|
Almost done
In this article, you've learned about the issues that make WS-SecurityPolicy difficult to understand, along with some of the common mistakes made in working with WS-SecurityPolicy documents. You've also seen the basis of a Java data model for the combination of WS-Policy and WS-SecurityPolicy that supports verifying WS-SecurityPolicy documents, and learned how JiBX data binding can be used to unmarshal documents to construct the model.
The next article will wrap up the development of a tool for verifying and reformatting WSDL and WS-Policy/WS-SecurityPolicy documents. In it, you'll see more of how the model handles policy alternatives and other aspects of verification, and also how JiBX data binding is used to output documents converted to the current versions of the standards and a best-practices format. |
|