blob: 3039ce1e9759fb6e853df5871e5d54aeeb1ac3db [file] [log] [blame]
This sample works with sec_echo service.
1. HOW TO CONFIGURE SERVER?
-----------------------
Go to rampart/samples/server/sec_echo and
Run %make install
This will deploy a sec_echo service and copy security enabled services.xml
file.
2. HOW TO START SERVER
---------------------
Start server in port 8080
./axis2_http_server -p8080
3. HOW TO CONFIGURE TCP MONITOR (To view messages)
------------------------------
Listen port: 9090 [specified as in the client argument]
Target port: 8080 [server port]
NOTE: This step is OPTIONAL and can be avoided by starting the server without -p8080
option.
HOW TO RUN CLIENT?
-----------------
Using scripts
-------------------------
1. Run %deploy_client_repo.sh/bat
2. Run %update_n_run.sh/bat
Using the actual binary
--------------------------------------
Run %echo <address> <client_repository>
If everything is configured properly You should be able to see the security token(s) is/are attached to the header of
the SOAP message in the TCP Monitor.
NOTE:
You need to change the passwordCallbackClass/authnModule and the en/decryptionPropFile
in rampart/samples/client/enc_echo/data/client.axis2.xml and
rampart/samples/server/sec_echo/services.xml to suit your environment.