[cxf-fediz] branch master updated: examples: update springPreauthWebapp to run OOTB (#41)

classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

[cxf-fediz] branch master updated: examples: update springPreauthWebapp to run OOTB (#41)

buhhunyx
This is an automated email from the ASF dual-hosted git repository.

buhhunyx pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/cxf-fediz.git


The following commit(s) were added to refs/heads/master by this push:
     new 4c7632f  examples: update springPreauthWebapp to run OOTB (#41)
4c7632f is described below

commit 4c7632fb24eaf2fd209ecbdfe13463ac21b1cd7f
Author: Alexey Markevich <[hidden email]>
AuthorDate: Thu May 21 17:03:27 2020 +0300

    examples: update springPreauthWebapp to run OOTB (#41)
---
 examples/springPreauthWebapp/README.txt                       | 8 ++++----
 examples/springPreauthWebapp/src/main/config/fediz_config.xml | 4 +++-
 2 files changed, 7 insertions(+), 5 deletions(-)

diff --git a/examples/springPreauthWebapp/README.txt b/examples/springPreauthWebapp/README.txt
index a6c7e60..4851060 100644
--- a/examples/springPreauthWebapp/README.txt
+++ b/examples/springPreauthWebapp/README.txt
@@ -12,7 +12,7 @@ fediz is integrated into spring security natively.
 
 The Spring Security reference documentation provides more background information
 about Pre-Authentication support in Spring Security:
-http://static.springsource.org/spring-security/site/docs/3.2.x/reference/springsecurity-single.html#preauth
+https://docs.spring.io/spring-security/site/docs/4.2.x/reference/htmlsingle/#preauth
 
 Running this sample consists of four steps:
 
@@ -27,7 +27,7 @@ Configure the Tomcat-IDP
 ------------------------
 Make sure the separate Tomcat instance hosting the Fediz IDP and IDP
 STS has been configured and is running as described here:  
-http://cxf.apache.org/fediz-idp.html.  Confirm the STS is active by
+http://cxf.apache.org/fediz-idp-11.html.  Confirm the STS is active by
 checking that the WSDL is viewable from the browser using the URL given
 on that page--don't proceed further unless it is.
 
@@ -77,7 +77,7 @@ a) Deploying the demo to Tomcat
 -------------------------------
 First copy this sample's Fediz Configuration file (src/main/config/fediz_config.xml)
 into the Tomcat-RP's conf folder.  This configuration references the
-Java keystore 'rp-ssl-server.jks' available in Fediz' examples/samplekeys folder
+Java keystore 'ststrust.jks' available in Fediz' examples/samplekeys folder
 but should already be in the Tomcat RP's root folder when you configured this
 instance as stated in the prerequisites.
 
@@ -89,7 +89,7 @@ b) Deploying the demo to Jetty
 ------------------------------
 First copy this sample's Fediz Configuration file (src/main/config/fediz_config.xml)
 into the Jetty-RP's etc folder.  This configuration references the
-Java keystore 'rp-ssl-server.jks' available in Fediz' examples/samplekeys folder
+Java keystore 'ststrust.jks' available in Fediz' examples/samplekeys folder
 but should already be in the Jetty RP's root folder when you configured this
 instance as stated in the prerequisites.
 
diff --git a/examples/springPreauthWebapp/src/main/config/fediz_config.xml b/examples/springPreauthWebapp/src/main/config/fediz_config.xml
index 86e3bb8..44b9c8e 100644
--- a/examples/springPreauthWebapp/src/main/config/fediz_config.xml
+++ b/examples/springPreauthWebapp/src/main/config/fediz_config.xml
@@ -36,6 +36,9 @@
  <issuer certificateValidation="PeerTrust" />
  </trustedIssuers>
  <maximumClockSkew>1000</maximumClockSkew>
+ <signingKey keyAlias="mytomrpkey" keyPassword="tompass">
+ <keyStore file="rp-ssl-key.jks" password="tompass" type="JKS" />
+ </signingKey>
  <protocol xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  xsi:type="federationProtocolType" version="1.0.0">
  <realm>urn:org:apache:cxf:fediz:fedizhelloworld</realm>
@@ -51,4 +54,3 @@
  </protocol>
  </contextConfig>
 </FedizConfig>
-