@Test(
     groups = {"wso2.dss"},
     description = "Secure request using policy 3 and secure back end using policy 2")
 public void securityPolicy2() throws Exception {
   final int policyId = 2;
   this.secureService(policyId);
   if (!ServiceTransportUtil.isHttpTransportEnable(
       contextUrls.getBackEndUrl(), sessionCookie, serviceName)) {
     ServiceTransportUtil.addTransportHttp(
         contextUrls.getBackEndUrl(), sessionCookie, serviceName);
   }
   SecureServiceClient secureAxisServiceClient = new SecureServiceClient();
   OMElement response;
   for (int i = 0; i < 5; i++) {
     response =
         secureAxisServiceClient.sendSecuredStockQuoteRequest(
             userInfo, getProxyServiceURLHttp(serviceName), policyId, symbol);
     verifyResponse(response);
   }
   log.info("Non-repudiation verified");
 }
 @Test(
     groups = {"wso2.dss"},
     description = "Secure request using policy 14 and secure back end using policy 2")
 public void securityPolicy14() throws Exception {
   final int policyId = 14;
   this.secureService(policyId);
   if (!ServiceTransportUtil.isHttpTransportEnable(
       contextUrls.getBackEndUrl(), sessionCookie, serviceName)) {
     ServiceTransportUtil.addTransportHttp(
         contextUrls.getBackEndUrl(), sessionCookie, serviceName);
   }
   SecureServiceClient secureAxisServiceClient = new SecureServiceClient();
   OMElement response;
   for (int i = 0; i < 5; i++) {
     response =
         secureAxisServiceClient.sendSecuredStockQuoteRequest(
             userInfo, getProxyServiceURLHttp(serviceName), policyId, symbol);
     verifyResponse(response);
   }
   log.info(
       "SecureConversation - Encrypt Only - Service as STS - Bootstrap policy - "
           + "Sign and Encrypt , Username Token Authentication verified");
 }