jUDDI Client Configuration Guide -------------------------------- Introduction ~~~~~~~~~~~~ The jUDDI Java and .NET clients use an XML configuration file that dictates settings and behaviors. This guide provides an overview of the settings. Both .NET and jUDDI use the same configuration file schema. This schema is located within the source tree and with the client distribution packages of jUDDI. Client Settings ~~~~~~~~~~~~~~~ The root XML node for the jUDDI client configuration file is always "uddi". ---- uddi/reloadDelay ---- Multiple clients can be defined in each configuration file. ---- uddi/client@name="someName" ---- Nodes ~~~~~ At least one node is required per client. A node represents a one logical UDDI server (or cluster of servers). Each UDDI node should host at least the inquiry service. A client using the jUDDI client package can be configured to access multiple nodes at the same time. ---- uddi/client/nodes[]/node@isHomeJUDDI=true/false uddi/client/nodes[]/node/name uddi/client/nodes[]/node/description uddi/client/nodes[]/node/properties uddi/client/nodes[]/node/proxyTransport uddi/client/nodes[]/node/custodyTransferUrl uddi/client/nodes[]/node/inquiryUrl uddi/client/nodes[]/node/publishUrl uddi/client/nodes[]/node/securityUrl uddi/client/nodes[]/node/subscriptionUrl uddi/client/nodes[]/node/subscriptionListenerUrl uddi/client/nodes[]/node/juddiApiUrl ---- ==== Transport Options The Proxy Transport defines which mechanism is used for 'on the wire' transport of the UDDI XML messages. JAXWS Transport is the most commonly used and assumes SOAP messaging protocol over HTTP transport layer. RMI Transport using the Java Remote Method Invocation for transport. It's more commonly used for communicating within a J2EE container, but could be used in other cases. It's not required by the UDDI specification and is considered a jUDDI add on. InVM Transport is for hosting jUDDI services without a J2EE container. JAXWSv2TranslationTransport is a bridge for accessing UDDIv2 web services using the UDDIv3 data structures and APIs. Only the Inquiry and Publish services are required and they must point to SOAP/HTTP endpoints for a UDDI v2 node. Clerks ~~~~~~ Clerks are responsible for mapping stored user credentials to a Node and for automated registration. ---- uddi/client/clerks/registerOnStartup=true/false ---- Clerk ~~~~~ Clerks store credentials and map to a specific node. ---- uddi/client/clerks[]/clerk@node - This is reference to uddi/client/node/name, it must exist uddi/client/clerks[]/clerk@name - This is a unique identifier of the clerk uddi/client/clerks[]/clerk@publisher - This is the username uddi/client/clerks[]/clerk@password uddi/client/clerks[]/clerk@isPasswordEncrypted=true/false uddi/client/clerks[]/clerk@cryptoProvider=(see Crypto providers) ---- Credentials can be encrypted using the included batch/bash scripts and then appended to the configuration. Example with encryption: ---- ---- Clerks also have settings for the automated cross registration of Businesses and Services on start up. ---- uddi/client/clerks[]/xregister/service@bindingKey uddi/client/clerks[]/xregister/service@fromClerk uddi/client/clerks[]/xregister/service@toClerk ---- Digital Signatures ~~~~~~~~~~~~~~~~~~ The Signature section contains settings that map to the Digital Signature Utility that makes working with UDDI digital signatures simple. The section contains all of the settings for both signing and validating signatures. ---- uddi/client/signature/signingKeyStorePath uddi/client/signature/signingKeyStoreFilePassword uddi/client/signature/signingKeyStoreFilePassword@isPasswordEncrypted uddi/client/signature/signingKeyStoreFilePassword@cryptoProvider uddi/client/signature/signingKeyPassword uddi/client/signature/signingKeyPassword@isPasswordEncrypted uddi/client/signature/signingKeyPassword@cryptoProvider uddi/client/signature/signingKeyAlias uddi/client/signature/canonicalizationMethod uddi/client/signature/signatureMethod=(default RSA_SHA1) uddi/client/signature/XML_DIGSIG_NS=(default http://www.w3.org/2000/09/xmldsig#) uddi/client/signature/trustStorePath uddi/client/signature/trustStoreType uddi/client/signature/trustStorePassword uddi/client/signature/trustStorePassword@isPasswordEncrypted uddi/client/signature/trustStorePassword@cryptoProvider uddi/client/signature/checkTimestamps uddi/client/signature/checkTrust uddi/client/signature/checkRevocationCRL uddi/client/signature/keyInfoInclusionSubjectDN uddi/client/signature/keyInfoInclusionSerial uddi/client/signature/keyInfoInclusionBase64PublicKey uddi/client/signature/digestMethod ---- Subscription Callbacks ~~~~~~~~~~~~~~~~~~~~~~ The subscriptionCallbacks section defines settings uses by the subscription callback API. This enables developers to create capabilities that need to be notified immediately when something in UDDI changes through the use of subscriptions. ---- uddi/client/subscriptionCallbacks/keyDomain uddi/client/subscriptionCallbacks/listenUrl this is the URL that is used for callbacks, should be externally resolvable uddi/client/subscriptionCallbacks/autoRegisterBindingTemplate=true/false uddi/client/subscriptionCallbacks/autoRegisterBusinessServiceKey=(key) append callback endpoint to this service uddi/client/subscriptionCallbacks/signatureBehavior=(AbortIfSigned,Sign,DoNothing,SignOnlyIfParentIsntSigned), default DoNothing. Applies when auto registering the endpoint to a business or service that is already signed. ---- XtoWsdl ~~~~~~~ XtoWsdl represents configuration parameters for importing WSDL or WADL files. Currently, the only setting is for ignoring SSL errors when fetching remote WSDL or WADL files. ---- uddi/client/XtoWsdl/IgnoreSSLErrors=true or false ---- Embedded jUDDI server ~~~~~~~~~~~~~~~~~~~~~ jUDDI has the ability to run in embedded mode. This means that the jUDDI services can operate without a web servlet container, such as Tomcat or JBoss. Typically, this is something that application developers would use for more advanced scenarios and for operation without network connectivity. Requirements ^^^^^^^^^^^^ A database server, if one is not available, the embedded Derby engine can be used. Changes in configuration compared to non-embedded ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ * META-INF/embedded-uddi.xml needs to contain the connection settings for InVmTransport. .... org.apache.juddi.v3.client.transport.InVMTransport org.apache.juddi.api.impl.UDDICustodyTransferImpl org.apache.juddi.api.impl.UDDIInquiryImpl org.apache.juddi.api.impl.UDDIPublicationImpl org.apache.juddi.api.impl.UDDISecurityImpl org.apache.juddi.api.impl.UDDISubscriptionImpl org.apache.juddi.api.impl.UDDISubscriptionListenerImpl org.apache.juddi.api.impl.JUDDIApiImpl .... * The serverside config file juddiv3.xml needs to be added to the classpath. * A META-INF/persistence.xml needs to be added. * Add the juddi-core (UDDI server) and derby (Embedded Database) dependencies to the pom. Use the juddi-core-openjpa jar for OpenJPA. See also the hello-world-embedded example.