public class WssEncryptSecurityStrategy extends Object implements SecurityStrategy
SecurityStrategy.SecurityStrategyType| Constructor and Description |
|---|
WssEncryptSecurityStrategy(WssKeyStoreConfiguration keyStoreConfiguration) |
WssEncryptSecurityStrategy(WssKeyStoreConfiguration keyStoreConfiguration,
WssEncryptionConfiguration wssEncryptionConfiguration) |
| Modifier and Type | Method and Description |
|---|---|
Optional<WSPasswordCallbackHandler> |
buildPasswordCallbackHandler()
Gives the option to return a custom
WSPasswordCallbackHandler instance allowing to compose many password handlers
from different security strategies. |
Map<String,Object> |
buildSecurityProperties()
Returns a set of properties to be set on the SOAP request interceptors (OUT interceptors) in order to applies
this
security strategy. |
String |
securityAction()
Returns the security action name that is going to be executed in the request phase (OUT interceptors).
|
SecurityStrategy.SecurityStrategyType |
securityType()
Returns the type of the security strategy, if applies for the request or the response.
|
public WssEncryptSecurityStrategy(WssKeyStoreConfiguration keyStoreConfiguration)
public WssEncryptSecurityStrategy(WssKeyStoreConfiguration keyStoreConfiguration, WssEncryptionConfiguration wssEncryptionConfiguration)
public SecurityStrategy.SecurityStrategyType securityType()
SecurityStrategysecurityType in interface SecurityStrategypublic String securityAction()
SecurityStrategysecurityAction in interface SecurityStrategythis security strategy.public Optional<WSPasswordCallbackHandler> buildPasswordCallbackHandler()
SecurityStrategyWSPasswordCallbackHandler instance allowing to compose many password handlers
from different security strategies.buildPasswordCallbackHandler in interface SecurityStrategyWSPasswordCallbackHandler to be added to the composite callback handler.public Map<String,Object> buildSecurityProperties()
SecurityStrategythis
security strategy.buildSecurityProperties in interface SecurityStrategyMap with the properties required to apply the security strategy.Copyright © 2022. All rights reserved.