@Test( groups = {"wso2.dss"}, description = "Secure request using policy 3 and secure back end using policy 2") public void securityPolicy2() throws Exception { final int policyId = 2; this.secureService(policyId); if (!ServiceTransportUtil.isHttpTransportEnable( contextUrls.getBackEndUrl(), sessionCookie, serviceName)) { ServiceTransportUtil.addTransportHttp( contextUrls.getBackEndUrl(), sessionCookie, serviceName); } SecureServiceClient secureAxisServiceClient = new SecureServiceClient(); OMElement response; for (int i = 0; i < 5; i++) { response = secureAxisServiceClient.sendSecuredStockQuoteRequest( userInfo, getProxyServiceURLHttp(serviceName), policyId, symbol); verifyResponse(response); } log.info("Non-repudiation verified"); }
@Test( groups = {"wso2.dss"}, description = "Secure request using policy 14 and secure back end using policy 2") public void securityPolicy14() throws Exception { final int policyId = 14; this.secureService(policyId); if (!ServiceTransportUtil.isHttpTransportEnable( contextUrls.getBackEndUrl(), sessionCookie, serviceName)) { ServiceTransportUtil.addTransportHttp( contextUrls.getBackEndUrl(), sessionCookie, serviceName); } SecureServiceClient secureAxisServiceClient = new SecureServiceClient(); OMElement response; for (int i = 0; i < 5; i++) { response = secureAxisServiceClient.sendSecuredStockQuoteRequest( userInfo, getProxyServiceURLHttp(serviceName), policyId, symbol); verifyResponse(response); } log.info( "SecureConversation - Encrypt Only - Service as STS - Bootstrap policy - " + "Sign and Encrypt , Username Token Authentication verified"); }