://www.aygfsteel.com/security/archive/2006/11/08/SecureX-EclipsePlugin.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/79890.html http://www.aygfsteel.com/security/services/trackbacks/79890.html 阅读全文 ]]> [转蝲]推荐一下CSDN《程序员》的《开源大本营?/title> http://www.aygfsteel.com/security/archive/2006/11/06/opensource_security.htmldavid.turing david.turing Mon, 06 Nov 2006 00:54:00 GMT http://www.aygfsteel.com/security/archive/2006/11/06/opensource_security.html http://www.aygfsteel.com/security/comments/79309.html http://www.aygfsteel.com/security/archive/2006/11/06/opensource_security.html#Feedback 2 http://www.aygfsteel.com/security/comments/commentRss/79309.html http://www.aygfsteel.com/security/services/trackbacks/79309.html 阅读全文 ]]> Yale CAS as an Acegi Client in SpringSide http://www.aygfsteel.com/security/archive/2006/10/15/Acegi_as_CAS_client_Configuration.htmldavid.turing david.turing Sun, 15 Oct 2006 15:53:00 GMT http://www.aygfsteel.com/security/archive/2006/10/15/Acegi_as_CAS_client_Configuration.html http://www.aygfsteel.com/security/comments/75320.html http://www.aygfsteel.com/security/archive/2006/10/15/Acegi_as_CAS_client_Configuration.html#Feedback 1 http://www.aygfsteel.com/security/comments/commentRss/75320.html http://www.aygfsteel.com/security/services/trackbacks/75320.html 环境是CAS Server 3.0+Acegi 1.0+Tomcat 阅读全文 ]]> [原创] SSO(Single Sign-on) in Action(上篇) http://www.aygfsteel.com/security/archive/2006/10/02/sso_in_action.htmldavid.turing david.turing Mon, 02 Oct 2006 08:27:00 GMT http://www.aygfsteel.com/security/archive/2006/10/02/sso_in_action.html http://www.aygfsteel.com/security/comments/73199.html http://www.aygfsteel.com/security/archive/2006/10/02/sso_in_action.html#Feedback 12 http://www.aygfsteel.com/security/comments/commentRss/73199.html http://www.aygfsteel.com/security/services/trackbacks/73199.html 阅读全文 ]]> Tomcat/Weblogic在SSL握手中,IE提交证书H口为空的问?/title> http://www.aygfsteel.com/security/archive/2006/09/27/ssl_cacerts_no_certificate.htmldavid.turing david.turing Wed, 27 Sep 2006 03:38:00 GMT http://www.aygfsteel.com/security/archive/2006/09/27/ssl_cacerts_no_certificate.html http://www.aygfsteel.com/security/comments/72258.html http://www.aygfsteel.com/security/archive/2006/09/27/ssl_cacerts_no_certificate.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/72258.html http://www.aygfsteel.com/security/services/trackbacks/72258.html 讉Khttps://yourmachine:8843/webapp 的时候,客户端提交了I的证书H口Q如下图所C?br /> 如果使用的是TomcatQ则需要检查JDK/Jre/lib/security下的cacerts是否包含了客L用户 的Key所对应的CA证书Q如果没有,则客L出现上述H口Q因为,服务器端?br />会不信Q为客L的Private Key所{的ca证书Q?br /> 如果使用WeblogicQ需要要区分Use Custom Indentity和Use Java Keystore两种方式Q?br />前者,往Weblogic的JKS导入客户端PK所对应的CA证书Q链Q,后者,?br />Jre/lib/security的cacertsQ做法跟上面一栗?img src ="http://www.aygfsteel.com/security/aggbug/72258.html" width = "1" height = "1" /> ]]> 发现GDCA USBKey(电子钥匙)的CSP数字{实现存在~陷 http://www.aygfsteel.com/security/archive/2006/09/26/gdca_signature_problem.htmldavid.turing david.turing Tue, 26 Sep 2006 09:33:00 GMT http://www.aygfsteel.com/security/archive/2006/09/26/gdca_signature_problem.html http://www.aygfsteel.com/security/comments/72073.html http://www.aygfsteel.com/security/archive/2006/09/26/gdca_signature_problem.html#Feedback 5 http://www.aygfsteel.com/security/comments/commentRss/72073.html http://www.aygfsteel.com/security/services/trackbacks/72073.html 阅读全文 ]]> 9?3日成都WS-Security演讲内容E?/title> http://www.aygfsteel.com/security/archive/2006/09/22/WS_Security.htmldavid.turing david.turing Thu, 21 Sep 2006 17:03:00 GMT http://www.aygfsteel.com/security/archive/2006/09/22/WS_Security.html http://www.aygfsteel.com/security/comments/71223.html http://www.aygfsteel.com/security/archive/2006/09/22/WS_Security.html#Feedback 3 http://www.aygfsteel.com/security/comments/commentRss/71223.html http://www.aygfsteel.com/security/services/trackbacks/71223.html 阅读全文 ]]> Java安全概述 http://www.aygfsteel.com/security/archive/2006/09/21/java_security_summary.htmldavid.turing david.turing Wed, 20 Sep 2006 16:39:00 GMT http://www.aygfsteel.com/security/archive/2006/09/21/java_security_summary.html http://www.aygfsteel.com/security/comments/70959.html http://www.aygfsteel.com/security/archive/2006/09/21/java_security_summary.html#Feedback 2 http://www.aygfsteel.com/security/comments/commentRss/70959.html http://www.aygfsteel.com/security/services/trackbacks/70959.html 阅读全文 ]]> [原创]实施WebService Security[WS-Security1.0]的Encrypt和Sign模式(XFire+WSS4J) http://www.aygfsteel.com/security/archive/2006/08/08/xfire_wss4j.htmldavid.turing david.turing Tue, 08 Aug 2006 01:09:00 GMT http://www.aygfsteel.com/security/archive/2006/08/08/xfire_wss4j.html http://www.aygfsteel.com/security/comments/62283.html http://www.aygfsteel.com/security/archive/2006/08/08/xfire_wss4j.html#Feedback 26 http://www.aygfsteel.com/security/comments/commentRss/62283.html http://www.aygfsteel.com/security/services/trackbacks/62283.html 阅读全文 ]]> 在SpringSide实现XFire Webservice认证 http://www.aygfsteel.com/security/archive/2006/07/25/XFire_Webservice_Authentication.htmldavid.turing david.turing Tue, 25 Jul 2006 15:48:00 GMT http://www.aygfsteel.com/security/archive/2006/07/25/XFire_Webservice_Authentication.html http://www.aygfsteel.com/security/comments/60090.html http://www.aygfsteel.com/security/archive/2006/07/25/XFire_Webservice_Authentication.html#Feedback 3 http://www.aygfsteel.com/security/comments/commentRss/60090.html http://www.aygfsteel.com/security/services/trackbacks/60090.html XFire跟Spring的天然融合,让我们可以少努力10q就能简单地在Spring中用Webservice的强大魅力,我从AXIS专向XFire有一些冲动,也吃了不亏Q但受REST一族的强力ҎQ感觉还是值得试的,因此Q在公司的系l中也把Axisd换了XFire?br /> 回到SpringSideQ我大概介绍一下如何配|一个真正实用的XFire验证服务?br />SpringSide中的XFire配置文g攑֜Q?br />SpringSide -bookstore\src\org\springside\bookstore\plugins\webservice\applicationContext-webservice-server.xml 我们在里面定义各个WebserviceQ该文g其实对应于XFire官方的XFire-Servlet.xml 看看下面的BookServiceQ这是一个典型的Webservice服务Q红色的inHandlers是我挂上ȝ。它的意思是所有访问BookService的请求都会被先送到authenticationHandler d理,我们的验证逻辑可以在里面进行?br /> <!--Web Service 在SpringMVC中的URL 路径映射--> <bean class="org.springframework.web.servlet.handler.SimpleUrlHandlerMapping"> <property name="mappings"> <value>/BookService=bookWebService</value> </property> <property name="inHandlers"> <ref bean="authenticationHandler"/> </property> </bean> 我们接着看看authenticationHandler 的代码: 我们在SpringSide中通过header方式向服务器提供验证信息Q另外一U更单的方式是创Z个Login的webservice服务Q然后在XFire Session中徏立Token信息Q?br />package org.springside.bookstore.plugins.webservice.authentication; import org.apache.log4j.Logger; import org.codehaus.xfire.MessageContext; import org.codehaus.xfire.exchange.InMessage; import org.codehaus.xfire.fault.XFireFault; import org.codehaus.xfire.handler.AbstractHandler; import org.jdom.Element; import org.jdom.Namespace; /** * XFire的回调的HandlerQ在XFire配置文g中配|?br /> * Server端的认证模块Q回调处理模?br /> * * ClientAuthHandler跟AuthenticationHandler要一LQ或者都不用 * * @author david.turing * @blog openssl.blogjava.net * */ public class AuthenticationHandler extends AbstractHandler { private static final Logger log = Logger.getLogger(AuthenticationHandler. class ); public void invoke(MessageContext context) throws Exception { log.info( " #AuthenticationHandler is invoked " ); InMessage message = context.getInMessage(); final Namespace TOKEN_NS = Namespace.getNamespace( " SpringSide " , " http://service.webservice.plugins.bookstore.springside.org " ); if (message.getHeader() == null ) { throw new XFireFault( " GetRelation Service Should be Authenticated " , XFireFault.SENDER); } Element token = message.getHeader().getChild( " AuthenticationToken " , TOKEN_NS); if (token == null ) { throw new XFireFault( " Request must include authentication token. " , XFireFault.SENDER); } String username = token.getChild( " Username " , TOKEN_NS).getValue(); String password = token.getChild( " Password " , TOKEN_NS).getValue(); System.out.println( " username= " + username); System.out.println( " password= " + password); if (username == null || password == null ) throw new XFireFault( " Supplied Username and Password Please " , XFireFault.SENDER); /** * 查用户名密码是否正确 */ PasswordAuthenticationManager pamanager= new PasswordAuthenticationManager(); if ( ! pamanager.authenticate(username,password)) throw new XFireFault( " Authentication Fail! Check username/password " , XFireFault.SENDER); } } 注意QXFireFault异常是往客户端抛的,Webservice Client应该学会catch XFireFault. 服务器端是q么单,看看客户端的TestCasepackage org.springside.bookstore.plugins.webservice.service; import java.lang.reflect.Proxy; import java.net.MalformedURLException; import java.util.List; import org.codehaus.xfire.client.Client; import org.codehaus.xfire.client.XFireProxy; import org.codehaus.xfire.client.XFireProxyFactory; import org.codehaus.xfire.service.Service; import org.codehaus.xfire.service.binding.ObjectServiceFactory; import org.springside.bookstore.commons.domain.Book; import org.springside.bookstore.plugins.webservice.authentication.ClientAuthHandler; import junit.framework.TestCase; public class BookServiceWithAuthenticationTestCase extends TestCase { protected void setUp() throws Exception { super .setUp(); } protected void tearDown() throws Exception { super .tearDown(); } public void getBookFromWebservice() throws Exception{ Service serviceModel = new ObjectServiceFactory() .create(BookService. class ); BookService service = null ; try { service = (BookService) new XFireProxyFactory().create( serviceModel, " http://localhost:8080/springside/service/BookService " ); } catch (MalformedURLException e) { e.printStackTrace(); } Client client = ((XFireProxy) Proxy.getInvocationHandler(service)).getClient(); // 挂上ClientAuthHandlerQ提供认?/span> client.addOutHandler( new ClientAuthHandler()); List list = service.findBooksByCategory( null ); assertNotNull(list); for ( int i = 0 ;i < list.size();i ++ ) System.out.println(((Book)list.get(i)).getName()); } }
你应该看C面的client.addOutHandler(new ClientAuthHandler()); 没错Q它跟服务器端的AuthenticationHandler是一对,一起用的Q?br />也就是,每个被送往WebService服务的请求都被ClientAuthHandler处理q了?br />看看ClientAuthHandler做了些什么:package org.springside.bookstore.plugins.webservice.authentication; import org.apache.log4j.Logger; import org.codehaus.xfire.MessageContext; import org.codehaus.xfire.handler.AbstractHandler; import org.jdom.Element; import org.jdom.Namespace; /** * 客户端端的认证模块,回调处理模块 * 每个需要认证的WebServiceҎ都可以挂q个Handler * * 仅用于DemoQ从解耦和易用性出发, * 没有跟Acegil合Q你可以L扩展 * 默认用户?密码是admin/admin * * ClientAuthHandler跟AuthenticationHandler要一LQ或者都不用 * * @author david.turing * * @blog openssl.blogjava.net */ public class ClientAuthHandler extends AbstractHandler { private static final Logger log = Logger.getLogger(ClientAuthHandler. class ); // 客户端自己配|用户名密码或者更安全的KeyStore方式 private String username = " admin " ; private String password = " admin " ; public ClientAuthHandler() { } public ClientAuthHandler(String username,String password) { this .username = username; this .password = password; } public void setUsername(String username) { this .username = username; } public void setPassword(String password) { this .password = password; } public void invoke(MessageContext context) throws Exception { /** ***************************************** * Soap Header方式 * 从Soap Header中获取用户名密码 ****************************************** */ final Namespace ns = Namespace.getNamespace( " SpringSide " , " http://service.webservice.plugins.bookstore.springside.org " ); Element el = new Element( " header " ,ns); Element auth = new Element( " AuthenticationToken " , ns); Element username_el = new Element( " Username " ,ns); username_el.addContent(username); Element password_el = new Element( " Password " ,ns); password_el.addContent(password); auth.addContent(username_el); auth.addContent(password_el); el.addContent(auth); context.getCurrentMessage().setHeader(el); log.info( " ClientAuthHandler done! " ); } } 不就是往header里面注入username,passwordQ?br /> 在SpringSide中,所有的Spring配置文g都被白分散到各个Module中去了,Wuyu原先是在Plugin中提供Webservice功能Q因此,我仍然在Plugin中创建XFire接口?br />SpringSide的Spring配置文g攑֜:SpringSide -bookstore\webapp\WEB-INF\springmvc-servlet.xml 该文件定义了Plugin的xml: AuthenticationHandlerq个Bean需要先定义在Plugins-servlet.xml中,其它很简单,大家去Try一下就知道了?img src ="http://www.aygfsteel.com/security/aggbug/60090.html" width = "1" height = "1" /> ]]> How to use Java produce Signature by USBKey under CryptoAPI/CSP http://www.aygfsteel.com/security/archive/2006/07/11/java_cryptoapi_csp_signature.htmldavid.turing david.turing Tue, 11 Jul 2006 05:24:00 GMT http://www.aygfsteel.com/security/archive/2006/07/11/java_cryptoapi_csp_signature.html http://www.aygfsteel.com/security/comments/57638.html http://www.aygfsteel.com/security/archive/2006/07/11/java_cryptoapi_csp_signature.html#Feedback 1 http://www.aygfsteel.com/security/comments/commentRss/57638.html http://www.aygfsteel.com/security/services/trackbacks/57638.html 阅读全文 ]]> A Java Sample For jCaptcha http://www.aygfsteel.com/security/archive/2006/06/20/jcaptcha_sample.htmldavid.turing david.turing Tue, 20 Jun 2006 14:10:00 GMT http://www.aygfsteel.com/security/archive/2006/06/20/jcaptcha_sample.html http://www.aygfsteel.com/security/comments/54077.html http://www.aygfsteel.com/security/archive/2006/06/20/jcaptcha_sample.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/54077.html http://www.aygfsteel.com/security/services/trackbacks/54077.html 阅读全文 ]]> CAS协议的抓包分?/title> http://www.aygfsteel.com/security/archive/2006/05/26/sso_cas_traffic.htmldavid.turing david.turing Fri, 26 May 2006 03:27:00 GMT http://www.aygfsteel.com/security/archive/2006/05/26/sso_cas_traffic.html http://www.aygfsteel.com/security/comments/48284.html http://www.aygfsteel.com/security/archive/2006/05/26/sso_cas_traffic.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/48284.html http://www.aygfsteel.com/security/services/trackbacks/48284.html 阅读全文 ]]> 邮件与PGPl定Q徏立安全n份认证基 http://www.aygfsteel.com/security/archive/2006/05/10/45547.htmldavid.turing david.turing Wed, 10 May 2006 14:24:00 GMT http://www.aygfsteel.com/security/archive/2006/05/10/45547.html http://www.aygfsteel.com/security/comments/45547.html http://www.aygfsteel.com/security/archive/2006/05/10/45547.html#Feedback 13 http://www.aygfsteel.com/security/comments/commentRss/45547.html http://www.aygfsteel.com/security/services/trackbacks/45547.html 阅读全文 ]]> 关于[深入Java 2q_安全--体系架构、API设计和实玎ͼW二版)]的翻译质?/title> http://www.aygfsteel.com/security/archive/2006/05/03/44452.htmldavid.turing david.turing Wed, 03 May 2006 08:26:00 GMT http://www.aygfsteel.com/security/archive/2006/05/03/44452.html http://www.aygfsteel.com/security/comments/44452.html http://www.aygfsteel.com/security/archive/2006/05/03/44452.html#Feedback 1 http://www.aygfsteel.com/security/comments/commentRss/44452.html http://www.aygfsteel.com/security/services/trackbacks/44452.html 深入Java 2q_安全--体系架构、API设计和实玎ͼW二版)>>q本书已l出版:http://www.china-pub.com/computers/common/info.asp?id=14712 英文原版的书名是Inside Sun ?2 Platform Security: Architecture, API Design, and Implementation, Second Edition
我粗看了一下,发现书评中很多对本书译质量的怀疑,下蝲了Sample章节Q粗看了一下,发现?br />h意,实会给读者的理解带来很大的困难?br />我觉得Security的兴者无需太关注中文译作,也不需质疑译者和出版商,因ؓ译Security Topic的书c?br />本n是一仉常困隄事情Q除非译者对Java Security的概念非常清晎ͼ否则即哪怕是一个概念上的误译, 到可能会D读者生很谱的误解?br />Sun Security的内容不象一些实跉|的topicQ如SpringQHibernateQAjax那样Q可以通过大量的Sample来解释, 它需要读者具备一定的Security概念基础后,才能解释清楚Q即概念的理解门槛比较高Q?br />所以,我还是徏议,对于宫力大牛的大作,q是d看英文版和JDK SpecificationQ其实Sun的Java Security?br />Spesification很多都是宫力之手Q看着些Spesification当然没有看故事书那么舒服Q但认真咀嚼几ơ,效果 L看那些容易导致误解的译作要好得多?br /> 目前QJava Security的书基本上有两本Q?br />IBM专家l们~写的: Sun专家l编写的Q?br />Inside Sun ?2 Platform Security: Architecture, API Design, and Implementation, Second Edition By Li Gong , Gary Ellison , Mary Dageforde Publisher : Addison Wesley Pub Date : June 06, 2003 ISBN : 0-201-78791-1 Pages : 384 Slots : 1
q两本书Q前者更x于J2EE实践的角度出发,后者更偏重于从基础概念与Java Platform的角度出发,都是很好的书Q?br />很容易就能Emule到这两本书?br />我个人更偏向读者先l读后一本,然后再粗看前一本书的一些topic?br />两本书都基本上都没有花很大力去解析Java沙箱(SandBox)QJava权限控制模型{这些比较难搞得概念Q有炚w憾,希望 自己也能快抽时间提供一深入浅ZJava Security的文?) ]]> 如何从pfx/p12文g中提取RSA密钥长度及其他相关信?/title> http://www.aygfsteel.com/security/archive/2006/04/29/Java_Pfx_Pkcs12_x509.htmldavid.turing david.turing Sat, 29 Apr 2006 01:38:00 GMT http://www.aygfsteel.com/security/archive/2006/04/29/Java_Pfx_Pkcs12_x509.html http://www.aygfsteel.com/security/comments/43934.html http://www.aygfsteel.com/security/archive/2006/04/29/Java_Pfx_Pkcs12_x509.html#Feedback 12 http://www.aygfsteel.com/security/comments/commentRss/43934.html http://www.aygfsteel.com/security/services/trackbacks/43934.html 阅读全文 ]]> 剖析CAS Proxy的设计原?/title> http://www.aygfsteel.com/security/archive/2006/04/26/SSO_CASProxy.htmldavid.turing david.turing Wed, 26 Apr 2006 15:54:00 GMT http://www.aygfsteel.com/security/archive/2006/04/26/SSO_CASProxy.html http://www.aygfsteel.com/security/comments/43441.html http://www.aygfsteel.com/security/archive/2006/04/26/SSO_CASProxy.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/43441.html http://www.aygfsteel.com/security/services/trackbacks/43441.html 阅读全文 ]]> Confluence和AD的集成认?/title> http://www.aygfsteel.com/security/archive/2006/04/24/confluence_sso_with_AD_authentication.htmldavid.turing david.turing Mon, 24 Apr 2006 14:42:00 GMT http://www.aygfsteel.com/security/archive/2006/04/24/confluence_sso_with_AD_authentication.html http://www.aygfsteel.com/security/comments/42907.html http://www.aygfsteel.com/security/archive/2006/04/24/confluence_sso_with_AD_authentication.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/42907.html http://www.aygfsteel.com/security/services/trackbacks/42907.html http://confluence.atlassian.com/display/DOC/Enable+LDAP+authentication 该文档是完整q且正确的,配置也非常简单,Rayman很快配|好了。我后来发现他的配置Ҏ跟上q方法不一P他是Ҏ以下的文档配|的Q?br />http://confluence.atlassian.com/display/DEV/Confluence+LDAP+Integration q两U配|方式由比较大的区别Q如果你的Confluence跟JIRA捆绑Q请使用前者,否则Q徏议用后者?br /> 最后,隆重推荐Rayman的BlogQ?a >http://raymanzhang.cnblogs.com/ 一个曾l编写了MDict的好同志 ]]> WeblogicServerl定AD认证 http://www.aygfsteel.com/security/archive/2006/04/02/38718.htmldavid.turing david.turing Sun, 02 Apr 2006 04:05:00 GMT http://www.aygfsteel.com/security/archive/2006/04/02/38718.html http://www.aygfsteel.com/security/comments/38718.html http://www.aygfsteel.com/security/archive/2006/04/02/38718.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/38718.html http://www.aygfsteel.com/security/services/trackbacks/38718.html 2Q构造该域里面的用户 weblogic The default administration user DefaultAuthenticator user0001 weblogic DefaultAuthenticator user0002 user0002 DefaultAuthenticator 3Q徏立一个组QweblogicAdminQ同时在AD中也建立一个这Ll?br />注意Q在AD中的users而不是Builtin里面建组Q因Z者的DN是不一L?br />4Q将所有Weblogic中的user0001用户都加入到改组?br />5Q测试AD的可q接性,下蝲一个LDAP Browser?br />6Q在Weblogic Console中的Security->Realm的Authentication配置一个新的LDAP ProviderQ类型ؓQConfigure a new Active Directory Authenticator... 7Q配|参敎ͼ i) 转到Active Directory那一Tab,看到HOST了吧Q?br />HOSTZ的AD的IP或者主机名QAD默认端口?89 ii) Principal为CN=user0001,CN=Users,DC=dlsvr,DC=com 其中QDC=dlsvr,DC=com为我的服务器的RootDNQ例如DC=ibmQDC=comQ?br />很讨厌AD的一个地Ҏ它采用与其他LDAP不一L命名ҎQ他用CN=User而不是OU=....Q所以我前面的步骤才需要徏立一个welogicAdmin的组?br />iii)Credential为AD中user0001的密码?br />注意Qii)和iii)是用于连接AD用的Q构造一个LDAPConnection需要用户名密码的,懂不懂:Q?br />转到user tab iv) User Name AttributeQuser0001 v) User Base DNQCN=Users,DC=dlsvr,DC=com 转到group tab vi) Group Base DN:CN=weblogicAdmin,CN=Users,DC=dlsvr,DC=com vii) weblogicAdmin 保存 关键的步骤到了: Security->Realms->myrealm->Providers->Authentication 有没有看到Re-order the Configured Authentication Providers 对,是q里需要调整一下顺序?br />把ActiveDirectoryAuthenticator调整到最上面Q优先最高) 然后讄ActiveDirectoryAuthenticator的General里面的Control Flag为Required?br />接着DefaultAuthenticator里面的设成是OPTIONAL?br />于是QAD取代了以前的DefaultAuthenticator了,如果两个都RequriedQ那么也你要接受双重认证Q汗......一般不需要这栗?br />注意:boot.properties里面的默认的Weblogic启动账号同样受AD影响Q你如果在AD里面止了Weblogicq个账号Q我保证你WLS启动不了 ]]> CAS集成Weblogic的ServletAuthentication调用 http://www.aygfsteel.com/security/archive/2006/04/02/38716.htmldavid.turing david.turing Sun, 02 Apr 2006 04:02:00 GMT http://www.aygfsteel.com/security/archive/2006/04/02/38716.html http://www.aygfsteel.com/security/comments/38716.html http://www.aygfsteel.com/security/archive/2006/04/02/38716.html#Feedback 1 http://www.aygfsteel.com/security/comments/commentRss/38716.html http://www.aygfsteel.com/security/services/trackbacks/38716.html 本来Q用j_security_check是最单的Build-in认证方式Q但CAS有自qd入口Q即login servletQ如果用该servletQ必自己动手完成JAAS的登录。于是,开始扩展CAS的edu.yale.its.tp.cas.auth.providerQ在该包中的provider都扩展自authHandler接口Q而CAS是在web.xml中定义了最l用哪一个authHandler?br /> edu.yale.its.tp.cas.authHandler edu.yale.its.tp.cas.auth.provider.WeblogicHandler
我自己写了一个WeblogicHandler(edu.yale.its.tp.cas.auth.provider包中)Q专门让CASd到Weblogic ServerQ事实上Q将来如果不用WLSQ还可能使用WebsphereQJbossQAD之类?/p>
后来发现Q虽然能loginContext拿到SubjectQ但该Subject的Principal不能被页面的request.getPrincipal()所取得Q醒悟自己在做JAAS LoginQ查看weblogic文档Q原来Weblogic提供?br />weblogic.servlet.security.ServletAuthentication 用于在Servlet端调用JAAS接口q行dQ通过该接口登录后Q就如同User使用了标准的d机制d了Weblogic?br />于是Q立即修改了login servlet试一下,加入 try { CallbackHandler handler = new SimpleCallbackHandler( request.getParameter("username"), request.getParameter("password")); Subject mySubject = weblogic.security.services.Authentication .login(handler); weblogic.servlet.security.ServletAuthentication.runAs( mySubject, request); System.out.println("mySubject[" +mySubject.toString()+"]"+ "写入Session"); } catch (LoginException e) { // TODO Auto-generated catch block e.printStackTrace(); }
然后Q页面果然就能拿到Pincipal了?/p>
]]>Tomcat(直至5.5.9版本)不支持KeyStore和KeyEntry使用不同的password http://www.aygfsteel.com/security/archive/2006/04/02/38715.htmldavid.turing david.turing Sun, 02 Apr 2006 04:00:00 GMT http://www.aygfsteel.com/security/archive/2006/04/02/38715.html http://www.aygfsteel.com/security/comments/38715.html http://www.aygfsteel.com/security/archive/2006/04/02/38715.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/38715.html http://www.aygfsteel.com/security/services/trackbacks/38715.html 今天Q有朋友在配|Tomcat SSL的时候,出现如下的异常: java.security.UnrecoverableKeyException: Cannot recover key 而且他已l正配|了keystoreFile和keystorePass?br />后来我发玎ͼ他对Keystore中的Key使用了Password保护Q而且 保护q个KeyEntry的KeyPass!=KeyStore的KeypassQ导致出错, Tomcat SSL要求q两个密码必ȝ{?br />解决办法Q?br />keytool -keypasswd -v -alias mykeyalias -keypass noequalpass -new equalpass -keystore mykeystore.jks -storepass equalpass 其中Q?mykeyalias是key在keystore中的别名Q?keypass后面跟key的旧密码"noequalpass", -new 是新密码"equalpass",注意新密码跟storepass一致?/p>
附:Weblogic是支持不一致的KeystorePass和KeyPass的?/p>
]]> JVM是怎樣進行授權控制?/title> http://www.aygfsteel.com/security/archive/2006/04/02/38714.htmldavid.turing david.turing Sun, 02 Apr 2006 03:53:00 GMT http://www.aygfsteel.com/security/archive/2006/04/02/38714.html http://www.aygfsteel.com/security/comments/38714.html http://www.aygfsteel.com/security/archive/2006/04/02/38714.html#Feedback 0 http://www.aygfsteel.com/security/comments/commentRss/38714.html http://www.aygfsteel.com/security/services/trackbacks/38714.html 阅读全文 ]]> 发布SecureX 2.0.0——KeyTool Eclipse Plugin+CryptoAPI Integrated+Java Watermark http://www.aygfsteel.com/security/archive/2006/03/17/SecureX.htmldavid.turing david.turing Fri, 17 Mar 2006 02:38:00 GMT http://www.aygfsteel.com/security/archive/2006/03/17/SecureX.html http://www.aygfsteel.com/security/comments/35781.html http://www.aygfsteel.com/security/archive/2006/03/17/SecureX.html#Feedback 8 http://www.aygfsteel.com/security/comments/commentRss/35781.html http://www.aygfsteel.com/security/services/trackbacks/35781.html 版本1.0.0 阅读全文 ]]> 使用PGP你的文章q行{ http://www.aygfsteel.com/security/archive/2006/03/09/34511.htmldavid.turing david.turing Thu, 09 Mar 2006 09:24:00 GMT http://www.aygfsteel.com/security/archive/2006/03/09/34511.html http://www.aygfsteel.com/security/comments/34511.html http://www.aygfsteel.com/security/archive/2006/03/09/34511.html#Feedback 5 http://www.aygfsteel.com/security/comments/commentRss/34511.html http://www.aygfsteel.com/security/services/trackbacks/34511.html 阅读全文 ]]>
վ֩ģ壺
|
µ |
|
ɽ |
|
|
ҵ |
¡ |
ɽ |
̨ |
|
ƽ |
|
|
Ѷ
|
ɽ |
̺ |
|
|
ƺ |
|
|
۷ |
|
² |
ƶ |
|
|
|
μԴ |
Ϫ |
|
Ī |
¡ |
|
|
|
߷ |
ӳ |
|
Ϸ |