[JBoss JIRA] Updated: (JBWS-926) JBoss to JBoss binary optimiztion
by Thomas Diesler (JIRA)
[ http://jira.jboss.com/jira/browse/JBWS-926?page=all ]
Thomas Diesler updated JBWS-926:
--------------------------------
Fix Version/s: jbossws-3.x
(was: jbossws-3.0.1)
> JBoss to JBoss binary optimiztion
> ---------------------------------
>
> Key: JBWS-926
> URL: http://jira.jboss.com/jira/browse/JBWS-926
> Project: JBoss Web Services
> Issue Type: Feature Request
> Security Level: Public(Everyone can see)
> Components: jbossws-native
> Reporter: Thomas Diesler
> Fix For: jbossws-3.x
>
>
> With WS the client and server are fundamentally disconnected and exchange XML documents that are valid in the context of the abstract contract defined in WSDL. Having said that, client/server implementations might not care about the abstract contract as long as there are no handlers involved that work on the SAAJ/DOM API. Currently all transport concerns are delegated to jboss-remoting. It would therefore be possible to implement a binary transfer of the SOAPMessage that is linked to a remoting protocol other than HTTP.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: http://jira.jboss.com/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
16 years, 10 months
[JBoss JIRA] Updated: (JBWS-1550) biometric authentication support
by Thomas Diesler (JIRA)
[ http://jira.jboss.com/jira/browse/JBWS-1550?page=all ]
Thomas Diesler updated JBWS-1550:
---------------------------------
Fix Version/s: jbossws-3.x
(was: jbossws-3.0.1)
> biometric authentication support
> --------------------------------
>
> Key: JBWS-1550
> URL: http://jira.jboss.com/jira/browse/JBWS-1550
> Project: JBoss Web Services
> Issue Type: Feature Request
> Security Level: Public(Everyone can see)
> Components: jbossws-native
> Reporter: William DeCoste
> Fix For: jbossws-3.x
>
>
> Intuit request. Notes:
> Desktop client presents user credentials to the server to assure confidentiality of user identity.
> The Desktop Client can be either a .NET client or a Java rich client. The Server is a business service running Java Web services using a Java EE Web / application server.
> The user credentials can be username tokens (e.g. user id and password), certificate tokens (e.g. X.509v3 certificates), binary tokens (e.g. biometrics, fingerprint). Certificate tokens or binary tokens are often used multi-factor authentication to assure confidentiality and to meet compliance requirements.
> ------------------------------------------------------------------------------------\
> Web browser presents user credentials to the server to assure confidentiality of user identity.
> The Web browser can be Microsoft Internet Explorer, or Firefox Web browser. The Server is a business service running Java Web services using a Java EE Web / application server.
> The user credentials can be username tokens (e.g. user id and password), digital certificates tokens (e.g. X.509v3 certificates), or binary tokens (e.g. biometrics, fingerprint). Certificate tokens or binary tokens are often used multi-factor authentication to assure confidentiality and to meet compliance requirements.
> --------------------------------------------------------------------------------------
> Third party presents user credentials via Web service to the server to assure confidentiality.
> Third party can be a remote trusted host (e.g. third party application), hosted application (e.g. in remote data center) or a trusted service provider that interact with Intuit Web services.
> The Web service can be SOAP or REST Web service. The Server is a business service running Java Web services using a Java EE Web / application server.
> The user credentials can be username tokens (e.g. user id and password), digital certificates tokens (e.g. X.509v3 certificates), binary tokens (e.g. biometrics, fingerprint) or a mixture of these tokens (as in multi-factor authentication).
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: http://jira.jboss.com/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
16 years, 10 months