- From: <Frederick.Hirsch@nokia.com>
- Date: Wed, 27 Nov 2002 15:13:39 -0500
- To: <www-xkms@w3.org>
I have a question regarding the use of XKMS in conjunction with WS-Security. I'm thinking that a WS-Security endpoint might wish to use an XKMS server to validate an X.509 security token. This could be a BinarySecurityToken with ValueType wsse:X509v3 for example. Since WS-Security recommends the use of such tokens instead of KeyInfo, to make use of XKMS I would expect to pass in such a token to the XKMS server. Is that a reasonable use case? Is the alternative to transform the token into the appropriate KeyInfo structure? If it makes sense to pass a token directly to the XKMS server, would it make sense to add an optional element to the KeyBindingAbstractType to allow a WS-Security token to be passed to the XKMS server in a QueryKeyBinding? Should we make the KeyBindingAbstractType <sequence> <choice <element ref="xkms:KeyInfo" minOccurs="0"/> <element ref="wsse:BinarySecurityToken" minOccurs="0"/> </choice> <element KeyUsage" minOccurs="0" maxOccurs="3"/> <element UseKeyWith" minOccurs="0" maxOccurs="unbounded"/> <element ref="xkms:PolicyIdentifier" minOccurs="0 maxOccurs="unbounded"/> </sequence> with text to indicate that the ValueType is restricted to types the XKMS server is prepared to process? regards, Frederick Frederick Hirsch Nokia Mobile Phones
Received on Wednesday, 27 November 2002 15:14:56 UTC