In the comments on my previous post, John Bristowe gently offered his help to guide me across the Dead^H^H^H^H WSE 2.0 Marshes…
Fool! He didn’t know what was expecting him! But in the end, he provided me with invaluable knowledge, tips and simply buckets of code big enough to drive into my thick skull a faint glimmer of comprehension about this whole new way to deal with web services.
So, what was my initial take, based on a cursory reading of the few web pages I was able to find? A procedural based, hardcoded approach to the authentication/signature/authorization/encryption problem. Plenty of code (to be tested) and lots of possible failure points. Plus, it wasn’t really working anyways…
So John introduced me to the marvels of Policies. A declarative approach, how novel! Basically this removed all the ugly plumbing code from my web methods and put all the business knowledge about, say, authorization into a series of XML files that can be edited at runtime.
So, what about some samples? Sure thing! After having enabled WSE 2.0 on both Nfftiws (the web service) and Test Harness (the, duh, test harness), I modified Test Harness’ app.config file thusly (sorry, I always wanted to use this word…):
<section name=”microsoft.web.services” type=”Microsoft.Web.Services.Configuration.WebServicesConfiguration, Microsoft.Web.Services, Version=126.96.36.199, Culture=neutral, PublicKeyToken=31bf3856ad364e35″ />
<cache name=”policyCache.xml” />
The section “microsoft.web.services” enables WSE 2.0 for this project and the element named the same way defines a send policy to be defined in the policyCache.xml file. That, by the way, is filled by these characters:
<mapDefault policy=”#policy-b298142f-0c50-446b-8938-079b27891512″ />
<wsp:Policy wsu:Id=”policy-b298142f-0c50-446b-8938-079b27891512″ xmlns:wsp=”http://schemas.xmlsoap.org/ws/2002/12/policy”>
<wsse:Integrity wsp:Usage=”wsp:Required” xmlns:wsse=”http://schemas.xmlsoap.org/ws/2002/12/secext”>
Pretty ugly, eh? Luckily this file was generated automatically by the same property dialog where you enable WSE 2.0, by going to the Policy tab and clicking on the Create/Edit… button in the Sending Side Policy Cache group. When the Wse Security Policy Editor dialog pops up, click on Add Policy, select “default” as the Service Location, select the Require Signature checkbox, enter UserNameToken as the token Type, leave all the other fields untouched and click Ok. The file policyCache will be created and dropped in the wrong place. You will have to manually copy it from the project top folder to bin/debug for the purpose of development. We’ll see in later posts how to deal with deployment.
Ok, what have we achieved? Now we have a client application that knows how to speak WSE and will make sure to authenticate its method calls to the target web service.
Now we have to configure the web service… Again, enable WSE 2.0 for this project. Then modify web.config like this:
just after <configuration>, before <system.web>, add:
<section name="microsoft.web.services" type="Microsoft.Web.Services.Configuration.WebServicesConfiguration, Microsoft.Web.Services, Version=188.8.131.52, Culture=neutral, PublicKeyToken=31bf3856ad364e35" />
Just before </system.web> add:
<add type="Microsoft.Web.Services.WebServicesExtension, Microsoft.Web.Services, Version=184.108.40.206, Culture=neutral, PublicKeyToken=31bf3856ad364e35" priority="1" group="0" />
Finally, after </system.web>, add:
<securityTokenManager type="Nfftiws.SecurityPassword, Nfftiws" xmlns:wsse="http://schemas.xmlsoap.org/ws/2002/12/secext" qname="wsse:UsernameToken" />
<cache name="path to the project folderNFFTIWSbininboundPolicy.xml" />
While the first two pieces of XML are basically boilerplate (I already feel the wrath of the More Competent Developers(tm) out there), the last fragment defines the method that implements the authentication (Nfftiws.SecurityPassword) and points to the file defining the authorization policy that will be applied on the incoming messages. But that’s all for web.config, in the next post we’ll see what’s in inboundPolicy.xml.