|
457 | 457 | <section> |
458 | 458 | <title>AcegiDigestPasswordValidationCallbackHandler</title> |
459 | 459 | <para> |
460 | | - The <classname>AcegiPlainTextPasswordValidationCallbackHandler</classname> requires an Acegi |
| 460 | + The <classname>AcegiDigestPasswordValidationCallbackHandler</classname> requires an Acegi |
461 | 461 | <classname>UserDetailService</classname> to operate. It uses this service to retrieve the password |
462 | 462 | of the user specified in the token. The digest of the password contained in this details object is |
463 | 463 | then compared with the digest in the message. If they are equal, the user has successfully |
|
483 | 483 | <para> |
484 | 484 | A more secure way of authentication uses X509 certificates. In this scenerario, the SOAP message |
485 | 485 | contains a <literal>BinarySecurityToken</literal>, which contains a Base 64-encoded version of a X509 |
486 | | - certificate. The recipient is used by the recipient to authenticate. The certificate stored in the |
| 486 | + certificate. The certificate is used by the recipient to authenticate. The certificate stored in the |
487 | 487 | message is also used to sign the message (see <xref linkend="security-verifying-signatures"/>). |
488 | 488 | </para> |
489 | 489 | <para> |
|
549 | 549 | </listitem> |
550 | 550 | <listitem> |
551 | 551 | <para> |
552 | | - If the certificate is not in the private keystore, the handler will check whether the |
| 552 | + If the certificate is not in the private keystore, the handler will check whether |
553 | 553 | the current date and time are within the validity period given in the certificate. |
554 | 554 | If they are not, the certificate is invalid; if it is, it will continue with the final |
555 | 555 | step. |
|
823 | 823 | To encrypt outgoing SOAP messages, the security policy file should contain a <literal>Encrypt</literal> |
824 | 824 | element. This element can further carry a <literal>EncryptionTarget</literal> element which indicates |
825 | 825 | which part of the message should be encrypted, and a <literal>SymmetricKey</literal> to indicate that a |
826 | | - shared secret instead of the regular private key should be used to decrypt the message. You can read a |
| 826 | + shared secret instead of the regular public key should be used to encrypt the message. You can read a |
827 | 827 | description of the other elements <ulink |
828 | 828 | url="http://java.sun.com/webservices/docs/1.6/tutorial/doc/XWS-SecurityIntro4.html#wp565951"> |
829 | 829 | <citetitle>here</citetitle></ulink>. |
|
0 commit comments