quarkus.cxf.client."client-name".security.username
|
string
|
|
The user’s name. It is used as follows:
-
As the name in the UsernameToken for WS-Security
-
As the alias name in the keystore to get the user’s cert and private key for signature if signature.username is
not set
-
As the alias name in the keystore to get the user’s public key for encryption if encryption.username is not set
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_USERNAME
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.password
|
string
|
|
The user’s password when a callback-handler is not defined. This is only used for the password in a WS-Security
UsernameToken.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_PASSWORD
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.signature.username
|
string
|
|
The user’s name for signature. It is used as the alias name in the keystore to get the user’s cert and private key
for signature. If this is not defined, then username is used instead. If that is also not specified, it uses the
the default alias set in the properties file referenced by signature.properties . If that’s also not set, and the
keystore only contains a single key, that key will be used.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SIGNATURE_USERNAME
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.signature.password
|
string
|
|
The user’s password for signature when a callback-handler is not defined.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SIGNATURE_PASSWORD
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.encryption.username
|
string
|
|
The user’s name for encryption. It is used as the alias name in the keystore to get the user’s public key for
encryption. If this is not defined, then username is used instead. If that is also not specified, it uses the the
default alias set in the properties file referenced by encrypt.properties . If that’s also not set, and the keystore
only contains a single key, that key will be used.
For the WS-Security web service provider, the useReqSigCert value can be used to accept (encrypt to) any client
whose public key is in the service’s truststore (defined in encrypt.properties ).
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ENCRYPTION_USERNAME
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.callback-handler
|
string
|
|
A reference to a javax.security.auth.callback.CallbackHandler bean
used to obtain passwords, for both outbound and inbound requests.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CALLBACK_HANDLER
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.saml-callback-handler
|
string
|
|
A reference to a javax.security.auth.callback.CallbackHandler
implementation used to construct SAML Assertions.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SAML_CALLBACK_HANDLER
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.signature.properties."signature-properties"
|
Map<String,String>
|
|
The Crypto property configuration to use for signing, if signature.crypto is not set.
[prefix].signature.properties."org.apache.ws.security.crypto.provider" =
org.apache.ws.security.components.crypto.Merlin
[prefix].signature.properties."org.apache.ws.security.crypto.merlin.keystore.password" = password
[prefix].signature.properties."org.apache.ws.security.crypto.merlin.file" = certs/alice.jks
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SIGNATURE_PROPERTIES__SIGNATURE_PROPERTIES_
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.encryption.properties."encryption-properties"
|
Map<String,String>
|
|
The Crypto property configuration to use for encryption, if encryption.crypto is not set.
[prefix].encryption.properties."org.apache.ws.security.crypto.provider" =
org.apache.ws.security.components.crypto.Merlin
[prefix].encryption.properties."org.apache.ws.security.crypto.merlin.keystore.password" = password
[prefix].encryption.properties."org.apache.ws.security.crypto.merlin.file" = certs/alice.jks
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ENCRYPTION_PROPERTIES__ENCRYPTION_PROPERTIES_
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.signature.crypto
|
string
|
|
A reference to a org.apache.wss4j.common.crypto.Crypto bean to be used
for signature. If not set, signature.properties will be used to configure a Crypto instance.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SIGNATURE_CRYPTO
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.encryption.crypto
|
string
|
|
A reference to a org.apache.wss4j.common.crypto.Crypto to be used for
encryption. If not set, encryption.properties will be used to configure a Crypto instance.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ENCRYPTION_CRYPTO
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.encryption.certificate
|
string
|
|
A message property for prepared X509 certificate to be used for encryption. If this is not defined, then the
certificate will be either loaded from the keystore encryption.properties or extracted from request (when
WS-Security is used and if encryption.username has value useReqSigCert .
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ENCRYPTION_CERTIFICATE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.enable-revocation
|
boolean
|
false
|
If true , Certificate Revocation List (CRL) checking is enabled when verifying trust in a certificate; otherwise it
is not enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ENABLE_REVOCATION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.enable-unsigned-saml-assertion-principal
|
boolean
|
false
|
If true , unsigned SAML assertions will be allowed as SecurityContext Principals; otherwise they won’t be allowed as
SecurityContext Principals.
|
Signature
The label "unsigned" refers to an internal signature. Even if the token is signed by an external signature (as per
the "sender-vouches" requirement), this boolean must still be configured if you want to use the token to set up
the security context.
|
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ENABLE_UNSIGNED_SAML_ASSERTION_PRINCIPAL
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.validate-saml-subject-confirmation
|
boolean
|
true
|
If true , the SubjectConfirmation requirements of a received SAML Token (sender-vouches or holder-of-key) will be
validated; otherwise they won’t be validated.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_VALIDATE_SAML_SUBJECT_CONFIRMATION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.sc-from-jaas-subject
|
boolean
|
true
|
If true , security context can be created from JAAS Subject; otherwise it must not be created from JAAS Subject.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SC_FROM_JAAS_SUBJECT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.audience-restriction-validation
|
boolean
|
true
|
If true , then if the SAML Token contains Audience Restriction URIs, one of them must match one of the values in
audience.restrictions ; otherwise the SAML AudienceRestriction validation is disabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_AUDIENCE_RESTRICTION_VALIDATION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.saml-role-attributename
|
string
|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/role
|
The attribute URI of the SAML AttributeStatement where the role information is stored.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SAML_ROLE_ATTRIBUTENAME
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.subject-cert-constraints
|
string
|
|
A String of regular expressions (separated by the value specified in security.cert.constraints.separator ) which
will be applied to the subject DN of the certificate used for signature validation, after trust verification of the
certificate chain associated with the certificate.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SUBJECT_CERT_CONSTRAINTS
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.cert-constraints-separator
|
string
|
,
|
The separator that is used to parse certificate constraints configured in security.subject.cert.constraints
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CERT_CONSTRAINTS_SEPARATOR
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.actor
|
string
|
|
The actor or role name of the wsse:Security header. If this parameter is omitted, the actor name is not set.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ACTOR
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.validate.token
|
boolean
|
true
|
If true , the password of a received UsernameToken will be validated; otherwise it won’t be validated.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_VALIDATE_TOKEN
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.username-token.always.encrypted
|
boolean
|
true
|
Whether to always encrypt UsernameTokens that are defined as a SupportingToken . This should not be set to false
in a production environment, as it exposes the password (or the digest of the password) on the wire.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_USERNAME_TOKEN_ALWAYS_ENCRYPTED
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.is-bsp-compliant
|
boolean
|
true
|
If true , the compliance with the Basic Security Profile (BSP) 1.1 will be ensured; otherwise it will not be
ensured.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_IS_BSP_COMPLIANT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.enable.nonce.cache
|
boolean
|
|
If true , the UsernameToken nonces will be cached for both message initiators and recipients; otherwise they won’t
be cached for neither message initiators nor recipients. The default is true for message recipients, and false
for message initiators.
|
Caching
Caching only applies when either a UsernameToken WS-SecurityPolicy is in effect, or the UsernameToken action has
been configured for the non-security-policy case.
|
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ENABLE_NONCE_CACHE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.enable.timestamp.cache
|
boolean
|
|
If true , the Timestamp Created Strings (these are only cached in conjunction with a message Signature) will be
cached for both message initiators and recipients; otherwise they won’t be cached for neither message initiators nor
recipients. The default is true for message recipients, and false for message initiators.
|
Caching
Caching only applies when either a IncludeTimestamp policy is in effect, or the Timestamp action has been
configured for the non-security-policy case.
|
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ENABLE_TIMESTAMP_CACHE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.enable.streaming
|
boolean
|
false
|
If true , the new streaming (StAX) implementation of WS-Security is used; otherwise the old DOM implementation is
used.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ENABLE_STREAMING
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.return.security.error
|
boolean
|
false
|
If true , detailed security error messages are sent to clients; otherwise the details are omitted and only a generic
error message is sent.
The "real" security errors should not be returned to the client in production, as they may leak information about the
deployment, or otherwise provide an "oracle" for attacks.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_RETURN_SECURITY_ERROR
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.must-understand
|
boolean
|
true
|
If true , the SOAP mustUnderstand header is included in security headers based on a WS-SecurityPolicy; otherwise
the header is always omitted.
Works only with enable.streaming = true - see CXF-8940
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_MUST_UNDERSTAND
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.enable.saml.cache
|
boolean
|
|
If true and in case the token contains a OneTimeUse Condition, the SAML2 Token Identifiers will be cached for
both message initiators and recipients; otherwise they won’t be cached for neither message initiators nor recipients.
The default is true for message recipients, and false for message initiators.
Caching only applies when either a SamlToken policy is in effect, or a SAML action has been configured for the
non-security-policy case.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ENABLE_SAML_CACHE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.store.bytes.in.attachment
|
boolean
|
|
Whether to store bytes (CipherData or BinarySecurityToken) in an attachment. The default is true if MTOM is enabled.
Set it to false to BASE-64 encode the bytes and "inlined" them in the message instead. Setting this to true is more
efficient, as it means that the BASE-64 encoding step can be skipped. This only applies to the DOM WS-Security stack.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STORE_BYTES_IN_ATTACHMENT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.swa.encryption.attachment.transform.content
|
boolean
|
false
|
If true , Attachment-Content-Only transform will be used when an Attachment is encrypted via a WS-SecurityPolicy
expression; otherwise Attachment-Complete transform will be used when an Attachment is encrypted via a
WS-SecurityPolicy expression.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SWA_ENCRYPTION_ATTACHMENT_TRANSFORM_CONTENT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.use.str.transform
|
boolean
|
true
|
If true , the STR (Security Token Reference) Transform will be used when (externally) signing a SAML Token;
otherwise the STR (Security Token Reference) Transform will not be used.
Some frameworks cannot process the SecurityTokenReference . You may set this false in such cases.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_USE_STR_TRANSFORM
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.add.inclusive.prefixes
|
boolean
|
true
|
If true , an InclusiveNamespaces PrefixList will be added as a CanonicalizationMethod child when generating
Signatures using WSConstants.C14N_EXCL_OMIT_COMMENTS ; otherwise the PrefixList will not be added.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ADD_INCLUSIVE_PREFIXES
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.disable.require.client.cert.check
|
boolean
|
false
|
If true , the enforcement of the WS-SecurityPolicy RequireClientCertificate policy will be disabled; otherwise the
enforcement of the WS-SecurityPolicy RequireClientCertificate policy is enabled.
Some servers may not do client certificate verification at the start of the SSL handshake, and therefore the client
certificates may not be available to the WS-Security layer for policy verification.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_DISABLE_REQUIRE_CLIENT_CERT_CHECK
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.expand.xop.include
|
boolean
|
|
If true , the xop:Include elements will be searched for encryption and signature (on the outbound side) or for
signature verification (on the inbound side); otherwise the search won’t happen. This ensures that the actual bytes
are signed, and not just the reference. The default is true if MTOM is enabled, otherwise the default is false .
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_EXPAND_XOP_INCLUDE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.timestamp.timeToLive
|
string
|
300
|
The time in seconds to add to the Creation value of an incoming Timestamp to determine whether to accept it as
valid or not.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_TIMESTAMP_TIMETOLIVE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.timestamp.futureTimeToLive
|
string
|
60
|
The time in seconds in the future within which the Created time of an incoming Timestamp is valid. The default is
greater than zero to avoid problems where clocks are slightly askew. Set this to 0 to reject all future-created
`Timestamp`s.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_TIMESTAMP_FUTURETIMETOLIVE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.usernametoken.timeToLive
|
string
|
300
|
The time in seconds to append to the Creation value of an incoming UsernameToken to determine whether to accept it
as valid or not.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_USERNAMETOKEN_TIMETOLIVE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.usernametoken.futureTimeToLive
|
string
|
60
|
The time in seconds in the future within which the Created time of an incoming UsernameToken is valid. The
default is greater than zero to avoid problems where clocks are slightly askew. Set this to 0 to reject all
future-created `UsernameToken`s.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_USERNAMETOKEN_FUTURETIMETOLIVE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.spnego.client.action
|
string
|
|
A reference to a org.apache.wss4j.common.spnego.SpnegoClientAction
bean to use for SPNEGO. This allows the user to plug in a different implementation to obtain a service ticket.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SPNEGO_CLIENT_ACTION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.nonce.cache.instance
|
string
|
|
A reference to a org.apache.wss4j.common.cache.ReplayCache bean used
to cache UsernameToken nonces. A org.apache.wss4j.common.cache.EHCacheReplayCache instance is used by default.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_NONCE_CACHE_INSTANCE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.timestamp.cache.instance
|
string
|
|
A reference to a org.apache.wss4j.common.cache.ReplayCache bean used
to cache Timestamp Created Strings. A org.apache.wss4j.common.cache.EHCacheReplayCache instance is used by
default.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_TIMESTAMP_CACHE_INSTANCE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.saml.cache.instance
|
string
|
|
A reference to a org.apache.wss4j.common.cache.ReplayCache bean used
to cache SAML2 Token Identifier Strings (if the token contains a OneTimeUse condition). A
org.apache.wss4j.common.cache.EHCacheReplayCache instance is used by default.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SAML_CACHE_INSTANCE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.cache.config.file
|
string
|
|
Set this property to point to a configuration file for the underlying caching implementation for the TokenStore .
The default configuration file that is used is cxf-ehcache.xml in org.apache.cxf:cxf-rt-security JAR.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CACHE_CONFIG_FILE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.token-store-cache-instance
|
string
|
|
A reference to a org.apache.cxf.ws.security.tokenstore.TokenStore bean
to use for caching security tokens. By default this uses a instance.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_TOKEN_STORE_CACHE_INSTANCE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.cache.identifier
|
string
|
|
The Cache Identifier to use with the TokenStore. CXF uses the following key to retrieve a token store:
org.apache.cxf.ws.security.tokenstore.TokenStore-<identifier> . This key can be used to configure service-specific
cache configuration. If the identifier does not match, then it falls back to a cache configuration with key
org.apache.cxf.ws.security.tokenstore.TokenStore .
The default <identifier> is the QName of the service in question. However to pick up a custom cache configuration
(for example, if you want to specify a TokenStore per-client proxy), it can be configured with this identifier
instead.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CACHE_IDENTIFIER
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.role.classifier
|
string
|
|
The Subject Role Classifier to use. If one of the WSS4J Validators returns a JAAS Subject from Validation, then the
WSS4JInInterceptor will attempt to create a SecurityContext based on this Subject. If this value is not
specified, then it tries to get roles using the DefaultSecurityContext in org.apache.cxf:cxf-core . Otherwise it
uses this value in combination with the role.classifier.type to get the roles from the Subject .
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ROLE_CLASSIFIER
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.role.classifier.type
|
string
|
prefix
|
The Subject Role Classifier Type to use. If one of the WSS4J Validators returns a JAAS Subject from Validation, then
the WSS4JInInterceptor will attempt to create a SecurityContext based on this Subject. Currently accepted values
are prefix or classname . Must be used in conjunction with the role.classifier .
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ROLE_CLASSIFIER_TYPE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.asymmetric.signature.algorithm
|
string
|
|
This configuration tag allows the user to override the default Asymmetric Signature algorithm (RSA-SHA1) for use in
WS-SecurityPolicy, as the WS-SecurityPolicy specification does not allow the use of other algorithms at present.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_ASYMMETRIC_SIGNATURE_ALGORITHM
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.symmetric.signature.algorithm
|
string
|
|
This configuration tag allows the user to override the default Symmetric Signature algorithm (HMAC-SHA1) for use in
WS-SecurityPolicy, as the WS-SecurityPolicy specification does not allow the use of other algorithms at present.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SYMMETRIC_SIGNATURE_ALGORITHM
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.password.encryptor.instance
|
string
|
|
A reference to a org.apache.wss4j.common.crypto.PasswordEncryptor
bean, which is used to encrypt or decrypt passwords in the Merlin Crypto implementation (or any custom Crypto
implementations).
By default, WSS4J uses the org.apache.wss4j.common.crypto.JasyptPasswordEncryptor which must be instantiated with a
password to use to decrypt keystore passwords in the Merlin Crypto definition. This password is obtained via the
CallbackHandler defined via callback-handler
The encrypted passwords must be stored in the format "ENC(encoded encrypted password)".
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_PASSWORD_ENCRYPTOR_INSTANCE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.delegated.credential
|
string
|
|
A reference to a Kerberos org.ietf.jgss.GSSCredential bean to use for
WS-Security. This is used to retrieve a service ticket instead of using the client credentials.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_DELEGATED_CREDENTIAL
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.security.context.creator
|
string
|
|
A reference to a
org.apache.cxf.ws.security.wss4j.WSS4JSecurityContextCreator bean that is used to create a CXF SecurityContext from
the set of WSS4J processing results. The default implementation is
org.apache.cxf.ws.security.wss4j.DefaultWSS4JSecurityContextCreator .
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SECURITY_CONTEXT_CREATOR
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.security.token.lifetime
|
long
|
300000
|
The security token lifetime value (in milliseconds).
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_SECURITY_TOKEN_LIFETIME
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.kerberos.request.credential.delegation
|
boolean
|
false
|
If true , credential delegation is requested in the KerberosClient; otherwise the credential delegation is not in
the KerberosClient.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_KERBEROS_REQUEST_CREDENTIAL_DELEGATION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.kerberos.use.credential.delegation
|
boolean
|
false
|
If true , GSSCredential bean is retrieved from the Message Context using the delegated.credential property and
then it is used to obtain a service ticket.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_KERBEROS_USE_CREDENTIAL_DELEGATION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.kerberos.is.username.in.servicename.form
|
boolean
|
false
|
If true , the Kerberos username is in servicename form; otherwise the Kerberos username is not in servicename form.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_KERBEROS_IS_USERNAME_IN_SERVICENAME_FORM
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.kerberos.jaas.context
|
string
|
|
The JAAS Context name to use for Kerberos.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_KERBEROS_JAAS_CONTEXT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.kerberos.spn
|
string
|
|
The Kerberos Service Provider Name (spn) to use.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_KERBEROS_SPN
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.kerberos.client
|
string
|
|
A reference to a org.apache.cxf.ws.security.kerberos.KerberosClient
bean used to obtain a service ticket.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_KERBEROS_CLIENT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.client."client-name".security.custom.digest.algorithm
|
string
|
http://www.w3.org/2001/04/xmlenc#sha256
|
The Digest Algorithm to set on the org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set CustomAlgorithmSuite as an
AlgorithmSuite , for instance
<wsp:Policy wsu:Id="SecurityServiceEncryptThenSignPolicy"
xmlns:wsp="http://www.w3.org/ns/ws-policy"
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702">
<wsp:ExactlyOne>
<wsp:All>
<sp:AsymmetricBinding xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702">
<wsp:Policy>
...
<sp:AlgorithmSuite>
<wsp:Policy>
<sp:CustomAlgorithmSuite/>
</wsp:Policy>
</sp:AlgorithmSuite>
...
</wsp:Policy>
</sp:AsymmetricBinding>
...
</wsp:All>
</wsp:ExactlyOne>
</wsp:Policy>
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_DIGEST_ALGORITHM
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.encryption.algorithm
|
string
|
http://www.w3.org/2009/xmlenc11#aes256-gcm
|
The Encryption Algorithm to set on the org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_ENCRYPTION_ALGORITHM
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.symmetric.key.encryption.algorithm
|
string
|
http://www.w3.org/2001/04/xmlenc#kw-aes256
|
The Symmetric Key Encryption Algorithm to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_SYMMETRIC_KEY_ENCRYPTION_ALGORITHM
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.asymmetric.key.encryption.algorithm
|
string
|
http://www.w3.org/2001/04/xmlenc#rsa-1_5
|
The Asymmetric Key Encryption Algorithm to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_ASYMMETRIC_KEY_ENCRYPTION_ALGORITHM
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.encryption.key.derivation
|
string
|
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
The Encryption Key Derivation to set on the org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_ENCRYPTION_KEY_DERIVATION
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.signature.key.derivation
|
string
|
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
The Signature Key Derivation to set on the org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_SIGNATURE_KEY_DERIVATION
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.encryption.derived.key.length
|
int
|
256
|
The Encryption Derived Key Length (number of bits) to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_ENCRYPTION_DERIVED_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.signature.derived.key.length
|
int
|
192
|
The Signature Derived Key Length (number of bits) to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_SIGNATURE_DERIVED_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.minimum.symmetric.key.length
|
int
|
256
|
The Minimum Symmetric Key Length (number of bits) to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_MINIMUM_SYMMETRIC_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.maximum.symmetric.key.length
|
int
|
256
|
The Maximum Symmetric Key Length to set on the org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_MAXIMUM_SYMMETRIC_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.minimum.asymmetric.key.length
|
int
|
1024
|
The Minimum Symmetric Key Length (number of bits) to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_MINIMUM_ASYMMETRIC_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.custom.maximum.asymmetric.key.length
|
int
|
4096
|
The Maximum Symmetric Key Length (number of bits) to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_CUSTOM_MAXIMUM_ASYMMETRIC_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.client."client-name".security.sts.client
|
string
|
|
A reference to a fully configured
org.apache.cxf.ws.security.trust.STSClient bean to communicate with the STS. If not set, the STS client will be
created and configured based on other [prefix].security.sts.client.* properties as long as they are
available.
To work around the fact that org.apache.cxf.ws.security.trust.STSClient does not have a no-args constructor and
cannot thus be used as a CDI bean type, you can use the wrapper class
io.quarkiverse.cxf.ws.security.sts.client.STSClientBean instead.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.wsdl
|
string
|
|
A URL, resource path or local filesystem path pointing to a WSDL document to use when generating the service proxy of
the STS client.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_WSDL
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.service-name
|
string
|
|
A fully qualified name of the STS service. Common values include:
-
WS-Trust 1.0: {http://schemas.xmlsoap.org/ws/2005/02/trust/}SecurityTokenService
-
WS-Trust 1.3: {http://docs.oasis-open.org/ws-sx/ws-trust/200512/}SecurityTokenService
-
WS-Trust 1.4: {http://docs.oasis-open.org/ws-sx/ws-trust/200802/}SecurityTokenService
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_SERVICE_NAME
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.endpoint-name
|
string
|
|
A fully qualified name of the STS endpoint name. Common values include:
-
{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}X509_Port
-
{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}Transport_Port
-
{http://docs.oasis-open.org/ws-sx/ws-trust/200512/}UT_Port
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_ENDPOINT_NAME
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.username
|
string
|
|
The user name to use when authenticating against the STS. It is used as follows:
-
As the name in the UsernameToken for WS-Security
-
As the alias name in the keystore to get the user’s cert and private key for signature if signature.username is
not set
-
As the alias name in the keystore to get the user’s public key for encryption if encryption.username is not set
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_USERNAME
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.password
|
string
|
|
The password associated with the username .
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_PASSWORD
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.encryption.username
|
string
|
|
The user’s name for encryption. It is used as the alias name in the keystore to get the user’s public key for
encryption. If this is not defined, then username is used instead. If that is also not specified, it uses the the
default alias set in the properties file referenced by encrypt.properties . If that’s also not set, and the keystore
only contains a single key, that key will be used.
For the WS-Security web service provider, the useReqSigCert value can be used to accept (encrypt to) any client
whose public key is in the service’s truststore (defined in encrypt.properties ).
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_ENCRYPTION_USERNAME
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.encryption.properties."encryption-properties"
|
Map<String,String>
|
|
The Crypto property configuration to use for encryption, if encryption.crypto is not set.
[prefix].encryption.properties."org.apache.ws.security.crypto.provider" =
org.apache.ws.security.components.crypto.Merlin
[prefix].encryption.properties."org.apache.ws.security.crypto.merlin.keystore.password" = password
[prefix].encryption.properties."org.apache.ws.security.crypto.merlin.file" = certs/alice.jks
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_ENCRYPTION_PROPERTIES__ENCRYPTION_PROPERTIES_
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.encryption.crypto
|
string
|
|
A reference to a org.apache.wss4j.common.crypto.Crypto to be used for
encryption. If not set, encryption.properties will be used to configure a Crypto instance.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_ENCRYPTION_CRYPTO
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.token.crypto
|
string
|
|
A reference to a org.apache.wss4j.common.crypto.Crypto to be used for
the STS. If not set, token.properties will be used to configure a Crypto instance.
WCF’s trust server sometimes will encrypt the token in the response IN ADDITION TO the full security on the message.
These properties control the way the STS client will decrypt the EncryptedData elements in the response.
These are also used by the token.properties to send/process any RSA/DSAKeyValue tokens used if the KeyType is
PublicKey
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_TOKEN_CRYPTO
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.token.properties."token-properties"
|
Map<String,String>
|
|
The Crypto property configuration to use for encryption, if encryption.crypto is not set.
[prefix].token.properties."org.apache.ws.security.crypto.provider" = org.apache.ws.security.components.crypto.Merlin
[prefix].token.properties."org.apache.ws.security.crypto.merlin.keystore.password" = password
[prefix].token.properties."org.apache.ws.security.crypto.merlin.file" = certs/alice.jks
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_TOKEN_PROPERTIES__TOKEN_PROPERTIES_
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.token.username
|
string
|
|
The alias name in the keystore to get the user’s public key to send to the STS for the PublicKey KeyType case.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_TOKEN_USERNAME
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.token.usecert
|
boolean
|
false
|
Whether to write out an X509Certificate structure in UseKey/KeyInfo, or whether to write out a KeyValue structure.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_TOKEN_USECERT
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.client."client-name".security.sts.client.soap12-binding
|
boolean
|
false
|
If true the STS client will be set to send Soap 1.2 messages; otherwise it will send SOAP 1.1 messages.
Environment variable: QUARKUS_CXF_CLIENT__CLIENT_NAME__SECURITY_STS_CLIENT_SOAP12_BINDING
Since Quarkus CXF: 3.8.0
|
quarkus.cxf.endpoint."/endpoint-path".security.username
|
string
|
|
The user’s name. It is used as follows:
-
As the name in the UsernameToken for WS-Security
-
As the alias name in the keystore to get the user’s cert and private key for signature if signature.username is
not set
-
As the alias name in the keystore to get the user’s public key for encryption if encryption.username is not set
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_USERNAME
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.password
|
string
|
|
The user’s password when a callback-handler is not defined. This is only used for the password in a WS-Security
UsernameToken.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_PASSWORD
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.signature.username
|
string
|
|
The user’s name for signature. It is used as the alias name in the keystore to get the user’s cert and private key
for signature. If this is not defined, then username is used instead. If that is also not specified, it uses the
the default alias set in the properties file referenced by signature.properties . If that’s also not set, and the
keystore only contains a single key, that key will be used.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SIGNATURE_USERNAME
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.signature.password
|
string
|
|
The user’s password for signature when a callback-handler is not defined.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SIGNATURE_PASSWORD
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.encryption.username
|
string
|
|
The user’s name for encryption. It is used as the alias name in the keystore to get the user’s public key for
encryption. If this is not defined, then username is used instead. If that is also not specified, it uses the the
default alias set in the properties file referenced by encrypt.properties . If that’s also not set, and the keystore
only contains a single key, that key will be used.
For the WS-Security web service provider, the useReqSigCert value can be used to accept (encrypt to) any client
whose public key is in the service’s truststore (defined in encrypt.properties ).
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ENCRYPTION_USERNAME
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.callback-handler
|
string
|
|
A reference to a javax.security.auth.callback.CallbackHandler bean
used to obtain passwords, for both outbound and inbound requests.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CALLBACK_HANDLER
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.saml-callback-handler
|
string
|
|
A reference to a javax.security.auth.callback.CallbackHandler
implementation used to construct SAML Assertions.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SAML_CALLBACK_HANDLER
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.signature.properties."signature-properties"
|
Map<String,String>
|
|
The Crypto property configuration to use for signing, if signature.crypto is not set.
[prefix].signature.properties."org.apache.ws.security.crypto.provider" =
org.apache.ws.security.components.crypto.Merlin
[prefix].signature.properties."org.apache.ws.security.crypto.merlin.keystore.password" = password
[prefix].signature.properties."org.apache.ws.security.crypto.merlin.file" = certs/alice.jks
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SIGNATURE_PROPERTIES__SIGNATURE_PROPERTIES_
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.encryption.properties."encryption-properties"
|
Map<String,String>
|
|
The Crypto property configuration to use for encryption, if encryption.crypto is not set.
[prefix].encryption.properties."org.apache.ws.security.crypto.provider" =
org.apache.ws.security.components.crypto.Merlin
[prefix].encryption.properties."org.apache.ws.security.crypto.merlin.keystore.password" = password
[prefix].encryption.properties."org.apache.ws.security.crypto.merlin.file" = certs/alice.jks
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ENCRYPTION_PROPERTIES__ENCRYPTION_PROPERTIES_
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.signature.crypto
|
string
|
|
A reference to a org.apache.wss4j.common.crypto.Crypto bean to be used
for signature. If not set, signature.properties will be used to configure a Crypto instance.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SIGNATURE_CRYPTO
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.encryption.crypto
|
string
|
|
A reference to a org.apache.wss4j.common.crypto.Crypto to be used for
encryption. If not set, encryption.properties will be used to configure a Crypto instance.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ENCRYPTION_CRYPTO
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.encryption.certificate
|
string
|
|
A message property for prepared X509 certificate to be used for encryption. If this is not defined, then the
certificate will be either loaded from the keystore encryption.properties or extracted from request (when
WS-Security is used and if encryption.username has value useReqSigCert .
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ENCRYPTION_CERTIFICATE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.enable-revocation
|
boolean
|
false
|
If true , Certificate Revocation List (CRL) checking is enabled when verifying trust in a certificate; otherwise it
is not enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ENABLE_REVOCATION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.enable-unsigned-saml-assertion-principal
|
boolean
|
false
|
If true , unsigned SAML assertions will be allowed as SecurityContext Principals; otherwise they won’t be allowed as
SecurityContext Principals.
|
Signature
The label "unsigned" refers to an internal signature. Even if the token is signed by an external signature (as per
the "sender-vouches" requirement), this boolean must still be configured if you want to use the token to set up
the security context.
|
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ENABLE_UNSIGNED_SAML_ASSERTION_PRINCIPAL
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.validate-saml-subject-confirmation
|
boolean
|
true
|
If true , the SubjectConfirmation requirements of a received SAML Token (sender-vouches or holder-of-key) will be
validated; otherwise they won’t be validated.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_VALIDATE_SAML_SUBJECT_CONFIRMATION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.sc-from-jaas-subject
|
boolean
|
true
|
If true , security context can be created from JAAS Subject; otherwise it must not be created from JAAS Subject.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SC_FROM_JAAS_SUBJECT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.audience-restriction-validation
|
boolean
|
true
|
If true , then if the SAML Token contains Audience Restriction URIs, one of them must match one of the values in
audience.restrictions ; otherwise the SAML AudienceRestriction validation is disabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_AUDIENCE_RESTRICTION_VALIDATION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.saml-role-attributename
|
string
|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/role
|
The attribute URI of the SAML AttributeStatement where the role information is stored.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SAML_ROLE_ATTRIBUTENAME
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.subject-cert-constraints
|
string
|
|
A String of regular expressions (separated by the value specified in security.cert.constraints.separator ) which
will be applied to the subject DN of the certificate used for signature validation, after trust verification of the
certificate chain associated with the certificate.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SUBJECT_CERT_CONSTRAINTS
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.cert-constraints-separator
|
string
|
,
|
The separator that is used to parse certificate constraints configured in security.subject.cert.constraints
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CERT_CONSTRAINTS_SEPARATOR
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.actor
|
string
|
|
The actor or role name of the wsse:Security header. If this parameter is omitted, the actor name is not set.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ACTOR
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.validate.token
|
boolean
|
true
|
If true , the password of a received UsernameToken will be validated; otherwise it won’t be validated.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_VALIDATE_TOKEN
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.username-token.always.encrypted
|
boolean
|
true
|
Whether to always encrypt UsernameTokens that are defined as a SupportingToken . This should not be set to false
in a production environment, as it exposes the password (or the digest of the password) on the wire.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_USERNAME_TOKEN_ALWAYS_ENCRYPTED
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.is-bsp-compliant
|
boolean
|
true
|
If true , the compliance with the Basic Security Profile (BSP) 1.1 will be ensured; otherwise it will not be
ensured.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_IS_BSP_COMPLIANT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.enable.nonce.cache
|
boolean
|
|
If true , the UsernameToken nonces will be cached for both message initiators and recipients; otherwise they won’t
be cached for neither message initiators nor recipients. The default is true for message recipients, and false
for message initiators.
|
Caching
Caching only applies when either a UsernameToken WS-SecurityPolicy is in effect, or the UsernameToken action has
been configured for the non-security-policy case.
|
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ENABLE_NONCE_CACHE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.enable.timestamp.cache
|
boolean
|
|
If true , the Timestamp Created Strings (these are only cached in conjunction with a message Signature) will be
cached for both message initiators and recipients; otherwise they won’t be cached for neither message initiators nor
recipients. The default is true for message recipients, and false for message initiators.
|
Caching
Caching only applies when either a IncludeTimestamp policy is in effect, or the Timestamp action has been
configured for the non-security-policy case.
|
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ENABLE_TIMESTAMP_CACHE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.enable.streaming
|
boolean
|
false
|
If true , the new streaming (StAX) implementation of WS-Security is used; otherwise the old DOM implementation is
used.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ENABLE_STREAMING
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.return.security.error
|
boolean
|
false
|
If true , detailed security error messages are sent to clients; otherwise the details are omitted and only a generic
error message is sent.
The "real" security errors should not be returned to the client in production, as they may leak information about the
deployment, or otherwise provide an "oracle" for attacks.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_RETURN_SECURITY_ERROR
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.must-understand
|
boolean
|
true
|
If true , the SOAP mustUnderstand header is included in security headers based on a WS-SecurityPolicy; otherwise
the header is always omitted.
Works only with enable.streaming = true - see CXF-8940
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_MUST_UNDERSTAND
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.enable.saml.cache
|
boolean
|
|
If true and in case the token contains a OneTimeUse Condition, the SAML2 Token Identifiers will be cached for
both message initiators and recipients; otherwise they won’t be cached for neither message initiators nor recipients.
The default is true for message recipients, and false for message initiators.
Caching only applies when either a SamlToken policy is in effect, or a SAML action has been configured for the
non-security-policy case.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ENABLE_SAML_CACHE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.store.bytes.in.attachment
|
boolean
|
|
Whether to store bytes (CipherData or BinarySecurityToken) in an attachment. The default is true if MTOM is enabled.
Set it to false to BASE-64 encode the bytes and "inlined" them in the message instead. Setting this to true is more
efficient, as it means that the BASE-64 encoding step can be skipped. This only applies to the DOM WS-Security stack.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_STORE_BYTES_IN_ATTACHMENT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.swa.encryption.attachment.transform.content
|
boolean
|
false
|
If true , Attachment-Content-Only transform will be used when an Attachment is encrypted via a WS-SecurityPolicy
expression; otherwise Attachment-Complete transform will be used when an Attachment is encrypted via a
WS-SecurityPolicy expression.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SWA_ENCRYPTION_ATTACHMENT_TRANSFORM_CONTENT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.use.str.transform
|
boolean
|
true
|
If true , the STR (Security Token Reference) Transform will be used when (externally) signing a SAML Token;
otherwise the STR (Security Token Reference) Transform will not be used.
Some frameworks cannot process the SecurityTokenReference . You may set this false in such cases.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_USE_STR_TRANSFORM
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.add.inclusive.prefixes
|
boolean
|
true
|
If true , an InclusiveNamespaces PrefixList will be added as a CanonicalizationMethod child when generating
Signatures using WSConstants.C14N_EXCL_OMIT_COMMENTS ; otherwise the PrefixList will not be added.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ADD_INCLUSIVE_PREFIXES
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.disable.require.client.cert.check
|
boolean
|
false
|
If true , the enforcement of the WS-SecurityPolicy RequireClientCertificate policy will be disabled; otherwise the
enforcement of the WS-SecurityPolicy RequireClientCertificate policy is enabled.
Some servers may not do client certificate verification at the start of the SSL handshake, and therefore the client
certificates may not be available to the WS-Security layer for policy verification.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_DISABLE_REQUIRE_CLIENT_CERT_CHECK
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.expand.xop.include
|
boolean
|
|
If true , the xop:Include elements will be searched for encryption and signature (on the outbound side) or for
signature verification (on the inbound side); otherwise the search won’t happen. This ensures that the actual bytes
are signed, and not just the reference. The default is true if MTOM is enabled, otherwise the default is false .
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_EXPAND_XOP_INCLUDE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.timestamp.timeToLive
|
string
|
300
|
The time in seconds to add to the Creation value of an incoming Timestamp to determine whether to accept it as
valid or not.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_TIMESTAMP_TIMETOLIVE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.timestamp.futureTimeToLive
|
string
|
60
|
The time in seconds in the future within which the Created time of an incoming Timestamp is valid. The default is
greater than zero to avoid problems where clocks are slightly askew. Set this to 0 to reject all future-created
`Timestamp`s.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_TIMESTAMP_FUTURETIMETOLIVE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.usernametoken.timeToLive
|
string
|
300
|
The time in seconds to append to the Creation value of an incoming UsernameToken to determine whether to accept it
as valid or not.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_USERNAMETOKEN_TIMETOLIVE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.usernametoken.futureTimeToLive
|
string
|
60
|
The time in seconds in the future within which the Created time of an incoming UsernameToken is valid. The
default is greater than zero to avoid problems where clocks are slightly askew. Set this to 0 to reject all
future-created `UsernameToken`s.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_USERNAMETOKEN_FUTURETIMETOLIVE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.spnego.client.action
|
string
|
|
A reference to a org.apache.wss4j.common.spnego.SpnegoClientAction
bean to use for SPNEGO. This allows the user to plug in a different implementation to obtain a service ticket.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SPNEGO_CLIENT_ACTION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.nonce.cache.instance
|
string
|
|
A reference to a org.apache.wss4j.common.cache.ReplayCache bean used
to cache UsernameToken nonces. A org.apache.wss4j.common.cache.EHCacheReplayCache instance is used by default.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_NONCE_CACHE_INSTANCE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.timestamp.cache.instance
|
string
|
|
A reference to a org.apache.wss4j.common.cache.ReplayCache bean used
to cache Timestamp Created Strings. A org.apache.wss4j.common.cache.EHCacheReplayCache instance is used by
default.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_TIMESTAMP_CACHE_INSTANCE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.saml.cache.instance
|
string
|
|
A reference to a org.apache.wss4j.common.cache.ReplayCache bean used
to cache SAML2 Token Identifier Strings (if the token contains a OneTimeUse condition). A
org.apache.wss4j.common.cache.EHCacheReplayCache instance is used by default.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SAML_CACHE_INSTANCE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.cache.config.file
|
string
|
|
Set this property to point to a configuration file for the underlying caching implementation for the TokenStore .
The default configuration file that is used is cxf-ehcache.xml in org.apache.cxf:cxf-rt-security JAR.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CACHE_CONFIG_FILE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.token-store-cache-instance
|
string
|
|
A reference to a org.apache.cxf.ws.security.tokenstore.TokenStore bean
to use for caching security tokens. By default this uses a instance.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_TOKEN_STORE_CACHE_INSTANCE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.cache.identifier
|
string
|
|
The Cache Identifier to use with the TokenStore. CXF uses the following key to retrieve a token store:
org.apache.cxf.ws.security.tokenstore.TokenStore-<identifier> . This key can be used to configure service-specific
cache configuration. If the identifier does not match, then it falls back to a cache configuration with key
org.apache.cxf.ws.security.tokenstore.TokenStore .
The default <identifier> is the QName of the service in question. However to pick up a custom cache configuration
(for example, if you want to specify a TokenStore per-client proxy), it can be configured with this identifier
instead.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CACHE_IDENTIFIER
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.role.classifier
|
string
|
|
The Subject Role Classifier to use. If one of the WSS4J Validators returns a JAAS Subject from Validation, then the
WSS4JInInterceptor will attempt to create a SecurityContext based on this Subject. If this value is not
specified, then it tries to get roles using the DefaultSecurityContext in org.apache.cxf:cxf-core . Otherwise it
uses this value in combination with the role.classifier.type to get the roles from the Subject .
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ROLE_CLASSIFIER
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.role.classifier.type
|
string
|
prefix
|
The Subject Role Classifier Type to use. If one of the WSS4J Validators returns a JAAS Subject from Validation, then
the WSS4JInInterceptor will attempt to create a SecurityContext based on this Subject. Currently accepted values
are prefix or classname . Must be used in conjunction with the role.classifier .
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ROLE_CLASSIFIER_TYPE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.asymmetric.signature.algorithm
|
string
|
|
This configuration tag allows the user to override the default Asymmetric Signature algorithm (RSA-SHA1) for use in
WS-SecurityPolicy, as the WS-SecurityPolicy specification does not allow the use of other algorithms at present.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_ASYMMETRIC_SIGNATURE_ALGORITHM
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.symmetric.signature.algorithm
|
string
|
|
This configuration tag allows the user to override the default Symmetric Signature algorithm (HMAC-SHA1) for use in
WS-SecurityPolicy, as the WS-SecurityPolicy specification does not allow the use of other algorithms at present.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SYMMETRIC_SIGNATURE_ALGORITHM
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.password.encryptor.instance
|
string
|
|
A reference to a org.apache.wss4j.common.crypto.PasswordEncryptor
bean, which is used to encrypt or decrypt passwords in the Merlin Crypto implementation (or any custom Crypto
implementations).
By default, WSS4J uses the org.apache.wss4j.common.crypto.JasyptPasswordEncryptor which must be instantiated with a
password to use to decrypt keystore passwords in the Merlin Crypto definition. This password is obtained via the
CallbackHandler defined via callback-handler
The encrypted passwords must be stored in the format "ENC(encoded encrypted password)".
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_PASSWORD_ENCRYPTOR_INSTANCE
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.delegated.credential
|
string
|
|
A reference to a Kerberos org.ietf.jgss.GSSCredential bean to use for
WS-Security. This is used to retrieve a service ticket instead of using the client credentials.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_DELEGATED_CREDENTIAL
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.security.context.creator
|
string
|
|
A reference to a
org.apache.cxf.ws.security.wss4j.WSS4JSecurityContextCreator bean that is used to create a CXF SecurityContext from
the set of WSS4J processing results. The default implementation is
org.apache.cxf.ws.security.wss4j.DefaultWSS4JSecurityContextCreator .
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SECURITY_CONTEXT_CREATOR
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.security.token.lifetime
|
long
|
300000
|
The security token lifetime value (in milliseconds).
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_SECURITY_TOKEN_LIFETIME
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.kerberos.request.credential.delegation
|
boolean
|
false
|
If true , credential delegation is requested in the KerberosClient; otherwise the credential delegation is not in
the KerberosClient.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_KERBEROS_REQUEST_CREDENTIAL_DELEGATION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.kerberos.use.credential.delegation
|
boolean
|
false
|
If true , GSSCredential bean is retrieved from the Message Context using the delegated.credential property and
then it is used to obtain a service ticket.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_KERBEROS_USE_CREDENTIAL_DELEGATION
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.kerberos.is.username.in.servicename.form
|
boolean
|
false
|
If true , the Kerberos username is in servicename form; otherwise the Kerberos username is not in servicename form.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_KERBEROS_IS_USERNAME_IN_SERVICENAME_FORM
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.kerberos.jaas.context
|
string
|
|
The JAAS Context name to use for Kerberos.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_KERBEROS_JAAS_CONTEXT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.kerberos.spn
|
string
|
|
The Kerberos Service Provider Name (spn) to use.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_KERBEROS_SPN
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.kerberos.client
|
string
|
|
A reference to a org.apache.cxf.ws.security.kerberos.KerberosClient
bean used to obtain a service ticket.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_KERBEROS_CLIENT
Since Quarkus CXF: 2.5.0
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.digest.algorithm
|
string
|
http://www.w3.org/2001/04/xmlenc#sha256
|
The Digest Algorithm to set on the org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set CustomAlgorithmSuite as an
AlgorithmSuite , for instance
<wsp:Policy wsu:Id="SecurityServiceEncryptThenSignPolicy"
xmlns:wsp="http://www.w3.org/ns/ws-policy"
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702">
<wsp:ExactlyOne>
<wsp:All>
<sp:AsymmetricBinding xmlns:sp="http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702">
<wsp:Policy>
...
<sp:AlgorithmSuite>
<wsp:Policy>
<sp:CustomAlgorithmSuite/>
</wsp:Policy>
</sp:AlgorithmSuite>
...
</wsp:Policy>
</sp:AsymmetricBinding>
...
</wsp:All>
</wsp:ExactlyOne>
</wsp:Policy>
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_DIGEST_ALGORITHM
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.encryption.algorithm
|
string
|
http://www.w3.org/2009/xmlenc11#aes256-gcm
|
The Encryption Algorithm to set on the org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_ENCRYPTION_ALGORITHM
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.symmetric.key.encryption.algorithm
|
string
|
http://www.w3.org/2001/04/xmlenc#kw-aes256
|
The Symmetric Key Encryption Algorithm to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_SYMMETRIC_KEY_ENCRYPTION_ALGORITHM
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.asymmetric.key.encryption.algorithm
|
string
|
http://www.w3.org/2001/04/xmlenc#rsa-1_5
|
The Asymmetric Key Encryption Algorithm to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_ASYMMETRIC_KEY_ENCRYPTION_ALGORITHM
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.encryption.key.derivation
|
string
|
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
The Encryption Key Derivation to set on the org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_ENCRYPTION_KEY_DERIVATION
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.signature.key.derivation
|
string
|
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
The Signature Key Derivation to set on the org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_SIGNATURE_KEY_DERIVATION
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.encryption.derived.key.length
|
int
|
256
|
The Encryption Derived Key Length (number of bits) to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_ENCRYPTION_DERIVED_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.signature.derived.key.length
|
int
|
192
|
The Signature Derived Key Length (number of bits) to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_SIGNATURE_DERIVED_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.minimum.symmetric.key.length
|
int
|
256
|
The Minimum Symmetric Key Length (number of bits) to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_MINIMUM_SYMMETRIC_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.maximum.symmetric.key.length
|
int
|
256
|
The Maximum Symmetric Key Length to set on the org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_MAXIMUM_SYMMETRIC_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.minimum.asymmetric.key.length
|
int
|
1024
|
The Minimum Symmetric Key Length (number of bits) to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_MINIMUM_ASYMMETRIC_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|
quarkus.cxf.endpoint."/endpoint-path".security.custom.maximum.asymmetric.key.length
|
int
|
4096
|
The Maximum Symmetric Key Length (number of bits) to set on the
org.apache.wss4j.policy.model.AlgorithmSuite.AlgorithmSuiteType .
This value is only taken into account if the current security policy has set
CustomAlgorithmSuite as an
AlgorithmSuite
CustomAlgorithmSuite and the *.security.custom.* family of options were introduced to make it possible to
run CXF SOAP clients and services on systems with FIPS assertions
enabled.
Environment variable: QUARKUS_CXF_ENDPOINT___ENDPOINT_PATH__SECURITY_CUSTOM_MAXIMUM_ASYMMETRIC_KEY_LENGTH
Since Quarkus CXF: 3.8.1
|