Associating a subject to a HTTP URL Connection

Hello,
We have a java client application which authenticates to the server using the JAAS model. The application opens HTTP URL connections from time to time (to servlets that stream data back and forth). The access.log indicates that no subject is associated with the action. Is there a way to associate the authenticated subject with the URL connection?
WLS 8.1 SP2
Thanks,
Bob

Not in a directway, though you may set a token and implement an Identity asserter which can understand the token.

Similar Messages

  • Encrypting authentication details - HTTP URL Connection

    Hi,
    We have a Java application which retreives HTML content from intranet page using HTTPURLConnection, displays the portion of the content. The site to which we are connecting using HTTPURLConnection requires baisc user authentication and we are passing the user name and passowrd using BASE 64 encoding in the request header. Now this intranet site is going to be hosted externally. Just wanted to know the different options on how to send the user name and password in ecnrypted format.Is the recommendation is just to enable HTTPS for that site and pass user name and password using HTTP URL Connection API? Or are there any other options? Appreciate any inputs.
    Thanks.

    http://java.sun.com/javase/6/docs/technotes/guides/net/http-auth.html

  • What is the difference between HTTPS URL connection and SSLSocket conn

    What is the difference between HTTPS URL connection and SSLSocket connection

    The difference is that they are different protocols, or rather one protocol layered over the other. If you're within a LAN you will use SSL, if it's a Web service you will use HTTPS.

  • Getting FileNotFound Exception while using https url connection

    Hi
    I am facing a serious problem in running the code. I am using JSSE in my code and through this application I am hitting a URL which is also using HTTPS and that code is also using JSSE in servlets.
    Now when I use the code I get a FileNotFoundException which says that the particular servlet is not located. I have given debug mode on and I could see that initial handshake is over and after that its throwing FileNotFoundException.
    This problem is very serious because this system is live and now for this particular case where both the server and client are using JSSE , is failing.
    Kindly suggest me some solution
    Best Regards
    vrkirubakaran

    Hi
    Thanx for ur reply,
    We tried it from the Browser its working fine, more over we are not using any proxy, but i tried to hit thru the java jsse application its giving FileNotFoundException.
    When i gone thru the Debug Log, it shows 403 Access Denied, for ur reference i am pasting the logs below
    ==========================================
    Chkmsg->0100|https://www.ceemea2.citibank.com/servlet/recieve|09082001020202|10210010|123456789012|000002|0.05|
    %% No cached client session
    *** ClientHello, v3.1
    RandomCookie: GMT: 997419653 bytes = { 190, 156, 211, 219, 90, 50, 59, 1, 16, 169, 254, 51, 21, 62, 149, 90, 231, 94, 80, 246, 100, 50, 31, 80, 99, 113, 30, 127 }
    Session ID: {}
    Cipher Suites: { 0, 3, 0, 17 }
    Compression Methods: { 0 }
    [write] MD5 and SHA1 hashes: len = 47
    0000: 01 00 00 2B 03 01 3B 73 6B 85 BE 9C D3 DB 5A 32 ...+..;sk.....Z2
    0010: 3B 01 10 A9 FE 33 15 3E 95 5A E7 5E 50 F6 64 32 ;....3.>.Z.^P.d2
    0020: 1F 50 63 71 1E 7F 00 00 04 00 03 00 11 01 00 .Pcq...........
    main, WRITE: SSL v3.1 Handshake, length = 47
    [write] MD5 and SHA1 hashes: len = 50
    0000: 01 03 01 00 09 00 00 00 20 00 00 03 02 00 80 00 ........ .......
    0010: 00 11 3B 73 6B 85 BE 9C D3 DB 5A 32 3B 01 10 A9 ..;sk.....Z2;...
    0020: FE 33 15 3E 95 5A E7 5E 50 F6 64 32 1F 50 63 71 .3.>.Z.^P.d2.Pcq
    0030: 1E 7F ..
    main, WRITE: SSL v2, contentType = 22, translated length = 16337
    main, READ: SSL v3.0 Handshake, length = 3339
    *** ServerHello, v3.0
    RandomCookie: GMT: 14337 bytes = { 1, 253, 137, 78, 248, 161, 43, 251, 125, 205, 205, 145, 69, 176, 100, 201, 82, 209, 44, 155, 194, 143, 205, 173, 177, 32, 62, 162 }
    Session ID: {14, 91, 242, 201, 133, 233, 30, 179, 233, 88, 72, 170, 146, 254, 185, 30, 0, 204, 59, 190, 74, 213, 180, 255, 110, 242, 135, 204, 143, 104, 171, 178}
    Cipher Suite: { 0, 3 }
    Compression Method: 0
    %% Created: [Session-1, SSL_RSA_EXPORT_WITH_RC4_40_MD5]
    ** SSL_RSA_EXPORT_WITH_RC4_40_MD5
    [read] MD5 and SHA1 hashes: len = 74
    0000: 02 00 00 46 03 00 00 00 38 01 01 FD 89 4E F8 A1 ...F....8....N..
    0010: 2B FB 7D CD CD 91 45 B0 64 C9 52 D1 2C 9B C2 8F +.....E.d.R.,...
    0020: CD AD B1 20 3E A2 20 0E 5B F2 C9 85 E9 1E B3 E9 ... >. .[.......
    0030: 58 48 AA 92 FE B9 1E 00 CC 3B BE 4A D5 B4 FF 6E XH.......;.J...n
    0040: F2 87 CC 8F 68 AB B2 00 03 00 ....h.....
    *** Certificate chain
    chain [0] = [
    Version: V3
    Subject: CN=www.ceemea2.citibank.com, OU=Terms of use at www.verisign.com/rpa (c)00, OU=CGTI, O=Citibank N A, L=London, ST=London, C=GB
    Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
    Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@5087d0d6
    Validity: [From: Fri Dec 22 05:30:00 GMT+05:30 2000,
                   To: Sun Dec 23 05:29:59 GMT+05:30 2001]
    Issuer: OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign, OU=VeriSign International Server CA - Class 3, OU="VeriSign, Inc.", O=VeriSign Trust Network
    SerialNumber: [    6096271c 4fd3f6fb 6d1ba8c2 3971dec5 ]
    Certificate Extensions: 5
    [1]: ObjectId: 2.16.840.1.113733.1.6.15 Criticality=false
    Extension unknown: DER encoded OCTET string =
    0000: 04 0B 16 09 35 34 39 31 32 36 33 38 31 ....549126381
    [2]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false
    NetscapeCertType [
    SSL server
    [3]: ObjectId: 2.5.29.3 Criticality=false
    Extension unknown: DER encoded OCTET string =
    0000: 04 82 02 16 30 82 02 12 30 82 02 0E 30 82 02 0A ....0...0...0...
    0010: 06 0B 60 86 48 01 86 F8 45 01 07 01 01 30 82 01 ..`.H...E....0..
    0020: F9 16 82 01 A7 54 68 69 73 20 63 65 72 74 69 66 .....This certif
    0030: 69 63 61 74 65 20 69 6E 63 6F 72 70 6F 72 61 74 icate incorporat
    0040: 65 73 20 62 79 20 72 65 66 65 72 65 6E 63 65 2C es by reference,
    0050: 20 61 6E 64 20 69 74 73 20 75 73 65 20 69 73 20 and its use is
    0060: 73 74 72 69 63 74 6C 79 20 73 75 62 6A 65 63 74 strictly subject
    0070: 20 74 6F 2C 20 74 68 65 20 56 65 72 69 53 69 67 to, the VeriSig
    0080: 6E 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E 20 n Certification
    0090: 50 72 61 63 74 69 63 65 20 53 74 61 74 65 6D 65 Practice Stateme
    00A0: 6E 74 20 28 43 50 53 29 2C 20 61 76 61 69 6C 61 nt (CPS), availa
    00B0: 62 6C 65 20 61 74 3A 20 68 74 74 70 73 3A 2F 2F ble at: https://
    00C0: 77 77 77 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D www.verisign.com
    00D0: 2F 43 50 53 3B 20 62 79 20 45 2D 6D 61 69 6C 20 /CPS; by E-mail
    00E0: 61 74 20 43 50 53 2D 72 65 71 75 65 73 74 73 40 at CPS-requests@
    00F0: 76 65 72 69 73 69 67 6E 2E 63 6F 6D 3B 20 6F 72 verisign.com; or
    0100: 20 62 79 20 6D 61 69 6C 20 61 74 20 56 65 72 69 by mail at Veri
    0110: 53 69 67 6E 2C 20 49 6E 63 2E 2C 20 32 35 39 33 Sign, Inc., 2593
    0120: 20 43 6F 61 73 74 20 41 76 65 2E 2C 20 4D 6F 75 Coast Ave., Mou
    0130: 6E 74 61 69 6E 20 56 69 65 77 2C 20 43 41 20 39 ntain View, CA 9
    0140: 34 30 34 33 20 55 53 41 20 54 65 6C 2E 20 2B 31 4043 USA Tel. +1
    0150: 20 28 34 31 35 29 20 39 36 31 2D 38 38 33 30 20 (415) 961-8830
    0160: 43 6F 70 79 72 69 67 68 74 20 28 63 29 20 31 39 Copyright (c) 19
    0170: 39 36 20 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 96 VeriSign, Inc
    0180: 2E 20 20 41 6C 6C 20 52 69 67 68 74 73 20 52 65 . All Rights Re
    0190: 73 65 72 76 65 64 2E 20 43 45 52 54 41 49 4E 20 served. CERTAIN
    01A0: 57 41 52 52 41 4E 54 49 45 53 20 44 49 53 43 4C WARRANTIES DISCL
    01B0: 41 49 4D 45 44 20 61 6E 64 20 4C 49 41 42 49 4C AIMED and LIABIL
    01C0: 49 54 59 20 4C 49 4D 49 54 45 44 2E A0 0E 06 0C ITY LIMITED.....
    01D0: 60 86 48 01 86 F8 45 01 07 01 01 01 A1 0E 06 0C `.H...E.........
    01E0: 60 86 48 01 86 F8 45 01 07 01 01 02 30 2C 30 2A `.H...E.....0,0*
    01F0: 16 28 68 74 74 70 73 3A 2F 2F 77 77 77 2E 76 65 .(https://www.ve
    0200: 72 69 73 69 67 6E 2E 63 6F 6D 2F 72 65 70 6F 73 risign.com/repos
    0210: 69 74 6F 72 79 2F 43 50 53 20 itory/CPS
    [4]: ObjectId: 2.5.29.37 Criticality=false
    Extension unknown: DER encoded OCTET string =
    0000: 04 0D 30 0B 06 09 60 86 48 01 86 F8 42 04 01 ..0...`.H...B..
    [5]: ObjectId: 2.5.29.19 Criticality=false
    BasicConstraints:[
    CA:false
    PathLen: undefined
    Algorithm: [MD5withRSA]
    Signature:
    0000: 0F F0 06 60 B2 15 0F 90 6A 76 D1 4D 59 03 45 17 ...`....jv.MY.E.
    0010: 4D 3B 5F F9 82 49 CB E5 CC 5D D0 44 E6 F0 8B 26 M;_..I...].D...&
    0020: 46 25 D5 AC B6 31 18 7B F0 27 A2 32 0D E3 EF 1F F%...1...'.2....
    0030: 48 36 8F C7 9A 6D FC 2D 32 A1 D3 0F F3 EE A7 21 H6...m.-2......!
    0040: B7 40 88 B5 5D 60 3E 93 84 EE 42 9F AC 27 B9 4C .@..]`>...B..'.L
    0050: 63 95 E1 2C 7D 89 89 94 D9 F6 FE 48 6D 11 4A 3E c..,.......Hm.J>
    0060: 7A 38 C1 48 33 93 B3 0B 31 AE 77 6C 79 4F 27 A4 z8.H3...1.wlyO'.
    0070: 90 5A D4 C3 AE 8F 5E AE 52 AE 3C 39 23 12 D2 7A .Z....^.R.<9#..z
    chain [1] = [
    Version: V3
    Subject: OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign, OU=VeriSign International Server CA - Class 3, OU="VeriSign, Inc.", O=VeriSign Trust Network
    Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
    Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@367bd0d6
    Validity: [From: Thu Apr 17 05:30:00 GMT+05:30 1997,
                   To: Thu Jan 08 05:29:59 GMT+05:30 2004]
    Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
    SerialNumber: [    236c971e 2bc60d0b f97460de f108c3c3 ]
    Certificate Extensions: 5
    [1]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false
    NetscapeCertType [
    SSL CA
    S/MIME CA
    [2]: ObjectId: 2.5.29.32 Criticality=false
    Extension unknown: DER encoded OCTET string =
    0000: 04 82 01 2C 30 82 01 28 30 82 01 24 06 0B 60 86 ...,0..(0..$..`.
    0010: 48 01 86 F8 45 01 07 01 01 30 82 01 13 30 28 06 H...E....0...0(.
    0020: 08 2B 06 01 05 05 07 02 01 16 1C 68 74 74 70 73 .+.........https
    0030: 3A 2F 2F 77 77 77 2E 76 65 72 69 73 69 67 6E 2E ://www.verisign.
    0040: 63 6F 6D 2F 43 50 53 30 81 E6 06 08 2B 06 01 05 com/CPS0....+...
    0050: 05 07 02 02 30 81 D9 30 15 16 0E 56 65 72 69 53 ....0..0...VeriS
    0060: 69 67 6E 2C 20 49 6E 63 2E 30 03 02 01 01 1A 81 ign, Inc.0......
    0070: BF 56 65 72 69 53 69 67 6E 27 73 20 43 65 72 74 .VeriSign's Cert
    0080: 69 66 69 63 61 74 69 6F 6E 20 50 72 61 63 74 69 ification Practi
    0090: 63 65 20 53 74 61 74 65 6D 65 6E 74 2C 20 77 77 ce Statement, ww
    00A0: 77 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 43 w.verisign.com/C
    00B0: 50 53 2C 20 67 6F 76 65 72 6E 73 20 74 68 69 73 PS, governs this
    00C0: 20 63 65 72 74 69 66 69 63 61 74 65 20 26 20 69 certificate & i
    00D0: 73 20 69 6E 63 6F 72 70 6F 72 61 74 65 64 20 62 s incorporated b
    00E0: 79 20 72 65 66 65 72 65 6E 63 65 20 68 65 72 65 y reference here
    00F0: 69 6E 2E 20 53 4F 4D 45 20 57 41 52 52 41 4E 54 in. SOME WARRANT
    0100: 49 45 53 20 44 49 53 43 4C 41 49 4D 45 44 20 26 IES DISCLAIMED &
    0110: 20 4C 49 41 42 49 4C 49 54 59 20 4C 54 44 2E 20 LIABILITY LTD.
    0120: 28 63 29 31 39 39 37 20 56 65 72 69 53 69 67 6E (c)1997 VeriSign
    [3]: ObjectId: 2.5.29.15 Criticality=false
    KeyUsage [
    Key_CertSign
    Crl_Sign
    [4]: ObjectId: 2.5.29.37 Criticality=false
    Extension unknown: DER encoded OCTET string =
    0000: 04 19 30 17 06 0A 60 86 48 01 86 F8 45 01 08 01 ..0...`.H...E...
    0010: 06 09 60 86 48 01 86 F8 42 04 01 ..`.H...B..
    [5]: ObjectId: 2.5.29.19 Criticality=false
    BasicConstraints:[
    CA:true
    PathLen:0
    Algorithm: [MD2withRSA]
    Signature:
    0000: B8 8C 98 C3 2B 48 F5 72 CD 68 0D 1A B3 74 63 BB ....+H.r.h...tc.
    0010: B1 58 B6 98 45 22 EC 11 8D C7 4E 33 8B 62 5A 21 .X..E"....N3.bZ!
    0020: 24 6C 9A C0 42 B4 45 A9 3A FB 67 F0 91 BE 18 1F $l..B.E.:.g.....
    0030: D5 48 19 93 6B 8D CB 37 4B 86 E6 7D 9B FD 8C 78 .H..k..7K......x
    0040: 99 FF 83 C2 FC D9 55 06 9E 31 66 46 7D 1B 78 60 ......U..1fF..x`
    0050: F4 55 D4 6C 55 C8 69 62 70 7C 4D B6 89 06 05 9B .U.lU.ibp.M.....
    0060: C8 43 8E CC 0C 28 D5 D1 8C CD 46 50 E3 31 96 66 .C...(....FP.1.f
    0070: 92 11 24 1E 4A 5B 4B 66 5E 65 55 1E 5F 37 9A AE ..$.J[Kf^eU._7..
    chain [2] = [
    Version: V1
    Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
    Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
    Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@6f4bd0d6
    Validity: [From: Mon Jan 29 05:30:00 GMT+05:30 1996,
                   To: Wed Aug 02 05:29:59 GMT+05:30 2028]
    Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
    SerialNumber: [    70bae41d 10d92934 b638ca7b 03ccbabf ]
    Algorithm: [MD2withRSA]
    Signature:
    0000: BB 4C 12 2B CF 2C 26 00 4F 14 13 DD A6 FB FC 0A .L.+.,&.O.......
    0010: 11 84 8C F3 28 1C 67 92 2F 7C B6 C5 FA DF F0 E8 ....(.g./.......
    0020: 95 BC 1D 8F 6C 2C A8 51 CC 73 D8 A4 C0 53 F0 4E ....l,.Q.s...S.N
    0030: D6 26 C0 76 01 57 81 92 5E 21 F1 D1 B1 FF E7 D0 .&.v.W..^!......
    0040: 21 58 CD 69 17 E3 44 1C 9C 19 44 39 89 5C DC 9C !X.i..D...D9.\..
    0050: 00 0F 56 8D 02 99 ED A2 90 45 4C E4 BB 10 A4 3D ..V......EL....=
    0060: F0 32 03 0E F1 CE F8 E8 C9 51 8C E6 62 9F E6 9F .2.......Q..b...
    0070: C0 7D B7 72 9C C9 36 3A 6B 9F 4E A8 FF 64 0D 64 ...r..6:k.N..d.d
    [read] MD5 and SHA1 hashes: len = 3055
    0000: 0B 00 0B EB 00 0B E8 00 05 6A 30 82 05 66 30 82 .........j0..f0.
    0010: 04 CF A0 03 02 01 02 02 10 60 96 27 1C 4F D3 F6 .........`.'.O..
    0020: FB 6D 1B A8 C2 39 71 DE C5 30 0D 06 09 2A 86 48 .m...9q..0...*.H
    0030: 86 F7 0D 01 01 04 05 00 30 81 BA 31 1F 30 1D 06 ........0..1.0..
    0040: 03 55 04 0A 13 16 56 65 72 69 53 69 67 6E 20 54 .U....VeriSign T
    0050: 72 75 73 74 20 4E 65 74 77 6F 72 6B 31 17 30 15 rust Network1.0.
    0060: 06 03 55 04 0B 13 0E 56 65 72 69 53 69 67 6E 2C ..U....VeriSign,
    0070: 20 49 6E 63 2E 31 33 30 31 06 03 55 04 0B 13 2A Inc.1301..U...*
    0080: 56 65 72 69 53 69 67 6E 20 49 6E 74 65 72 6E 61 VeriSign Interna
    0090: 74 69 6F 6E 61 6C 20 53 65 72 76 65 72 20 43 41 tional Server CA
    00A0: 20 2D 20 43 6C 61 73 73 20 33 31 49 30 47 06 03 - Class 31I0G..
    00B0: 55 04 0B 13 40 77 77 77 2E 76 65 72 69 73 69 67 [email protected]
    00C0: 6E 2E 63 6F 6D 2F 43 50 53 20 49 6E 63 6F 72 70 n.com/CPS Incorp
    00D0: 2E 62 79 20 52 65 66 2E 20 4C 49 41 42 49 4C 49 .by Ref. LIABILI
    00E0: 54 59 20 4C 54 44 2E 28 63 29 39 37 20 56 65 72 TY LTD.(c)97 Ver
    00F0: 69 53 69 67 6E 30 1E 17 0D 30 30 31 32 32 32 30 iSign0...0012220
    0100: 30 30 30 30 30 5A 17 0D 30 31 31 32 32 32 32 33 00000Z..01122223
    0110: 35 39 35 39 5A 30 81 AD 31 0B 30 09 06 03 55 04 5959Z0..1.0...U.
    0120: 06 13 02 47 42 31 0F 30 0D 06 03 55 04 08 13 06 ...GB1.0...U....
    0130: 4C 6F 6E 64 6F 6E 31 0F 30 0D 06 03 55 04 07 14 London1.0...U...
    0140: 06 4C 6F 6E 64 6F 6E 31 15 30 13 06 03 55 04 0A .London1.0...U..
    0150: 14 0C 43 69 74 69 62 61 6E 6B 20 4E 20 41 31 0D ..Citibank N A1.
    0160: 30 0B 06 03 55 04 0B 14 04 43 47 54 49 31 33 30 0...U....CGTI130
    0170: 31 06 03 55 04 0B 14 2A 54 65 72 6D 73 20 6F 66 1..U...*Terms of
    0180: 20 75 73 65 20 61 74 20 77 77 77 2E 76 65 72 69 use at www.veri
    0190: 73 69 67 6E 2E 63 6F 6D 2F 72 70 61 20 28 63 29 sign.com/rpa (c)
    01A0: 30 30 31 21 30 1F 06 03 55 04 03 14 18 77 77 77 001!0...U....www
    01B0: 2E 63 65 65 6D 65 61 32 2E 63 69 74 69 62 61 6E .ceemea2.citiban
    01C0: 6B 2E 63 6F 6D 30 81 9F 30 0D 06 09 2A 86 48 86 k.com0..0...*.H.
    01D0: F7 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 ...........0....
    01E0: 81 00 BB 27 99 DF 3B A4 10 CE 0F BB 86 4C AB 2A ...'..;......L.*
    01F0: 4C AE 66 34 A4 36 F3 0B 0D 02 55 BF E9 16 46 68 L.f4.6....U...Fh
    0200: AE D2 FA EA 07 3A 08 0F B0 48 99 6C 89 CA 9A D3 .....:...H.l....
    0210: 64 FE F6 ED 24 66 EA C6 86 48 70 56 33 D4 34 57 d...$f...HpV3.4W
    0220: 8E 0B DE 42 E1 36 9F 82 BA ED 25 05 AC BB 56 4B ...B.6....%...VK
    0230: 45 52 FA E1 CA 81 EE E0 88 A6 6E C8 A9 FD F4 5A ER........n....Z
    0240: 01 64 DB F4 6D 51 3D 85 10 57 BF ED 61 DD 0C 65 .d..mQ=..W..a..e
    0250: 09 85 08 AC C9 4E E7 2B 81 3D A6 CE 5E 23 D1 EC .....N.+.=..^#..
    0260: 6D F5 02 03 01 00 01 A3 82 02 76 30 82 02 72 30 m.........v0..r0
    0270: 09 06 03 55 1D 13 04 02 30 00 30 82 02 1F 06 03 ...U....0.0.....
    0280: 55 1D 03 04 82 02 16 30 82 02 12 30 82 02 0E 30 U......0...0...0
    0290: 82 02 0A 06 0B 60 86 48 01 86 F8 45 01 07 01 01 .....`.H...E....
    02A0: 30 82 01 F9 16 82 01 A7 54 68 69 73 20 63 65 72 0.......This cer
    02B0: 74 69 66 69 63 61 74 65 20 69 6E 63 6F 72 70 6F tificate incorpo
    02C0: 72 61 74 65 73 20 62 79 20 72 65 66 65 72 65 6E rates by referen
    02D0: 63 65 2C 20 61 6E 64 20 69 74 73 20 75 73 65 20 ce, and its use
    02E0: 69 73 20 73 74 72 69 63 74 6C 79 20 73 75 62 6A is strictly subj
    02F0: 65 63 74 20 74 6F 2C 20 74 68 65 20 56 65 72 69 ect to, the Veri
    0300: 53 69 67 6E 20 43 65 72 74 69 66 69 63 61 74 69 Sign Certificati
    0310: 6F 6E 20 50 72 61 63 74 69 63 65 20 53 74 61 74 on Practice Stat
    0320: 65 6D 65 6E 74 20 28 43 50 53 29 2C 20 61 76 61 ement (CPS), ava
    0330: 69 6C 61 62 6C 65 20 61 74 3A 20 68 74 74 70 73 ilable at: https
    0340: 3A 2F 2F 77 77 77 2E 76 65 72 69 73 69 67 6E 2E ://www.verisign.
    0350: 63 6F 6D 2F 43 50 53 3B 20 62 79 20 45 2D 6D 61 com/CPS; by E-ma
    0360: 69 6C 20 61 74 20 43 50 53 2D 72 65 71 75 65 73 il at CPS-reques
    0370: 74 73 40 76 65 72 69 73 69 67 6E 2E 63 6F 6D 3B [email protected];
    0380: 20 6F 72 20 62 79 20 6D 61 69 6C 20 61 74 20 56 or by mail at V
    0390: 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E 2C 20 32 eriSign, Inc., 2
    03A0: 35 39 33 20 43 6F 61 73 74 20 41 76 65 2E 2C 20 593 Coast Ave.,
    03B0: 4D 6F 75 6E 74 61 69 6E 20 56 69 65 77 2C 20 43 Mountain View, C
    03C0: 41 20 39 34 30 34 33 20 55 53 41 20 54 65 6C 2E A 94043 USA Tel.
    03D0: 20 2B 31 20 28 34 31 35 29 20 39 36 31 2D 38 38 +1 (415) 961-88
    03E0: 33 30 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 30 Copyright (c)
    03F0: 20 31 39 39 36 20 56 65 72 69 53 69 67 6E 2C 20 1996 VeriSign,
    0400: 49 6E 63 2E 20 20 41 6C 6C 20 52 69 67 68 74 73 Inc. All Rights
    0410: 20 52 65 73 65 72 76 65 64 2E 20 43 45 52 54 41 Reserved. CERTA
    0420: 49 4E 20 57 41 52 52 41 4E 54 49 45 53 20 44 49 IN WARRANTIES DI
    0430: 53 43 4C 41 49 4D 45 44 20 61 6E 64 20 4C 49 41 SCLAIMED and LIA
    0440: 42 49 4C 49 54 59 20 4C 49 4D 49 54 45 44 2E A0 BILITY LIMITED..
    0450: 0E 06 0C 60 86 48 01 86 F8 45 01 07 01 01 01 A1 ...`.H...E......
    0460: 0E 06 0C 60 86 48 01 86 F8 45 01 07 01 01 02 30 ...`.H...E.....0
    0470: 2C 30 2A 16 28 68 74 74 70 73 3A 2F 2F 77 77 77 ,0*.(https://www
    0480: 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 72 65 .verisign.com/re
    0490: 70 6F 73 69 74 6F 72 79 2F 43 50 53 20 30 11 06 pository/CPS 0..
    04A0: 09 60 86 48 01 86 F8 42 01 01 04 04 03 02 06 40 .`.H...B.......@
    04B0: 30 14 06 03 55 1D 25 04 0D 30 0B 06 09 60 86 48 0...U.%..0...`.H
    04C0: 01 86 F8 42 04 01 30 19 06 0A 60 86 48 01 86 F8 ...B..0...`.H...
    04D0: 45 01 06 0F 04 0B 16 09 35 34 39 31 32 36 33 38 E.......54912638
    04E0: 31 30 0D 06 09 2A 86 48 86 F7 0D 01 01 04 05 00 10...*.H........
    04F0: 03 81 81 00 0F F0 06 60 B2 15 0F 90 6A 76 D1 4D .......`....jv.M
    0500: 59 03 45 17 4D 3B 5F F9 82 49 CB E5 CC 5D D0 44 Y.E.M;_..I...].D
    0510: E6 F0 8B 26 46 25 D5 AC B6 31 18 7B F0 27 A2 32 ...&F%...1...'.2
    0520: 0D E3 EF 1F 48 36 8F C7 9A 6D FC 2D 32 A1 D3 0F ....H6...m.-2...
    0530: F3 EE A7 21 B7 40 88 B5 5D 60 3E 93 84 EE 42 9F ...!.@..]`>...B.
    0540: AC 27 B9 4C 63 95 E1 2C 7D 89 89 94 D9 F6 FE 48 .'.Lc..,.......H
    0550: 6D 11 4A 3E 7A 38 C1 48 33 93 B3 0B 31 AE 77 6C m.J>z8.H3...1.wl
    0560: 79 4F 27 A4 90 5A D4 C3 AE 8F 5E AE 52 AE 3C 39 yO'..Z....^.R.<9
    0570: 23 12 D2 7A 00 04 35 30 82 04 31 30 82 03 9A A0 #..z..50..10....
    0580: 03 02 01 02 02 10 23 6C 97 1E 2B C6 0D 0B F9 74 ......#l..+....t
    0590: 60 DE F1 08 C3 C3 30 0D 06 09 2A 86 48 86 F7 0D `.....0...*.H...
    05A0: 01 01 02 05 00 30 5F 31 0B 30 09 06 03 55 04 06 .....0_1.0...U..
    05B0: 13 02 55 53 31 17 30 15 06 03 55 04 0A 13 0E 56 ..US1.0...U....V
    05C0: 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E 31 37 30 eriSign, Inc.170
    05D0: 35 06 03 55 04 0B 13 2E 43 6C 61 73 73 20 33 20 5..U....Class 3
    05E0: 50 75 62 6C 69 63 20 50 72 69 6D 61 72 79 20 43 Public Primary C
    05F0: 65 72 74 69 66 69 63 61 74 69 6F 6E 20 41 75 74 ertification Aut
    0600: 68 6F 72 69 74 79 30 1E 17 0D 39 37 30 34 31 37 hority0...970417
    0610: 30 30 30 30 30 30 5A 17 0D 30 34 30 31 30 37 32 000000Z..0401072
    0620: 33 35 39 35 39 5A 30 81 BA 31 1F 30 1D 06 03 55 35959Z0..1.0...U
    0630: 04 0A 13 16 56 65 72 69 53 69 67 6E 20 54 72 75 ....VeriSign Tru
    0640: 73 74 20 4E 65 74 77 6F 72 6B 31 17 30 15 06 03 st Network1.0...
    0650: 55 04 0B 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 U....VeriSign, I
    0660: 6E 63 2E 31 33 30 31 06 03 55 04 0B 13 2A 56 65 nc.1301..U...*Ve
    0670: 72 69 53 69 67 6E 20 49 6E 74 65 72 6E 61 74 69 riSign Internati
    0680: 6F 6E 61 6C 20 53 65 72 76 65 72 20 43 41 20 2D onal Server CA -
    0690: 20 43 6C 61 73 73 20 33 31 49 30 47 06 03 55 04 Class 31I0G..U.
    06A0: 0B 13 40 77 77 77 2E 76 65 72 69 73 69 67 6E 2E [email protected].
    06B0: 63 6F 6D 2F 43 50 53 20 49 6E 63 6F 72 70 2E 62 com/CPS Incorp.b
    06C0: 79 20 52 65 66 2E 20 4C 49 41 42 49 4C 49 54 59 y Ref. LIABILITY
    06D0: 20 4C 54 44 2E 28 63 29 39 37 20 56 65 72 69 53 LTD.(c)97 VeriS
    06E0: 69 67 6E 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D ign0..0...*.H...
    06F0: 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 .........0......
    0700: D8 82 80 E8 D6 19 02 7D 1F 85 18 39 25 A2 65 2B ...........9%.e+
    0710: E1 BF D4 05 D3 BC E6 36 3B AA F0 4C 6C 5B B6 E7 .......6;..Ll[..
    0720: AA 3C 73 45 55 B2 F1 BD EA 97 42 ED 9A 34 0A 15 .<sEU.....B..4..
    0730: D4 A9 5C F5 40 25 DD D9 07 C1 32 B2 75 6C C4 CA ..\.@%....2.ul..
    0740: BB A3 FE 56 27 71 43 AA 63 F5 30 3E 93 28 E5 FA ...V'qC.c.0>.(..
    0750: F1 09 3B F3 B7 4D 4E 39 F7 5C 49 5A B8 C1 1D D3 ..;..MN9.\IZ....
    0760: B2 8A FE 70 30 95 42 CB FE 2B 51 8B 5A 3C 3A F9 ...p0.B..+Q.Z<:.
    0770: 22 4F 90 B2 02 A7 53 9C 4F 34 E7 AB 04 B2 7B 6F "O....S.O4.....o
    0780: 02 03 01 00 01 A3 82 01 90 30 82 01 8C 30 0F 06 .........0...0..
    0790: 03 55 1D 13 04 08 30 06 01 01 FF 02 01 00 30 0B .U....0.......0.
    07A0: 06 03 55 1D 0F 04 04 03 02 01 06 30 11 06 09 60 ..U........0...`
    07B0: 86 48 01 86 F8 42 01 01 04 04 03 02 01 06 30 20 .H...B........0
    07C0: 06 03 55 1D 25 04 19 30 17 06 0A 60 86 48 01 86 ..U.%..0...`.H..
    07D0: F8 45 01 08 01 06 09 60 86 48 01 86 F8 42 04 01 .E.....`.H...B..
    07E0: 30 82 01 35 06 03 55 1D 20 04 82 01 2C 30 82 01 0..5..U. ...,0..
    07F0: 28 30 82 01 24 06 0B 60 86 48 01 86 F8 45 01 07 (0..$..`.H...E..
    0800: 01 01 30 82 01 13 30 28 06 08 2B 06 01 05 05 07 ..0...0(..+.....
    0810: 02 01 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E ....https://www.
    0820: 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 43 50 53 verisign.com/CPS
    0830: 30 81 E6 06 08 2B 06 01 05 05 07 02 02 30 81 D9 0....+.......0..
    0840: 30 15 16 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 0...VeriSign, In
    0850: 63 2E 30 03 02 01 01 1A 81 BF 56 65 72 69 53 69 c.0.......VeriSi
    0860: 67 6E 27 73 20 43 65 72 74 69 66 69 63 61 74 69 gn's Certificati
    0870: 6F 6E 20 50 72 61 63 74 69 63 65 20 53 74 61 74 on Practice Stat
    0880: 65 6D 65 6E 74 2C 20 77 77 77 2E 76 65 72 69 73 ement, www.veris
    0890: 69 67 6E 2E 63 6F 6D 2F 43 50 53 2C 20 67 6F 76 ign.com/CPS, gov
    08A0: 65 72 6E 73 20 74 68 69 73 20 63 65 72 74 69 66 erns this certif
    08B0: 69 63 61 74 65 20 26 20 69 73 20 69 6E 63 6F 72 icate & is incor
    08C0: 70 6F 72 61 74 65 64 20 62 79 20 72 65 66 65 72 porated by refer
    08D0: 65 6E 63 65 20 68 65 72 65 69 6E 2E 20 53 4F 4D ence herein. SOM
    08E0: 45 20 57 41 52 52 41 4E 54 49 45 53 20 44 49 53 E WARRANTIES DIS
    08F0: 43 4C 41 49 4D 45 44 20 26 20 4C 49 41 42 49 4C CLAIMED & LIABIL
    0900: 49 54 59 20 4C 54 44 2E 20 28 63 29 31 39 39 37 ITY LTD. (c)1997
    0910: 20 56 65 72 69 53 69 67 6E 30 0D 06 09 2A 86 48 VeriSign0...*.H
    0920: 86 F7 0D 01 01 02 05 00 03 81 81 00 B8 8C 98 C3 ................
    0930: 2B 48 F5 72 CD 68 0D 1A B3 74 63 BB B1 58 B6 98 +H.r.h...tc..X..
    0940: 45 22 EC 11 8D C7 4E 33 8B 62 5A 21 24 6C 9A C0 E"....N3.bZ!$l..
    0950: 42 B4 45 A9 3A FB 67 F0 91 BE 18 1F D5 48 19 93 B.E.:.g......H..
    0960: 6B 8D CB 37 4B 86 E6 7D 9B FD 8C 78 99 FF 83 C2 k..7K......x....
    0970: FC D9 55 06 9E 31 66 46 7D 1B 78 60 F4 55 D4 6C ..U..1fF..x`.U.l
    0980: 55 C8 69 62 70 7C 4D B6 89 06 05 9B C8 43 8E CC U.ibp.M......C..
    0990: 0C 28 D5 D1 8C CD 46 50 E3 31 96 66 92 11 24 1E .(....FP.1.f..$.
    09A0: 4A 5B 4B 66 5E 65 55 1E 5F 37 9A AE 00 02 40 30 J[Kf^eU._7....@0
    09B0: 82 02 3C 30 82 01 A5 02 10 70 BA E4 1D 10 D9 29 ..<0.....p.....)
    09C0: 34 B6 38 CA 7B 03 CC BA BF 30 0D 06 09 2A 86 48 4.8......0...*.H
    09D0: 86 F7 0D 01 01 02 05 00 30 5F 31 0B 30 09 06 03 ........0_1.0...
    09E0: 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0A U....US1.0...U..
    09F0: 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E ..VeriSign, Inc.
    0A00: 31 37 30 35 06 03 55 04 0B 13 2E 43 6C 61 73 73 1705..U....Class
    0A10: 20 33 20 50 75 62 6C 69 63 20 50 72 69 6D 61 72 3 Public Primar
    0A20: 79 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E 20 y Certification
    0A30: 41 75 74 68 6F 72 69 74 79 30 1E 17 0D 39 36 30 Authority0...960
    0A40: 31 32 39 30 30 30 30 30 30 5A 17 0D 32 38 30 38 129000000Z..2808
    0A50: 30 31 32 33 35 39 35 39 5A 30 5F 31 0B 30 09 06 01235959Z0_1.0..
    0A60: 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 .U....US1.0...U.
    0A70: 0A 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 ...VeriSign, Inc
    0A80: 2E 31 37 30 35 06 03 55 04 0B 13 2E 43 6C 61 73 .1705..U....Clas
    0A90: 73 20 33 20 50 75 62 6C 69 63 20 50 72 69 6D 61 s 3 Public Prima
    0AA0: 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E ry Certification
    0AB0: 20 41 75 74 68 6F 72 69 74 79 30 81 9F 30 0D 06 Authority0..0..
    0AC0: 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 .*.H............
    0AD0: 30 81 89 02 81 81 00 C9 5C 59 9E F2 1B 8A 01 14 0.......\Y......
    0AE0: B4 10 DF 04 40 DB E3 57 AF 6A 45 40 8F 84 0C 0B [email protected]@....
    0AF0: D1 33 D9 D9 11 CF EE 02 58 1F 25 F7 2A A8 44 05 .3......X.%.*.D.
    0B00: AA EC 03 1F 78 7F 9E 93 B9 9A 00 AA 23 7D D6 AC ....x.......#...
    0B10: 85 A2 63 45 C7 72 27 CC F4 4C C6 75 71 D2 39 EF ..cE.r'..L.uq.9.
    0B20: 4F 42 F0 75 DF 0A 90 C6 8E 20 6F 98 0F F8 AC 23 OB.u..... o....#
    0B30: 5F 70 29 36 A4 C9 86 E7 B1 9A 20 CB 53 A5 85 E7 _p)6...... .S...
    0B40: 3D BE 7D 9A FE 24 45 33 DC 76 15 ED 0F A2 71 64 =....$E3.v....qd
    0B50: 4C 65 2E 81 68 45 A7 02 03 01 00 01 30 0D 06 09 Le..hE......0...
    0B60: 2A 86 48 86 F7 0D 01 01 02 05 00 03 81 81 00 BB *.H.............
    0B70: 4C 12 2B CF 2C 26 00 4F 14 13 DD A6 FB FC 0A 11 L.+.,&.O........
    0B80: 84 8C F3 28 1C 67 92 2F 7C B6 C5 FA DF F0 E8 95 ...(.g./........
    0B90: BC 1D 8F 6C 2C A8 51 CC 73 D8 A4 C0 53 F0 4E D6 ...l,.Q.s...S.N.
    0BA0: 26 C0 76 01 57 81 92 5E 21 F1 D1 B1 FF E7 D0 21 &.v.W..^!......!
    0BB0: 58 CD 69 17 E3 44 1C 9C 19 44 39 89 5C DC 9C 00 X.i..D...D9.\...
    0BC0: 0F 56 8D 02 99 ED A2 90 45 4C E4 BB 10 A4 3D F0 .V......EL....=.
    0BD0: 32 03 0E F1 CE F8 E8 C9 51 8C E6 62 9F E6 9F C0 2.......Q..b....
    0BE0: 7D B7 72 9C C9 36 3A 6B 9F 4E A8 FF 64 0D 64 ..r..6:k.N..d.d
    *** RSA ServerKeyExchange
    RSA Modulus: { 0, 220, 139, 250, 222, 127, 49, 15, 95, 89, 215, 106, 138, 129, 235, 255, 93, 104, 66, 162, 49, 12, 56, 164, 176, 248, 178, 247, 19, 165, 158, 146, 23, 35, 24, 200, 200, 229, 62, 237, 249, 75, 51, 235, 70, 187, 24, 192, 112, 11, 73, 244, 220, 249, 20, 101, 136, 192, 4, 9, 50, 41, 141, 209, 85 }
    RSA Public Exponent: { 1, 0, 1 }
    [read] MD5 and SHA1 hashes: len = 206
    0000: 0C 00 00 CA 00 41 00 DC 8B FA DE 7F 31 0F 5F 59 .....A......1._Y
    0010: D7 6A 8A 81 EB FF 5D 68 42 A2 31 0C 38 A4 B0 F8 .j....]hB.1.8...
    0020: B2 F7 13 A5 9E 92 17 23 18 C8 C8 E5 3E ED F9 4B .......#....>..K
    0030: 33 EB 46 BB 18 C0 70 0B 49 F4 DC F9 14 65 88 C0 3.F...p.I....e..
    0040: 04 09 32 29 8D D1 55 00 03 01 00 01 00 80 BA 34 ..2)..U........4
    0050: E7 DB 69 31 D3 C3 40 70 D6 E8 21 59 F0 51 AB 16 ..i1..@p..!Y.Q..
    0060: 30 25 82 6B 89 71 C5 BA 88 EB B4 17 1C 6D E4 B5 0%.k.q.......m..
    0070: BB B9 97 3A 44 1D 8D 50 5D F0 3A A6 0A FF 60 CF ...:D..P].:...`.
    0080: DE CC ED 96 D8 0F F5 58 46 48 31 B1 35 0C 0D 4B .......XFH1.5..K
    0090: 2F 17 10 65 50 14 A1 4B 7E AC 1D 23 7E 46 D1 6B /..eP..K...#.F.k
    00A0: 96 67 AC 53 3A 4D 9A F8 6C B1 21 32 CE 88 3C 67 .g.S:M..l.!2..<g
    00B0: 2B 31 EA 1E 5D 26 0D 91 C0 97 F3 64 C9 9F 51 34 +1..]&.....d..Q4
    00C0: D9 A8 56 1C B8 46 62 8C 53 B8 EB E8 B8 94 ..V..Fb.S.....
    *** ServerHelloDone
    [read] MD5 and SHA1 hashes: len = 4
    0000: 0E 00 00 00 ....
    *** ClientKeyExchange, RSA PreMasterSecret, v3.0
    Random Secret: { 3, 0, 93, 240, 54, 45, 201, 36, 26, 84, 144, 76, 18, 32, 241, 29, 208, 244, 47, 63, 127, 113, 205, 22, 115, 183, 222, 202, 208, 173, 81, 168, 13, 177, 7, 184, 230, 85, 213, 248, 251, 113, 36, 156, 236, 171, 97, 216 }
    [write] MD5 and SHA1 hashes: len = 68
    0000: 10 00 00 40 B4 EC 49 02 09 61 36 4F 86 07 26 12 [email protected]..&.
    0010: 70 E2 EE 78 5F C8 6A 01 F9 32 89 1C 8B C4 2B 34 p..x_.j..2....+4
    0020: E3 B4 21 CA 60 E2 8A 56 B5 B2 20 BE FC 3B 5E 0A ..!.`..V.. ..;^.
    0030: D9 81 BB 35 49 C0 22 F6 69 1C F6 84 A7 45 12 C0 ...5I.".i....E..
    0040: 22 1E 86 47 "..G
    main, WRITE: SSL v3.0 Handshake, length = 68
    SESSION KEYGEN:
    PreMaster Secret:
    0000: 03 00 5D F0 36 2D C9 24 1A 54 90 4C 12 20 F1 1D ..].6-.$.T.L. ..
    0010: D0 F4 2F 3F 7F 71 CD 16 73 B7 DE CA D0 AD 51 A8 ../?.q..s.....Q.
    0020: 0D B1 07 B8 E6 55 D5 F8 FB 71 24 9C EC AB 61 D8 .....U...q$...a.
    CONNECTION KEYGEN:
    Client Nonce:
    0000: 3B 73 6B 85 BE 9C D3 DB 5A 32 3B 01 10 A9 FE 33 ;sk.....Z2;....3
    0010: 15 3E 95 5A E7 5E 50 F6 64 32 1F 50 63 71 1E 7F .>.Z.^P.d2.Pcq..
    Server Nonce:
    0000: 00 00 38 01 01 FD 89 4E F8 A1 2B FB 7D CD CD 91 ..8....N..+.....
    0010: 45 B0 64 C9 52 D1 2C 9B C2 8F CD AD B1 20 3E A2 E.d.R.,...... >.
    Master Secret:
    0000: 47 F8 BE 08 39 E9 48 F3 21 49 49 AA EA 35 D6 A6 G...9.H.!II..5..
    0010: 8C 1A 71 B6 EA 9C C5 CC C4 AF 86 D0 25 6D 89 DE ..q.........%m..
    0020: 5E FD 8C FC 2A 3C 18 35 6C B6 67 B0 F8 F7 E1 A3 ^...*<.5l.g.....
    Client MAC write Secret:
    0000: 35 EA 82 28 5D A7 9E E0 84 B7 EE D0 E3 42 09 77 5..(]........B.w
    Server MAC write Secret:
    0000: 0F 09 07 42 F3 44 F6 B0 A0 6E 8E 96 D6 DA E5 F5 ...B.D...n......
    Client write key:
    0000: 54 6A E0 5E 8B 05 03 59 D4 1F E3 FB B9 83 62 F4 Tj.^...Y......b.
    Server write key:
    0000: D5 7B 57 5B 29 58 36 7E 79 59 4F 66 20 9A 13 62 ..W[)X6.yYOf ..b
    ... no IV for cipher
    main, WRITE: SSL v3.0 Change Cipher Spec, length = 1
    *** Finished, v3.0
    MD5 Hash: { 15, 249, 230, 83, 227, 150, 56, 210, 34, 235, 9, 89, 131, 214, 230, 12 }
    SHA1 Hash: { 108, 86, 236, 53, 127, 202, 85, 117, 129, 156, 34, 177, 24, 29, 176, 163, 175, 46, 72, 236 }
    [write] MD5 and SHA1 hashes: len = 40
    0000: 14 00 00 24 0F F9 E6 53 E3 96 38 D2 22 EB 09 59 ...$...S..8."..Y
    0010: 83 D6 E6 0C 6C 56 EC 35 7F CA 55 75 81 9C 22 B1 ....lV.5..Uu..".
    0020: 18 1D B0 A3 AF 2E 48 EC ......H.
    Plaintext before ENCRYPTION: len = 56
    0000: 14 00 00 24 0F F9 E6 53 E3 96 38 D2 22 EB 09 59 ...$...S..8."..Y
    0010: 83 D6 E6 0C 6C 56 EC 35 7F CA 55 75 81 9C 22 B1 ....lV.5..Uu..".
    0020: 18 1D B0 A3 AF 2E 48 EC 70 B3 E7 C1 D9 6D D4 01 ......H.p....m..
    0030: EE F1 A5 DE F5 D1 11 8C ........
    main, WRITE: SSL v3.0 Handshake, length = 56
    main, READ: SSL v3.0 Change Cipher Spec, length = 1
    main, READ: SSL v3.0 Handshake, length = 56
    Plaintext after DECRYPTION: len = 56
    0000: 14 00 00 24 FF 99 25 8F B3 9E B7 A8 CA FF 48 64 ...$..%.......Hd
    0010: 77 DB BC EE 0C 74 A5 7C 61 A0 16 65

  • Getting the response code from a http url connection

    The following program bombs if it does not find a page
    import java.net.*;
    import java.io.*;
    public class URLReader {
    public static void main(String[] args) throws Exception {
    URL yahoo = new URL("http://www.yahoo.com/sadjhasjd.html");
    HttpURLConnection client = (HttpURLConnection) yahoo.openConnection();
    int resp_code = 0;
    if(client!=null)
    resp_code = client.getResponseCode();
    I want to get the page that the yahoo returns if it cannot get the page.... just cut and paste the above address in a web browser and see what you get.....how can i get that page back....the above thing throws an IOException...............
    thanks
    sharad

    The problem is it doesn't like .htm or .html for some reason.. I don't know this reason but somebody else might..
    Just try taking the .html off the link like this, then I'm sure you'll get the error now.
    URL yahoo = new URL("http://www.yahoo.com/sadjhasjd");
    I know it's not what you want but that is all I can offer. It seems to only look for the main index.htm(l) or welcome.htm(l) files. Sorry thats as much as I can offer on this.

  • Http url connection

    Hello every one
    actually i successfully login to webpage using httpPost
    String urlEncodedContent = preparePostContent(LOGIN_USER_NAME, LOGIN_PASSWORD);
                HttpURLConnection urlConnection = doHttpPost(TARGET_URL, urlEncodedContent);
                String response = readResponse(urlConnection);but how can navigate from the page which i login to it to other web page in order to get its content
    in other words
    if i login to www.site.com/login.html
    after logging from application i want to go to www.site.com/content/html but i lose my session so i get the content empty !!!
    thanks

    I guarantee that this will work for you: [Java Programmatic Browser|http://www.swview.org/blog/java-programmatic-browser]
    What you will do is visit the login page, submit the form and continue to the page you want. Look at the httpunit api for details (form submission).

  • Http Request through URL Connection?

    Hi ,
    Iam using an Applet (under JRE 1.3.0). Iam trying to send a Http Request using URL Connection. It is working fine . However, if the response time of the server is more than 3 minutes , the Response is not coming back to the server and the Applet is in a loop trying to read from the Server. I have observed that the request is sent to the server and it is processed successfully.
    When I test it in my local devp. machine it is working fine till 15 minutes which is my requirement.
    Can anybody suggest what should be the possible reasons and any workaround for it?
    Regards,
    TejoKiran.Y

    Iam copying the code fragments for the Applet Iam using . Is it a problem with the code? I heard that the URLConnection never times out . How is that it is not able to read the Response?
    <CODE >
    <HttpMessage>
    public class HttpMessage {
    URL servlet = null;
    Hashtable headers = null;
    public HttpMessage(URL servlet) {
    this.servlet = servlet;
    public InputStream sendGetMessage(Properties args) throws IOException {
    String argString = ""; // default
    if (args != null) {
    argString = "?" + toEncodedString(args);
    URL url = new URL(servlet.toExternalForm() + argString);
    // Turn off caching
    URLConnection con = url.openConnection();
    con.setUseCaches(false);
    // Send headers
    sendHeaders(con);
    return con.getInputStream();
    private void sendHeaders(URLConnection con) {
    if (headers != null) {
    Enumeration enum = headers.keys();
    while (enum.hasMoreElements()) {
    String name = (String) enum.nextElement();
    String value = (String) headers.get(name);
    con.setRequestProperty(name, value);
    </HttpMssage>
    <Code used to Read the Response.>
                        URL url = new URL(getDocumentBase(),"/ccls/test/delay.jsp");
                        HttpMessage msg = new HttpMessage(url);
                        InputStream in = msg.sendGetMessage(null);
                             char[] buff = new char[2048];
                             int bytesRead;
                             int ch;
                             StringBuffer sbtextbox = new StringBuffer("");
                             DataInputStream data = new DataInputStream(
                                                           new BufferedInputStream(in));
                             String line;
                        while ((line = data.readLine()) != null) {
                                  sbtextbox.append(line+"\r\n");
    </Code used to Read the Response.>
    </CODE>

  • OS X10.4.11 update, Safari won't connect to secure (HTTPS) URLs

    Didn't find any discussion of this particular symptom of the update, so thought I'd ask.
    Installed 10.4.11 update over the weekend, which contained Safari v3.0.4. After the (uneventful) install and reboot, I'm unable to connect to any secure (HTTPS) URL. Browser seems to work on non-secure connections (HTTP). My FIREFOX browser on the same machine still works.
    Haven't experienced any crashing or other OS issues, only the "Can't make a secure connection" with Safari (so far).
    Suggestions would be appreciated.

    Did you recently install the latest Security upgrade, but did not "repair permissions" on the restart? If so, that's your answer. I have found it essential to "Repair permissions" before and after any Apple system update, or Security update. Otherwise oddities may appear in the operating system.
    Also, sometimes reapplying the Combo Update specific to your current version of OS X remedies these types of problems. Here too, it's important to "repair permissions" etc.

  • How to connect HTTP URL

    hai guys,
      I developed one report and data downloaded into application path and file format is CSV. My development was working fine . Now I want to change file downloaded into FTP location ( this is also working). Now i want to connect HTTP URL path.
    How to connect HTTP URL path ( Not Open method  only connect)
    Thanks in advance

    Hello,
    U can make use of these Fm to connect to URL.
    Use this code.
    CNHT
    CALL FUNCTION 'WS_EXECUTE'                        "#EC *
      EXPORTING
        COMMANDLINE        = LV_CMDLINE
        PROGRAM            = LV_PGMNAME
      EXCEPTIONS
        FRONTEND_ERROR     = 1
        NO_BATCH           = 2
        PROG_NOT_FOUND     = 3
        ILLEGAL_OPTION     = 4
        GUI_REFUSE_EXECUTE = 5
        OTHERS             = 6.
    IF SY-SUBRC <> 0.
    Where LV_CMDLINE = WWW.SAP.COM
          LV_PGMNAME = IEXPLORE.EXE
    If useful reward points
    Vasanth
    Message was edited by: Vasanth M

  • How to do Handshake with tired party(bank) HTTPS URL from SAP PI server

    Dear Expert,
    I have developed bunch of scenarios, all are synchronous ABAP proxy to HTTP_AAE with bank on PI 7.4(dual stack). Bank web server is HTTPS enabled server. Our ABAP developments are still in progress also we have few issue in connection from ECC to PI.but that is not the focus of discussion here.
    we want to do the handshake to check the connectivity with bank on their HTTPS URL from PI. Bank has provided the privet key for SSL from their server and corresponding public key they have maintained on their server. I have imported the private key under NWA -> Certificates -> Key Storage -> TrustedCA->Import Entry->Entry Type->PKCS#12->select the SSL.p12 file->import , also I have selected the option to "Use SSL" in HTTP_AAE receiver communication channel and selected the corresponding entryin  "keystore view" and "keystore entry". All these I have done in our DEV system, and we are trying to connect our PI dev to bank Dev server.
    Questions
    Is there any specific steps to do the handshake with third party HTTPS(bank in my case) server? if not, how can we just test the HTTPS connectivity by using the SSL private installed on our PI server, without running the complete scenarios. Our PI has been installed on UNIX, and "telnet https url 443" is working, as network team has opened the HTTPS port.
    We have not enabled the SSL technically on our PI server, and we have not installed any generated certificate from our PI server. Moreover, we have not made our PI url as "https:hostname:port" as we just need to communicate with bank by using their private key. Do you guys think we should enable the SSL? if yes, please explain why.
    What is the best practice to test the connection with third party having HTTPS URL? how can I just assure HTTPS communication is working fine, before testing my actual scenarios.
    Thanks for helping always.
    Regards,
    Farhan

    Hi Farhan,
    Some part of the blog is applicable for sending HTTPS request to partners/third party (Receiver SOAP Adapter).
    If banks certificates are already in trustedCA, then,  can you check if it also imported under user PIISuser under Identity management in NWA. If above 2 steps are done then i think your are good to go. But be careful when you install certificate, it should be in proper order.
    As you already mentioned, connectivity is already established and you are able to PIng/telnet from pi server, connectivity looks ok.
    While sending request, if you are getting 401 unauthorized, below might be the reason -
    1. Certificate not installed correctly or some missing steps
    2. Partner or TP is not ready to receive it, some certificate issue in there side.
    other than 401 means you are ok (As per certificate and Connectivity) - 403 and 500 errors are next stops.
    403 - error because of encoding method.
    500 - data issue.
    Regards
    Aashish Sinha

  • Close URL Connection netstat

    hello all,
    I hope you can help me.
    Please have a look at my code below
    I open an URL Connection but I can't close it.
    If i type in a DOS Box netstat I see a lot of connection.
    Now my question is how can I close the connection.
    m_http.disconnect() seems not to work.
    public class Unbenannt1 extends Applet
      Button button1 = new Button();
      private HttpURLConnection m_http = null;
      private URL m_MyAlarmURL = null;
      private URLConnection m_MyURLConnection = null;
      private long m_TimeAlarmXML = 0;
      private boolean m_TimeUpdate = true;
      /**Das Applet initialisieren*/
      public void init()
        String a_str = "http://"+ getCodeBase().getHost() + "/x.xml";
        try
          m_MyAlarmURL = new URL( a_str );
        catch ( MalformedURLException ie )
        try
          jbInit();
        catch(Exception e)
          e.printStackTrace();
      /**Initialisierung der Komponenten*/
      private void jbInit() throws Exception
        button1.setLabel("button1");
        button1.setBounds(new Rectangle(27, 28, 78, 27));
        button1.addActionListener(new java.awt.event.ActionListener() {
          public void actionPerformed(ActionEvent e) {
            button1_actionPerformed(e);
        setLayout(null);
        setBackground(java.awt.Color.lightGray);
        setSize(426,266);
        this.add(button1, null);
      void button1_actionPerformed(ActionEvent e)
        int a_int = 0;
        try
            m_MyURLConnection = m_MyAlarmURL.openConnection();
            m_http = (HttpURLConnection)m_MyURLConnection;
            m_http.setRequestMethod( "HEAD" );
            m_http.setUseCaches(false);
            m_http.connect();
            a_int = m_http.getResponseCode();
            m_http.disconnect();
            m_http = null;
            m_MyURLConnection = null;
            System.gc();
          catch ( java.io.IOException ioe  )
            a_int = 404;
    }Thanks a lot
    Prediger

    Usually those connections linger around for some time, and will then be closed by the OS once a certain timeout has been reached. I don't know how to change that timeout, though.
    Btw: the docs don't claim that the connection will be closed. The description for disconnect() is "Indicates that other requests to the server are unlikely in the near future"
    If you still see the connection after a while, then something is wrong, but I've seen connections like that hang around for several minutes even after the JVM was terminated.
    Thomas

  • Problems with SAP BC to post a request to https URL

    Hello,
    in a integration scenario one of our partners wants to send a xml to our server via https.<br/>
    I tried this internal with a test business connector. I simple use the WmPublic.pub.client http service.<br/>
    I try to post a record to an https:// URL and get an error. It seems that there is some trouble with the ssl handshake. However it is working in the browser.<br/>
    The option Security -> Certificates -> Trusted Certificates -> CA Certificates Directory is 'unspecified'. Therefore no server certificate should be reject.<br/>
    <br/>
    Now I got an 'iaik.security.ssl.SSLException: Peer sent alert: Alert Fatal: handshake failure<br/>
    ' error. I do not find any helpful entries in this forum. Did anyone solve this issue?<br/>
    <br/>
    Thank you,<br/>
    Nils<br/>
    <br/>
    error:<br/>
    2009-08-03 10:08:13 CEST iaik.security.ssl.SSLException: Peer sent alert: Alert Fatal: handshake failure<br/>
         at iaik.security.ssl.r.f(Unknown Source)<br/>
         at iaik.security.ssl.x.b(Unknown Source)<br/>
         at iaik.security.ssl.x.a(Unknown Source)<br/>
         at iaik.security.ssl.r.d(Unknown Source)<br/>
         at iaik.security.ssl.SSLTransport.startHandshake(Unknown Source)<br/>
         at iaik.security.ssl.SSLTransport.getInputStream(Unknown Source)<br/>
         at iaik.security.ssl.SSLSocket.getInputStream(Unknown Source)<br/>
         at com.wm.net.NetURLConnection.trySSLConnect(NetURLConnection.java:691)<br/>
         at com.wm.net.NetURLConnection.httpsConnect(NetURLConnection.java:562)<br/>
         at com.wm.net.NetURLConnection.connect(NetURLConnection.java:171)<br/>
         at com.wm.net.HttpURLConnection.getOutputStream(HttpURLConnection.java:419)<br/>
         at com.wm.net.HttpContext.getOutputStream(HttpContext.java:578)<br/>
         at com.wm.net.HttpContext.getOutputStream(HttpContext.java:554)<br/>
         at com.wm.net.HttpContext.post(HttpContext.java:338)<br/>
         at pub.client.http(client.java:512)<br/>
    <br/>
    SAP BC Info:<br/>
    Software <br/>
    Product webMethods Integration Server <br/>
    Version 4.6 (Standard Encryption)    Release Notes  <br/>
    Updates BC46_CoreFix7  <br/>
    Build Number 940 + CoreFix 7 [Fixes 1-205 + SP1-3] <br/>
    SSL Standard (40-bit), Provider: IAIK 2.6 <br/>
      <br/>
    Server Environment <br/>
    Java Version 1.3.1_20 (47.0) <br/>
    Java Vendor Sun Microsystems Inc. <br/>
    Java Home /usr/jdk1.3.1_20/jre <br/>
    Java VM Version 1.3.1_20-b03 <br/>
    Java VM Info Java HotSpot(TM) Client VM (mixed mode) <br/>
    Classpath /usr/local/sapbc46/server/updates/BC46_CoreFix7.jar<br/>
    /usr/local/sapbc46/server/lib/server.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/local/sapbc46/server/lib/classes<br/>
    /usr/local/sapbc46/server/lib/client.jar<br/>
    /usr/local/sapbc46/server/lib/mail.jar<br/>
    /usr/local/sapbc46/server/lib/server.jar<br/>
    packages/SAP/code/classes<br/>
    packages/SAP/code/jars/static/inqmyxml.jar<br/>
    packages/SAP/code/jars/static/jARM.jar<br/>
    packages/SAP/code/jars/static/jCO.jar<br/>
    packages/SAP/code/jars/static/sapjco.jar<br/>
    packages/SAP/code/jars/static/sapxmltoolkit.jar<br/>
    packages/WmPartners/code/classes<br/>
    packages/WmWin32/code/classes <br/>
    OS Linux <br/>
    OS Platform i386 <br/>
    OS Version 2.6.18.8-0.13-default <br/>
    Current User sapbc <br/>
    Working Dir /usr/local/sapbc46/server<br/>

    Ok - in this case you need to include to session based SSL setup in your flow (scenario).
    The pub.security:setKeyAndChain and pub.security:clearKeyAndChain services are used to control which client certificate
    the SAP BC server presents to remote servers. You need to use these services to switch between certificates and
    certificate chains if you are not using aliases for remote servers.
    List of services to be used:
    pub.security:clearKeyAndChain
    -- Associates the default key and certificate chain with the subsequent set of invoked services.
    pub.security:setKeyAndChain
    -- Processes a digital signature to make sure that the provided data has not been modified. The signature input is the DER encoding of the PKCS#7 SignedData object.
    pub.security.pkcs7:sign
    -- Creates a PKCS7 SignedData object.
    pub.security.pkcs7:verify
    -- Processes a digital signature to make sure that the provided data has not been modified.
    pub.security.util:createMessageDigest
    -- Generates a message digest for a given message.
    pub.security.util:getCertificateInfo
    -- Retrieves information (e.g., serial number, issuer, expiration date) from a digital certificate.
    pub.security.util:loadPKCS7CertChain
    -- Converts a certificate chain that is in PKCS7 format to a list (a one-dimensional array) of byte arrays.
    Example:
    Invoke pub.client:http to send data to Company D.
    Invoke pub.security:setKeyAndChain using the key and certificate chain for Company B.
    Invoke pub.client:http to send data to Company B.
    Invoke pub.security:setKeyAndChain using the key and certificate chain for Company C.
    Invoke pub.client:http to send data to Company C.
    Invoke pub.security:clearKeyAndChain to revert back to the default key and certificate chain for Company
    Au2019s server.
    Invoke pub.client:http to send data to Company D.
    Edited by: Kai Lerch-Baier on Aug 3, 2009 1:47 PM

  • Map Viewer URL Connection Issue

    Hi,
    I have an UI project, for which i have created a Deployment Profile named 'adfXXXXXUI' nothing but created a adflibrary for that UI project.
    While creating the adf jar, i have come across an Option called 'Connections' .
    Here i have selected Connection Names Only ... means i will be getting all the names of the connections i have created & those will be reflected in my local connection.xml file.
    After configuring the rest of the params, i deployed my UI project to "deploy -> adfXXXXXUI.jar".
    And we have used this jar to integrate with another UI application ... And the taskflows avilable in the jar will be used in the other UI application.
    Now here is my problem ... Actually my connections.xml file has a URL Connection. This is how it looks like....
    <?xml version = '1.0' encoding = 'UTF-8'?>
    <References xmlns="http://xmlns.oracle.com/adf/jndi">
    <Reference name="MapServer" className="oracle.adf.model.connection.url.HttpURLConnection" xmlns="">
    <Factory className="oracle.adf.model.connection.url.URLConnectionFactory"/>
    <RefAddresses>
    <XmlRefAddr addrType="MapServer">
    <Contents>
    <urlconnection name="MapServer" url="http://sbsys1.intra.schneider.com:8109/mapviewer"/>
    </Contents>
    </XmlRefAddr>
    </RefAddresses>
    </Reference><Reference name="snibuilddb" className="oracle.jdeveloper.db.adapter.DatabaseProvider" credentialStoreKey="snibuilddb" xmlns="">
    <Factory className="oracle.jdeveloper.db.adapter.DatabaseProviderFactory"/>
    <RefAddresses>
    <StringRefAddr addrType="subtype">
    <Contents>oraJDBC</Contents>
    </StringRefAddr>
    <StringRefAddr addrType="user">
    <Contents>sni_guest</Contents>
    </StringRefAddr>
    <StringRefAddr addrType="port">
    <Contents>3720</Contents>
    </StringRefAddr>
    <StringRefAddr addrType="hostname">
    <Contents>uxsys186v</Contents>
    </StringRefAddr>
    <SecureRefAddr addrType="password"/>
    <StringRefAddr addrType="serviceName">
    <Contents>snit0.world</Contents>
    </StringRefAddr>
    <StringRefAddr addrType="DeployPassword">
    <Contents>true</Contents>
    </StringRefAddr>
    <StringRefAddr addrType="oraDriverType">
    <Contents>thin</Contents>
    </StringRefAddr>
    </RefAddresses>
    </Reference>
    </References>
    All the taskflows avaialble in my jar using the URL connection which mentioned above. But the adflibray jar got created with a file named 'jar-connection.xml', where i can see <Reference/> as an empty Tag. Because i have selected connections name only as an option when creating the adflibrary for my UI.
    Hence it is appearing so ... But when i added this jar to the other application, i have dragged & dropped the taskflows as a region on to the JSPX page. And i started running the page. On the page .... i can see only the data which is not making use of MapServer connection defiition. Along with that, some maps needs to rendered .. but that is not happening. Rest of the page with the filter critieria is being displayed properly.
    Now i have selected Include Connection Details as an option, by editing the adfLibrary Deployment profile of the UI & redeployed & found the same thing. Like, though i specify the Include Connection Details as an option ... i did not see those URL connection details in my jar-connection.xml file.Still it is not working.
    All the taskflows inside the jar are trying to use this URL connection from jar-connection.xml, which is avaiable inside the adfLibUI.jar.
    I tried with a scenorio some thing like ... For the application to which i have added this adfUILibrary, there itself i created a URLConnection ... but it did not worked as well.
    Requesting you to let me know how can i get avail of my URL connection in to my jar ...
    Thanks & Regards,
    Kiran Konjeti

    This is purely ssl issue. You can try adding the below logic first.. This code basically sets ssl properties for us.
    import java.security.Security;
    Security.addProvider(new com.sun.net.ssl.internal.ssl.Provider());
    Properties properties = System.getProperties();
    String handlers = System.getProperty("java.protocol.handler.pkgs");
    if (handlers == null) {
        // nothing specified yet (expected case)
        properties.put("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");
    else {
        // something already there, put ourselves out front
        properties.put("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol|".concat(handlers));     
    System.setProperties(properties);
    Below you start your code....

  • How to make pool of  url connections in wls?

    Hi, i have a project in which i have to make a http post to multiple web
              servers to retrieve
              XML files in response to user requests. Right now i just open the
              url for each request.
              Is there any way to pool URL connections in weblogic
              thanks
              wasiq
              

    Are u using Custom Connection Pool or some App Servers Conn Pool for LDAP Connection?
    If you are opening LDAP Connection in your program code and wondering how to monitor, then it needs to be done on the LDAP Server side. Not from the application.

  • Receiver HTTP(S) connection

    Scenario: IDOC-XI-HTTP(S)
    Can I do a HTTP(S) connection with Receiver comm channel ? I wan to do a secured HTTP post to the 3rd party.But When I try to create a 'Receiver' Comm channel, I only see Transport protocol of HTTP 1.0 and there is no option for selecting HTTP(S)..
    But will it be a secured connection If:
    1> If I specify https://ww/test.com/testpath or
    2> Create a RFC destination to above URL of type 'G'(HTTP to external server) and specify HTTPS option in 'Special tab' and choose SSL option. Then Specify this destination in the comm channel.
    Will any of the above options work?
    OR Simple HTTPS is NOT supported for making a post to external sever from XI ?
    -Thanks
    Bhaven

    Hi,
      This might help you
    HTTP adapter
    HTTP Adapter
    /people/kausik.medavarapu/blog/2005/12/29/csv-file-lookup-with-http-request-and-response-in-xi
    /people/siva.maranani/blog/2005/09/15/push-data-to-mvc-architectured-application-using-xi
    http://help.sap.com/saphelp_nw2004s/helpdata/en/43/64dbb0af9f30b4e10000000a11466f/frameset.htm
    Regards
    Agasthuri Doss

Maybe you are looking for

  • How can i get firefox to ask me to open or save a download?

    firefox used to ask me to open or save a file when i downloaded it and now it doesn't, is there a way 2 change it back 2 the way it was?

  • Dates in project definition

    Dear All When i am creating the project definition i am giving finish date.After scheduling is carried out for networking and for WBS.In networking and in wbs i am getting the st.date&fi.date but i am not getting the st.date in project definition.So

  • Anyone here use the nike+ running app with the ipod touch?

    i just got the new ipod touch 5g and wanted to get the nike+ running app because it's free, the alternate would be nike+ sensor is $20 extra. so i wanted to know: 1. how accurate the nike+ running app is in term of recording distance? since i don't h

  • (RR FORMAT) ORACLE의  2000년대 DATE FORMAT

    제품 : SQL*PLUS 작성날짜 : 1997-04-23 (RR FORMAT) ORACLE의 2000년대 DATE FORMAT ========================================== 이 문서는 단지 정보 제공을 목적으로 하며 여기에 있는 내용은 통보 없이 변경될 수 있습니다. 오라클은 이 문서에 오류가 없다는 것을 보증하지 않으며, 특정 목 적에 부합하거나 혹은 상업성에 대한 묵시적인 보증과 조건 -구두적으로 표현되었 거나

  • Data source not shown in active state after replicating from source system

    Hi Gurus, I have activated the datasou 0CO_PC_ACT_05 in R/3 system form RSA5 and replicated the same in BW system. After replication when i try to activate the datasource by instaling the business content.It is not getting installed. The datasource i