Encrypting authentication details - HTTP URL Connection

Hi,
We have a Java application which retreives HTML content from intranet page using HTTPURLConnection, displays the portion of the content. The site to which we are connecting using HTTPURLConnection requires baisc user authentication and we are passing the user name and passowrd using BASE 64 encoding in the request header. Now this intranet site is going to be hosted externally. Just wanted to know the different options on how to send the user name and password in ecnrypted format.Is the recommendation is just to enable HTTPS for that site and pass user name and password using HTTP URL Connection API? Or are there any other options? Appreciate any inputs.
Thanks.

http://java.sun.com/javase/6/docs/technotes/guides/net/http-auth.html

Similar Messages

  • Associating a subject to a HTTP URL Connection

    Hello,
    We have a java client application which authenticates to the server using the JAAS model. The application opens HTTP URL connections from time to time (to servlets that stream data back and forth). The access.log indicates that no subject is associated with the action. Is there a way to associate the authenticated subject with the URL connection?
    WLS 8.1 SP2
    Thanks,
    Bob

    Not in a directway, though you may set a token and implement an Identity asserter which can understand the token.

  • What is the difference between HTTPS URL connection and SSLSocket conn

    What is the difference between HTTPS URL connection and SSLSocket connection

    The difference is that they are different protocols, or rather one protocol layered over the other. If you're within a LAN you will use SSL, if it's a Web service you will use HTTPS.

  • Getting FileNotFound Exception while using https url connection

    Hi
    I am facing a serious problem in running the code. I am using JSSE in my code and through this application I am hitting a URL which is also using HTTPS and that code is also using JSSE in servlets.
    Now when I use the code I get a FileNotFoundException which says that the particular servlet is not located. I have given debug mode on and I could see that initial handshake is over and after that its throwing FileNotFoundException.
    This problem is very serious because this system is live and now for this particular case where both the server and client are using JSSE , is failing.
    Kindly suggest me some solution
    Best Regards
    vrkirubakaran

    Hi
    Thanx for ur reply,
    We tried it from the Browser its working fine, more over we are not using any proxy, but i tried to hit thru the java jsse application its giving FileNotFoundException.
    When i gone thru the Debug Log, it shows 403 Access Denied, for ur reference i am pasting the logs below
    ==========================================
    Chkmsg->0100|https://www.ceemea2.citibank.com/servlet/recieve|09082001020202|10210010|123456789012|000002|0.05|
    %% No cached client session
    *** ClientHello, v3.1
    RandomCookie: GMT: 997419653 bytes = { 190, 156, 211, 219, 90, 50, 59, 1, 16, 169, 254, 51, 21, 62, 149, 90, 231, 94, 80, 246, 100, 50, 31, 80, 99, 113, 30, 127 }
    Session ID: {}
    Cipher Suites: { 0, 3, 0, 17 }
    Compression Methods: { 0 }
    [write] MD5 and SHA1 hashes: len = 47
    0000: 01 00 00 2B 03 01 3B 73 6B 85 BE 9C D3 DB 5A 32 ...+..;sk.....Z2
    0010: 3B 01 10 A9 FE 33 15 3E 95 5A E7 5E 50 F6 64 32 ;....3.>.Z.^P.d2
    0020: 1F 50 63 71 1E 7F 00 00 04 00 03 00 11 01 00 .Pcq...........
    main, WRITE: SSL v3.1 Handshake, length = 47
    [write] MD5 and SHA1 hashes: len = 50
    0000: 01 03 01 00 09 00 00 00 20 00 00 03 02 00 80 00 ........ .......
    0010: 00 11 3B 73 6B 85 BE 9C D3 DB 5A 32 3B 01 10 A9 ..;sk.....Z2;...
    0020: FE 33 15 3E 95 5A E7 5E 50 F6 64 32 1F 50 63 71 .3.>.Z.^P.d2.Pcq
    0030: 1E 7F ..
    main, WRITE: SSL v2, contentType = 22, translated length = 16337
    main, READ: SSL v3.0 Handshake, length = 3339
    *** ServerHello, v3.0
    RandomCookie: GMT: 14337 bytes = { 1, 253, 137, 78, 248, 161, 43, 251, 125, 205, 205, 145, 69, 176, 100, 201, 82, 209, 44, 155, 194, 143, 205, 173, 177, 32, 62, 162 }
    Session ID: {14, 91, 242, 201, 133, 233, 30, 179, 233, 88, 72, 170, 146, 254, 185, 30, 0, 204, 59, 190, 74, 213, 180, 255, 110, 242, 135, 204, 143, 104, 171, 178}
    Cipher Suite: { 0, 3 }
    Compression Method: 0
    %% Created: [Session-1, SSL_RSA_EXPORT_WITH_RC4_40_MD5]
    ** SSL_RSA_EXPORT_WITH_RC4_40_MD5
    [read] MD5 and SHA1 hashes: len = 74
    0000: 02 00 00 46 03 00 00 00 38 01 01 FD 89 4E F8 A1 ...F....8....N..
    0010: 2B FB 7D CD CD 91 45 B0 64 C9 52 D1 2C 9B C2 8F +.....E.d.R.,...
    0020: CD AD B1 20 3E A2 20 0E 5B F2 C9 85 E9 1E B3 E9 ... >. .[.......
    0030: 58 48 AA 92 FE B9 1E 00 CC 3B BE 4A D5 B4 FF 6E XH.......;.J...n
    0040: F2 87 CC 8F 68 AB B2 00 03 00 ....h.....
    *** Certificate chain
    chain [0] = [
    Version: V3
    Subject: CN=www.ceemea2.citibank.com, OU=Terms of use at www.verisign.com/rpa (c)00, OU=CGTI, O=Citibank N A, L=London, ST=London, C=GB
    Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4
    Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@5087d0d6
    Validity: [From: Fri Dec 22 05:30:00 GMT+05:30 2000,
                   To: Sun Dec 23 05:29:59 GMT+05:30 2001]
    Issuer: OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign, OU=VeriSign International Server CA - Class 3, OU="VeriSign, Inc.", O=VeriSign Trust Network
    SerialNumber: [    6096271c 4fd3f6fb 6d1ba8c2 3971dec5 ]
    Certificate Extensions: 5
    [1]: ObjectId: 2.16.840.1.113733.1.6.15 Criticality=false
    Extension unknown: DER encoded OCTET string =
    0000: 04 0B 16 09 35 34 39 31 32 36 33 38 31 ....549126381
    [2]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false
    NetscapeCertType [
    SSL server
    [3]: ObjectId: 2.5.29.3 Criticality=false
    Extension unknown: DER encoded OCTET string =
    0000: 04 82 02 16 30 82 02 12 30 82 02 0E 30 82 02 0A ....0...0...0...
    0010: 06 0B 60 86 48 01 86 F8 45 01 07 01 01 30 82 01 ..`.H...E....0..
    0020: F9 16 82 01 A7 54 68 69 73 20 63 65 72 74 69 66 .....This certif
    0030: 69 63 61 74 65 20 69 6E 63 6F 72 70 6F 72 61 74 icate incorporat
    0040: 65 73 20 62 79 20 72 65 66 65 72 65 6E 63 65 2C es by reference,
    0050: 20 61 6E 64 20 69 74 73 20 75 73 65 20 69 73 20 and its use is
    0060: 73 74 72 69 63 74 6C 79 20 73 75 62 6A 65 63 74 strictly subject
    0070: 20 74 6F 2C 20 74 68 65 20 56 65 72 69 53 69 67 to, the VeriSig
    0080: 6E 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E 20 n Certification
    0090: 50 72 61 63 74 69 63 65 20 53 74 61 74 65 6D 65 Practice Stateme
    00A0: 6E 74 20 28 43 50 53 29 2C 20 61 76 61 69 6C 61 nt (CPS), availa
    00B0: 62 6C 65 20 61 74 3A 20 68 74 74 70 73 3A 2F 2F ble at: https://
    00C0: 77 77 77 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D www.verisign.com
    00D0: 2F 43 50 53 3B 20 62 79 20 45 2D 6D 61 69 6C 20 /CPS; by E-mail
    00E0: 61 74 20 43 50 53 2D 72 65 71 75 65 73 74 73 40 at CPS-requests@
    00F0: 76 65 72 69 73 69 67 6E 2E 63 6F 6D 3B 20 6F 72 verisign.com; or
    0100: 20 62 79 20 6D 61 69 6C 20 61 74 20 56 65 72 69 by mail at Veri
    0110: 53 69 67 6E 2C 20 49 6E 63 2E 2C 20 32 35 39 33 Sign, Inc., 2593
    0120: 20 43 6F 61 73 74 20 41 76 65 2E 2C 20 4D 6F 75 Coast Ave., Mou
    0130: 6E 74 61 69 6E 20 56 69 65 77 2C 20 43 41 20 39 ntain View, CA 9
    0140: 34 30 34 33 20 55 53 41 20 54 65 6C 2E 20 2B 31 4043 USA Tel. +1
    0150: 20 28 34 31 35 29 20 39 36 31 2D 38 38 33 30 20 (415) 961-8830
    0160: 43 6F 70 79 72 69 67 68 74 20 28 63 29 20 31 39 Copyright (c) 19
    0170: 39 36 20 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 96 VeriSign, Inc
    0180: 2E 20 20 41 6C 6C 20 52 69 67 68 74 73 20 52 65 . All Rights Re
    0190: 73 65 72 76 65 64 2E 20 43 45 52 54 41 49 4E 20 served. CERTAIN
    01A0: 57 41 52 52 41 4E 54 49 45 53 20 44 49 53 43 4C WARRANTIES DISCL
    01B0: 41 49 4D 45 44 20 61 6E 64 20 4C 49 41 42 49 4C AIMED and LIABIL
    01C0: 49 54 59 20 4C 49 4D 49 54 45 44 2E A0 0E 06 0C ITY LIMITED.....
    01D0: 60 86 48 01 86 F8 45 01 07 01 01 01 A1 0E 06 0C `.H...E.........
    01E0: 60 86 48 01 86 F8 45 01 07 01 01 02 30 2C 30 2A `.H...E.....0,0*
    01F0: 16 28 68 74 74 70 73 3A 2F 2F 77 77 77 2E 76 65 .(https://www.ve
    0200: 72 69 73 69 67 6E 2E 63 6F 6D 2F 72 65 70 6F 73 risign.com/repos
    0210: 69 74 6F 72 79 2F 43 50 53 20 itory/CPS
    [4]: ObjectId: 2.5.29.37 Criticality=false
    Extension unknown: DER encoded OCTET string =
    0000: 04 0D 30 0B 06 09 60 86 48 01 86 F8 42 04 01 ..0...`.H...B..
    [5]: ObjectId: 2.5.29.19 Criticality=false
    BasicConstraints:[
    CA:false
    PathLen: undefined
    Algorithm: [MD5withRSA]
    Signature:
    0000: 0F F0 06 60 B2 15 0F 90 6A 76 D1 4D 59 03 45 17 ...`....jv.MY.E.
    0010: 4D 3B 5F F9 82 49 CB E5 CC 5D D0 44 E6 F0 8B 26 M;_..I...].D...&
    0020: 46 25 D5 AC B6 31 18 7B F0 27 A2 32 0D E3 EF 1F F%...1...'.2....
    0030: 48 36 8F C7 9A 6D FC 2D 32 A1 D3 0F F3 EE A7 21 H6...m.-2......!
    0040: B7 40 88 B5 5D 60 3E 93 84 EE 42 9F AC 27 B9 4C .@..]`>...B..'.L
    0050: 63 95 E1 2C 7D 89 89 94 D9 F6 FE 48 6D 11 4A 3E c..,.......Hm.J>
    0060: 7A 38 C1 48 33 93 B3 0B 31 AE 77 6C 79 4F 27 A4 z8.H3...1.wlyO'.
    0070: 90 5A D4 C3 AE 8F 5E AE 52 AE 3C 39 23 12 D2 7A .Z....^.R.<9#..z
    chain [1] = [
    Version: V3
    Subject: OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign, OU=VeriSign International Server CA - Class 3, OU="VeriSign, Inc.", O=VeriSign Trust Network
    Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
    Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@367bd0d6
    Validity: [From: Thu Apr 17 05:30:00 GMT+05:30 1997,
                   To: Thu Jan 08 05:29:59 GMT+05:30 2004]
    Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
    SerialNumber: [    236c971e 2bc60d0b f97460de f108c3c3 ]
    Certificate Extensions: 5
    [1]: ObjectId: 2.16.840.1.113730.1.1 Criticality=false
    NetscapeCertType [
    SSL CA
    S/MIME CA
    [2]: ObjectId: 2.5.29.32 Criticality=false
    Extension unknown: DER encoded OCTET string =
    0000: 04 82 01 2C 30 82 01 28 30 82 01 24 06 0B 60 86 ...,0..(0..$..`.
    0010: 48 01 86 F8 45 01 07 01 01 30 82 01 13 30 28 06 H...E....0...0(.
    0020: 08 2B 06 01 05 05 07 02 01 16 1C 68 74 74 70 73 .+.........https
    0030: 3A 2F 2F 77 77 77 2E 76 65 72 69 73 69 67 6E 2E ://www.verisign.
    0040: 63 6F 6D 2F 43 50 53 30 81 E6 06 08 2B 06 01 05 com/CPS0....+...
    0050: 05 07 02 02 30 81 D9 30 15 16 0E 56 65 72 69 53 ....0..0...VeriS
    0060: 69 67 6E 2C 20 49 6E 63 2E 30 03 02 01 01 1A 81 ign, Inc.0......
    0070: BF 56 65 72 69 53 69 67 6E 27 73 20 43 65 72 74 .VeriSign's Cert
    0080: 69 66 69 63 61 74 69 6F 6E 20 50 72 61 63 74 69 ification Practi
    0090: 63 65 20 53 74 61 74 65 6D 65 6E 74 2C 20 77 77 ce Statement, ww
    00A0: 77 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 43 w.verisign.com/C
    00B0: 50 53 2C 20 67 6F 76 65 72 6E 73 20 74 68 69 73 PS, governs this
    00C0: 20 63 65 72 74 69 66 69 63 61 74 65 20 26 20 69 certificate & i
    00D0: 73 20 69 6E 63 6F 72 70 6F 72 61 74 65 64 20 62 s incorporated b
    00E0: 79 20 72 65 66 65 72 65 6E 63 65 20 68 65 72 65 y reference here
    00F0: 69 6E 2E 20 53 4F 4D 45 20 57 41 52 52 41 4E 54 in. SOME WARRANT
    0100: 49 45 53 20 44 49 53 43 4C 41 49 4D 45 44 20 26 IES DISCLAIMED &
    0110: 20 4C 49 41 42 49 4C 49 54 59 20 4C 54 44 2E 20 LIABILITY LTD.
    0120: 28 63 29 31 39 39 37 20 56 65 72 69 53 69 67 6E (c)1997 VeriSign
    [3]: ObjectId: 2.5.29.15 Criticality=false
    KeyUsage [
    Key_CertSign
    Crl_Sign
    [4]: ObjectId: 2.5.29.37 Criticality=false
    Extension unknown: DER encoded OCTET string =
    0000: 04 19 30 17 06 0A 60 86 48 01 86 F8 45 01 08 01 ..0...`.H...E...
    0010: 06 09 60 86 48 01 86 F8 42 04 01 ..`.H...B..
    [5]: ObjectId: 2.5.29.19 Criticality=false
    BasicConstraints:[
    CA:true
    PathLen:0
    Algorithm: [MD2withRSA]
    Signature:
    0000: B8 8C 98 C3 2B 48 F5 72 CD 68 0D 1A B3 74 63 BB ....+H.r.h...tc.
    0010: B1 58 B6 98 45 22 EC 11 8D C7 4E 33 8B 62 5A 21 .X..E"....N3.bZ!
    0020: 24 6C 9A C0 42 B4 45 A9 3A FB 67 F0 91 BE 18 1F $l..B.E.:.g.....
    0030: D5 48 19 93 6B 8D CB 37 4B 86 E6 7D 9B FD 8C 78 .H..k..7K......x
    0040: 99 FF 83 C2 FC D9 55 06 9E 31 66 46 7D 1B 78 60 ......U..1fF..x`
    0050: F4 55 D4 6C 55 C8 69 62 70 7C 4D B6 89 06 05 9B .U.lU.ibp.M.....
    0060: C8 43 8E CC 0C 28 D5 D1 8C CD 46 50 E3 31 96 66 .C...(....FP.1.f
    0070: 92 11 24 1E 4A 5B 4B 66 5E 65 55 1E 5F 37 9A AE ..$.J[Kf^eU._7..
    chain [2] = [
    Version: V1
    Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
    Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
    Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@6f4bd0d6
    Validity: [From: Mon Jan 29 05:30:00 GMT+05:30 1996,
                   To: Wed Aug 02 05:29:59 GMT+05:30 2028]
    Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign, Inc.", C=US
    SerialNumber: [    70bae41d 10d92934 b638ca7b 03ccbabf ]
    Algorithm: [MD2withRSA]
    Signature:
    0000: BB 4C 12 2B CF 2C 26 00 4F 14 13 DD A6 FB FC 0A .L.+.,&.O.......
    0010: 11 84 8C F3 28 1C 67 92 2F 7C B6 C5 FA DF F0 E8 ....(.g./.......
    0020: 95 BC 1D 8F 6C 2C A8 51 CC 73 D8 A4 C0 53 F0 4E ....l,.Q.s...S.N
    0030: D6 26 C0 76 01 57 81 92 5E 21 F1 D1 B1 FF E7 D0 .&.v.W..^!......
    0040: 21 58 CD 69 17 E3 44 1C 9C 19 44 39 89 5C DC 9C !X.i..D...D9.\..
    0050: 00 0F 56 8D 02 99 ED A2 90 45 4C E4 BB 10 A4 3D ..V......EL....=
    0060: F0 32 03 0E F1 CE F8 E8 C9 51 8C E6 62 9F E6 9F .2.......Q..b...
    0070: C0 7D B7 72 9C C9 36 3A 6B 9F 4E A8 FF 64 0D 64 ...r..6:k.N..d.d
    [read] MD5 and SHA1 hashes: len = 3055
    0000: 0B 00 0B EB 00 0B E8 00 05 6A 30 82 05 66 30 82 .........j0..f0.
    0010: 04 CF A0 03 02 01 02 02 10 60 96 27 1C 4F D3 F6 .........`.'.O..
    0020: FB 6D 1B A8 C2 39 71 DE C5 30 0D 06 09 2A 86 48 .m...9q..0...*.H
    0030: 86 F7 0D 01 01 04 05 00 30 81 BA 31 1F 30 1D 06 ........0..1.0..
    0040: 03 55 04 0A 13 16 56 65 72 69 53 69 67 6E 20 54 .U....VeriSign T
    0050: 72 75 73 74 20 4E 65 74 77 6F 72 6B 31 17 30 15 rust Network1.0.
    0060: 06 03 55 04 0B 13 0E 56 65 72 69 53 69 67 6E 2C ..U....VeriSign,
    0070: 20 49 6E 63 2E 31 33 30 31 06 03 55 04 0B 13 2A Inc.1301..U...*
    0080: 56 65 72 69 53 69 67 6E 20 49 6E 74 65 72 6E 61 VeriSign Interna
    0090: 74 69 6F 6E 61 6C 20 53 65 72 76 65 72 20 43 41 tional Server CA
    00A0: 20 2D 20 43 6C 61 73 73 20 33 31 49 30 47 06 03 - Class 31I0G..
    00B0: 55 04 0B 13 40 77 77 77 2E 76 65 72 69 73 69 67 [email protected]
    00C0: 6E 2E 63 6F 6D 2F 43 50 53 20 49 6E 63 6F 72 70 n.com/CPS Incorp
    00D0: 2E 62 79 20 52 65 66 2E 20 4C 49 41 42 49 4C 49 .by Ref. LIABILI
    00E0: 54 59 20 4C 54 44 2E 28 63 29 39 37 20 56 65 72 TY LTD.(c)97 Ver
    00F0: 69 53 69 67 6E 30 1E 17 0D 30 30 31 32 32 32 30 iSign0...0012220
    0100: 30 30 30 30 30 5A 17 0D 30 31 31 32 32 32 32 33 00000Z..01122223
    0110: 35 39 35 39 5A 30 81 AD 31 0B 30 09 06 03 55 04 5959Z0..1.0...U.
    0120: 06 13 02 47 42 31 0F 30 0D 06 03 55 04 08 13 06 ...GB1.0...U....
    0130: 4C 6F 6E 64 6F 6E 31 0F 30 0D 06 03 55 04 07 14 London1.0...U...
    0140: 06 4C 6F 6E 64 6F 6E 31 15 30 13 06 03 55 04 0A .London1.0...U..
    0150: 14 0C 43 69 74 69 62 61 6E 6B 20 4E 20 41 31 0D ..Citibank N A1.
    0160: 30 0B 06 03 55 04 0B 14 04 43 47 54 49 31 33 30 0...U....CGTI130
    0170: 31 06 03 55 04 0B 14 2A 54 65 72 6D 73 20 6F 66 1..U...*Terms of
    0180: 20 75 73 65 20 61 74 20 77 77 77 2E 76 65 72 69 use at www.veri
    0190: 73 69 67 6E 2E 63 6F 6D 2F 72 70 61 20 28 63 29 sign.com/rpa (c)
    01A0: 30 30 31 21 30 1F 06 03 55 04 03 14 18 77 77 77 001!0...U....www
    01B0: 2E 63 65 65 6D 65 61 32 2E 63 69 74 69 62 61 6E .ceemea2.citiban
    01C0: 6B 2E 63 6F 6D 30 81 9F 30 0D 06 09 2A 86 48 86 k.com0..0...*.H.
    01D0: F7 0D 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 ...........0....
    01E0: 81 00 BB 27 99 DF 3B A4 10 CE 0F BB 86 4C AB 2A ...'..;......L.*
    01F0: 4C AE 66 34 A4 36 F3 0B 0D 02 55 BF E9 16 46 68 L.f4.6....U...Fh
    0200: AE D2 FA EA 07 3A 08 0F B0 48 99 6C 89 CA 9A D3 .....:...H.l....
    0210: 64 FE F6 ED 24 66 EA C6 86 48 70 56 33 D4 34 57 d...$f...HpV3.4W
    0220: 8E 0B DE 42 E1 36 9F 82 BA ED 25 05 AC BB 56 4B ...B.6....%...VK
    0230: 45 52 FA E1 CA 81 EE E0 88 A6 6E C8 A9 FD F4 5A ER........n....Z
    0240: 01 64 DB F4 6D 51 3D 85 10 57 BF ED 61 DD 0C 65 .d..mQ=..W..a..e
    0250: 09 85 08 AC C9 4E E7 2B 81 3D A6 CE 5E 23 D1 EC .....N.+.=..^#..
    0260: 6D F5 02 03 01 00 01 A3 82 02 76 30 82 02 72 30 m.........v0..r0
    0270: 09 06 03 55 1D 13 04 02 30 00 30 82 02 1F 06 03 ...U....0.0.....
    0280: 55 1D 03 04 82 02 16 30 82 02 12 30 82 02 0E 30 U......0...0...0
    0290: 82 02 0A 06 0B 60 86 48 01 86 F8 45 01 07 01 01 .....`.H...E....
    02A0: 30 82 01 F9 16 82 01 A7 54 68 69 73 20 63 65 72 0.......This cer
    02B0: 74 69 66 69 63 61 74 65 20 69 6E 63 6F 72 70 6F tificate incorpo
    02C0: 72 61 74 65 73 20 62 79 20 72 65 66 65 72 65 6E rates by referen
    02D0: 63 65 2C 20 61 6E 64 20 69 74 73 20 75 73 65 20 ce, and its use
    02E0: 69 73 20 73 74 72 69 63 74 6C 79 20 73 75 62 6A is strictly subj
    02F0: 65 63 74 20 74 6F 2C 20 74 68 65 20 56 65 72 69 ect to, the Veri
    0300: 53 69 67 6E 20 43 65 72 74 69 66 69 63 61 74 69 Sign Certificati
    0310: 6F 6E 20 50 72 61 63 74 69 63 65 20 53 74 61 74 on Practice Stat
    0320: 65 6D 65 6E 74 20 28 43 50 53 29 2C 20 61 76 61 ement (CPS), ava
    0330: 69 6C 61 62 6C 65 20 61 74 3A 20 68 74 74 70 73 ilable at: https
    0340: 3A 2F 2F 77 77 77 2E 76 65 72 69 73 69 67 6E 2E ://www.verisign.
    0350: 63 6F 6D 2F 43 50 53 3B 20 62 79 20 45 2D 6D 61 com/CPS; by E-ma
    0360: 69 6C 20 61 74 20 43 50 53 2D 72 65 71 75 65 73 il at CPS-reques
    0370: 74 73 40 76 65 72 69 73 69 67 6E 2E 63 6F 6D 3B [email protected];
    0380: 20 6F 72 20 62 79 20 6D 61 69 6C 20 61 74 20 56 or by mail at V
    0390: 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E 2C 20 32 eriSign, Inc., 2
    03A0: 35 39 33 20 43 6F 61 73 74 20 41 76 65 2E 2C 20 593 Coast Ave.,
    03B0: 4D 6F 75 6E 74 61 69 6E 20 56 69 65 77 2C 20 43 Mountain View, C
    03C0: 41 20 39 34 30 34 33 20 55 53 41 20 54 65 6C 2E A 94043 USA Tel.
    03D0: 20 2B 31 20 28 34 31 35 29 20 39 36 31 2D 38 38 +1 (415) 961-88
    03E0: 33 30 20 43 6F 70 79 72 69 67 68 74 20 28 63 29 30 Copyright (c)
    03F0: 20 31 39 39 36 20 56 65 72 69 53 69 67 6E 2C 20 1996 VeriSign,
    0400: 49 6E 63 2E 20 20 41 6C 6C 20 52 69 67 68 74 73 Inc. All Rights
    0410: 20 52 65 73 65 72 76 65 64 2E 20 43 45 52 54 41 Reserved. CERTA
    0420: 49 4E 20 57 41 52 52 41 4E 54 49 45 53 20 44 49 IN WARRANTIES DI
    0430: 53 43 4C 41 49 4D 45 44 20 61 6E 64 20 4C 49 41 SCLAIMED and LIA
    0440: 42 49 4C 49 54 59 20 4C 49 4D 49 54 45 44 2E A0 BILITY LIMITED..
    0450: 0E 06 0C 60 86 48 01 86 F8 45 01 07 01 01 01 A1 ...`.H...E......
    0460: 0E 06 0C 60 86 48 01 86 F8 45 01 07 01 01 02 30 ...`.H...E.....0
    0470: 2C 30 2A 16 28 68 74 74 70 73 3A 2F 2F 77 77 77 ,0*.(https://www
    0480: 2E 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 72 65 .verisign.com/re
    0490: 70 6F 73 69 74 6F 72 79 2F 43 50 53 20 30 11 06 pository/CPS 0..
    04A0: 09 60 86 48 01 86 F8 42 01 01 04 04 03 02 06 40 .`.H...B.......@
    04B0: 30 14 06 03 55 1D 25 04 0D 30 0B 06 09 60 86 48 0...U.%..0...`.H
    04C0: 01 86 F8 42 04 01 30 19 06 0A 60 86 48 01 86 F8 ...B..0...`.H...
    04D0: 45 01 06 0F 04 0B 16 09 35 34 39 31 32 36 33 38 E.......54912638
    04E0: 31 30 0D 06 09 2A 86 48 86 F7 0D 01 01 04 05 00 10...*.H........
    04F0: 03 81 81 00 0F F0 06 60 B2 15 0F 90 6A 76 D1 4D .......`....jv.M
    0500: 59 03 45 17 4D 3B 5F F9 82 49 CB E5 CC 5D D0 44 Y.E.M;_..I...].D
    0510: E6 F0 8B 26 46 25 D5 AC B6 31 18 7B F0 27 A2 32 ...&F%...1...'.2
    0520: 0D E3 EF 1F 48 36 8F C7 9A 6D FC 2D 32 A1 D3 0F ....H6...m.-2...
    0530: F3 EE A7 21 B7 40 88 B5 5D 60 3E 93 84 EE 42 9F ...!.@..]`>...B.
    0540: AC 27 B9 4C 63 95 E1 2C 7D 89 89 94 D9 F6 FE 48 .'.Lc..,.......H
    0550: 6D 11 4A 3E 7A 38 C1 48 33 93 B3 0B 31 AE 77 6C m.J>z8.H3...1.wl
    0560: 79 4F 27 A4 90 5A D4 C3 AE 8F 5E AE 52 AE 3C 39 yO'..Z....^.R.<9
    0570: 23 12 D2 7A 00 04 35 30 82 04 31 30 82 03 9A A0 #..z..50..10....
    0580: 03 02 01 02 02 10 23 6C 97 1E 2B C6 0D 0B F9 74 ......#l..+....t
    0590: 60 DE F1 08 C3 C3 30 0D 06 09 2A 86 48 86 F7 0D `.....0...*.H...
    05A0: 01 01 02 05 00 30 5F 31 0B 30 09 06 03 55 04 06 .....0_1.0...U..
    05B0: 13 02 55 53 31 17 30 15 06 03 55 04 0A 13 0E 56 ..US1.0...U....V
    05C0: 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E 31 37 30 eriSign, Inc.170
    05D0: 35 06 03 55 04 0B 13 2E 43 6C 61 73 73 20 33 20 5..U....Class 3
    05E0: 50 75 62 6C 69 63 20 50 72 69 6D 61 72 79 20 43 Public Primary C
    05F0: 65 72 74 69 66 69 63 61 74 69 6F 6E 20 41 75 74 ertification Aut
    0600: 68 6F 72 69 74 79 30 1E 17 0D 39 37 30 34 31 37 hority0...970417
    0610: 30 30 30 30 30 30 5A 17 0D 30 34 30 31 30 37 32 000000Z..0401072
    0620: 33 35 39 35 39 5A 30 81 BA 31 1F 30 1D 06 03 55 35959Z0..1.0...U
    0630: 04 0A 13 16 56 65 72 69 53 69 67 6E 20 54 72 75 ....VeriSign Tru
    0640: 73 74 20 4E 65 74 77 6F 72 6B 31 17 30 15 06 03 st Network1.0...
    0650: 55 04 0B 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 U....VeriSign, I
    0660: 6E 63 2E 31 33 30 31 06 03 55 04 0B 13 2A 56 65 nc.1301..U...*Ve
    0670: 72 69 53 69 67 6E 20 49 6E 74 65 72 6E 61 74 69 riSign Internati
    0680: 6F 6E 61 6C 20 53 65 72 76 65 72 20 43 41 20 2D onal Server CA -
    0690: 20 43 6C 61 73 73 20 33 31 49 30 47 06 03 55 04 Class 31I0G..U.
    06A0: 0B 13 40 77 77 77 2E 76 65 72 69 73 69 67 6E 2E [email protected].
    06B0: 63 6F 6D 2F 43 50 53 20 49 6E 63 6F 72 70 2E 62 com/CPS Incorp.b
    06C0: 79 20 52 65 66 2E 20 4C 49 41 42 49 4C 49 54 59 y Ref. LIABILITY
    06D0: 20 4C 54 44 2E 28 63 29 39 37 20 56 65 72 69 53 LTD.(c)97 VeriS
    06E0: 69 67 6E 30 81 9F 30 0D 06 09 2A 86 48 86 F7 0D ign0..0...*.H...
    06F0: 01 01 01 05 00 03 81 8D 00 30 81 89 02 81 81 00 .........0......
    0700: D8 82 80 E8 D6 19 02 7D 1F 85 18 39 25 A2 65 2B ...........9%.e+
    0710: E1 BF D4 05 D3 BC E6 36 3B AA F0 4C 6C 5B B6 E7 .......6;..Ll[..
    0720: AA 3C 73 45 55 B2 F1 BD EA 97 42 ED 9A 34 0A 15 .<sEU.....B..4..
    0730: D4 A9 5C F5 40 25 DD D9 07 C1 32 B2 75 6C C4 CA ..\.@%....2.ul..
    0740: BB A3 FE 56 27 71 43 AA 63 F5 30 3E 93 28 E5 FA ...V'qC.c.0>.(..
    0750: F1 09 3B F3 B7 4D 4E 39 F7 5C 49 5A B8 C1 1D D3 ..;..MN9.\IZ....
    0760: B2 8A FE 70 30 95 42 CB FE 2B 51 8B 5A 3C 3A F9 ...p0.B..+Q.Z<:.
    0770: 22 4F 90 B2 02 A7 53 9C 4F 34 E7 AB 04 B2 7B 6F "O....S.O4.....o
    0780: 02 03 01 00 01 A3 82 01 90 30 82 01 8C 30 0F 06 .........0...0..
    0790: 03 55 1D 13 04 08 30 06 01 01 FF 02 01 00 30 0B .U....0.......0.
    07A0: 06 03 55 1D 0F 04 04 03 02 01 06 30 11 06 09 60 ..U........0...`
    07B0: 86 48 01 86 F8 42 01 01 04 04 03 02 01 06 30 20 .H...B........0
    07C0: 06 03 55 1D 25 04 19 30 17 06 0A 60 86 48 01 86 ..U.%..0...`.H..
    07D0: F8 45 01 08 01 06 09 60 86 48 01 86 F8 42 04 01 .E.....`.H...B..
    07E0: 30 82 01 35 06 03 55 1D 20 04 82 01 2C 30 82 01 0..5..U. ...,0..
    07F0: 28 30 82 01 24 06 0B 60 86 48 01 86 F8 45 01 07 (0..$..`.H...E..
    0800: 01 01 30 82 01 13 30 28 06 08 2B 06 01 05 05 07 ..0...0(..+.....
    0810: 02 01 16 1C 68 74 74 70 73 3A 2F 2F 77 77 77 2E ....https://www.
    0820: 76 65 72 69 73 69 67 6E 2E 63 6F 6D 2F 43 50 53 verisign.com/CPS
    0830: 30 81 E6 06 08 2B 06 01 05 05 07 02 02 30 81 D9 0....+.......0..
    0840: 30 15 16 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 0...VeriSign, In
    0850: 63 2E 30 03 02 01 01 1A 81 BF 56 65 72 69 53 69 c.0.......VeriSi
    0860: 67 6E 27 73 20 43 65 72 74 69 66 69 63 61 74 69 gn's Certificati
    0870: 6F 6E 20 50 72 61 63 74 69 63 65 20 53 74 61 74 on Practice Stat
    0880: 65 6D 65 6E 74 2C 20 77 77 77 2E 76 65 72 69 73 ement, www.veris
    0890: 69 67 6E 2E 63 6F 6D 2F 43 50 53 2C 20 67 6F 76 ign.com/CPS, gov
    08A0: 65 72 6E 73 20 74 68 69 73 20 63 65 72 74 69 66 erns this certif
    08B0: 69 63 61 74 65 20 26 20 69 73 20 69 6E 63 6F 72 icate & is incor
    08C0: 70 6F 72 61 74 65 64 20 62 79 20 72 65 66 65 72 porated by refer
    08D0: 65 6E 63 65 20 68 65 72 65 69 6E 2E 20 53 4F 4D ence herein. SOM
    08E0: 45 20 57 41 52 52 41 4E 54 49 45 53 20 44 49 53 E WARRANTIES DIS
    08F0: 43 4C 41 49 4D 45 44 20 26 20 4C 49 41 42 49 4C CLAIMED & LIABIL
    0900: 49 54 59 20 4C 54 44 2E 20 28 63 29 31 39 39 37 ITY LTD. (c)1997
    0910: 20 56 65 72 69 53 69 67 6E 30 0D 06 09 2A 86 48 VeriSign0...*.H
    0920: 86 F7 0D 01 01 02 05 00 03 81 81 00 B8 8C 98 C3 ................
    0930: 2B 48 F5 72 CD 68 0D 1A B3 74 63 BB B1 58 B6 98 +H.r.h...tc..X..
    0940: 45 22 EC 11 8D C7 4E 33 8B 62 5A 21 24 6C 9A C0 E"....N3.bZ!$l..
    0950: 42 B4 45 A9 3A FB 67 F0 91 BE 18 1F D5 48 19 93 B.E.:.g......H..
    0960: 6B 8D CB 37 4B 86 E6 7D 9B FD 8C 78 99 FF 83 C2 k..7K......x....
    0970: FC D9 55 06 9E 31 66 46 7D 1B 78 60 F4 55 D4 6C ..U..1fF..x`.U.l
    0980: 55 C8 69 62 70 7C 4D B6 89 06 05 9B C8 43 8E CC U.ibp.M......C..
    0990: 0C 28 D5 D1 8C CD 46 50 E3 31 96 66 92 11 24 1E .(....FP.1.f..$.
    09A0: 4A 5B 4B 66 5E 65 55 1E 5F 37 9A AE 00 02 40 30 J[Kf^eU._7....@0
    09B0: 82 02 3C 30 82 01 A5 02 10 70 BA E4 1D 10 D9 29 ..<0.....p.....)
    09C0: 34 B6 38 CA 7B 03 CC BA BF 30 0D 06 09 2A 86 48 4.8......0...*.H
    09D0: 86 F7 0D 01 01 02 05 00 30 5F 31 0B 30 09 06 03 ........0_1.0...
    09E0: 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0A U....US1.0...U..
    09F0: 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 2E ..VeriSign, Inc.
    0A00: 31 37 30 35 06 03 55 04 0B 13 2E 43 6C 61 73 73 1705..U....Class
    0A10: 20 33 20 50 75 62 6C 69 63 20 50 72 69 6D 61 72 3 Public Primar
    0A20: 79 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E 20 y Certification
    0A30: 41 75 74 68 6F 72 69 74 79 30 1E 17 0D 39 36 30 Authority0...960
    0A40: 31 32 39 30 30 30 30 30 30 5A 17 0D 32 38 30 38 129000000Z..2808
    0A50: 30 31 32 33 35 39 35 39 5A 30 5F 31 0B 30 09 06 01235959Z0_1.0..
    0A60: 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 .U....US1.0...U.
    0A70: 0A 13 0E 56 65 72 69 53 69 67 6E 2C 20 49 6E 63 ...VeriSign, Inc
    0A80: 2E 31 37 30 35 06 03 55 04 0B 13 2E 43 6C 61 73 .1705..U....Clas
    0A90: 73 20 33 20 50 75 62 6C 69 63 20 50 72 69 6D 61 s 3 Public Prima
    0AA0: 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6F 6E ry Certification
    0AB0: 20 41 75 74 68 6F 72 69 74 79 30 81 9F 30 0D 06 Authority0..0..
    0AC0: 09 2A 86 48 86 F7 0D 01 01 01 05 00 03 81 8D 00 .*.H............
    0AD0: 30 81 89 02 81 81 00 C9 5C 59 9E F2 1B 8A 01 14 0.......\Y......
    0AE0: B4 10 DF 04 40 DB E3 57 AF 6A 45 40 8F 84 0C 0B [email protected]@....
    0AF0: D1 33 D9 D9 11 CF EE 02 58 1F 25 F7 2A A8 44 05 .3......X.%.*.D.
    0B00: AA EC 03 1F 78 7F 9E 93 B9 9A 00 AA 23 7D D6 AC ....x.......#...
    0B10: 85 A2 63 45 C7 72 27 CC F4 4C C6 75 71 D2 39 EF ..cE.r'..L.uq.9.
    0B20: 4F 42 F0 75 DF 0A 90 C6 8E 20 6F 98 0F F8 AC 23 OB.u..... o....#
    0B30: 5F 70 29 36 A4 C9 86 E7 B1 9A 20 CB 53 A5 85 E7 _p)6...... .S...
    0B40: 3D BE 7D 9A FE 24 45 33 DC 76 15 ED 0F A2 71 64 =....$E3.v....qd
    0B50: 4C 65 2E 81 68 45 A7 02 03 01 00 01 30 0D 06 09 Le..hE......0...
    0B60: 2A 86 48 86 F7 0D 01 01 02 05 00 03 81 81 00 BB *.H.............
    0B70: 4C 12 2B CF 2C 26 00 4F 14 13 DD A6 FB FC 0A 11 L.+.,&.O........
    0B80: 84 8C F3 28 1C 67 92 2F 7C B6 C5 FA DF F0 E8 95 ...(.g./........
    0B90: BC 1D 8F 6C 2C A8 51 CC 73 D8 A4 C0 53 F0 4E D6 ...l,.Q.s...S.N.
    0BA0: 26 C0 76 01 57 81 92 5E 21 F1 D1 B1 FF E7 D0 21 &.v.W..^!......!
    0BB0: 58 CD 69 17 E3 44 1C 9C 19 44 39 89 5C DC 9C 00 X.i..D...D9.\...
    0BC0: 0F 56 8D 02 99 ED A2 90 45 4C E4 BB 10 A4 3D F0 .V......EL....=.
    0BD0: 32 03 0E F1 CE F8 E8 C9 51 8C E6 62 9F E6 9F C0 2.......Q..b....
    0BE0: 7D B7 72 9C C9 36 3A 6B 9F 4E A8 FF 64 0D 64 ..r..6:k.N..d.d
    *** RSA ServerKeyExchange
    RSA Modulus: { 0, 220, 139, 250, 222, 127, 49, 15, 95, 89, 215, 106, 138, 129, 235, 255, 93, 104, 66, 162, 49, 12, 56, 164, 176, 248, 178, 247, 19, 165, 158, 146, 23, 35, 24, 200, 200, 229, 62, 237, 249, 75, 51, 235, 70, 187, 24, 192, 112, 11, 73, 244, 220, 249, 20, 101, 136, 192, 4, 9, 50, 41, 141, 209, 85 }
    RSA Public Exponent: { 1, 0, 1 }
    [read] MD5 and SHA1 hashes: len = 206
    0000: 0C 00 00 CA 00 41 00 DC 8B FA DE 7F 31 0F 5F 59 .....A......1._Y
    0010: D7 6A 8A 81 EB FF 5D 68 42 A2 31 0C 38 A4 B0 F8 .j....]hB.1.8...
    0020: B2 F7 13 A5 9E 92 17 23 18 C8 C8 E5 3E ED F9 4B .......#....>..K
    0030: 33 EB 46 BB 18 C0 70 0B 49 F4 DC F9 14 65 88 C0 3.F...p.I....e..
    0040: 04 09 32 29 8D D1 55 00 03 01 00 01 00 80 BA 34 ..2)..U........4
    0050: E7 DB 69 31 D3 C3 40 70 D6 E8 21 59 F0 51 AB 16 ..i1..@p..!Y.Q..
    0060: 30 25 82 6B 89 71 C5 BA 88 EB B4 17 1C 6D E4 B5 0%.k.q.......m..
    0070: BB B9 97 3A 44 1D 8D 50 5D F0 3A A6 0A FF 60 CF ...:D..P].:...`.
    0080: DE CC ED 96 D8 0F F5 58 46 48 31 B1 35 0C 0D 4B .......XFH1.5..K
    0090: 2F 17 10 65 50 14 A1 4B 7E AC 1D 23 7E 46 D1 6B /..eP..K...#.F.k
    00A0: 96 67 AC 53 3A 4D 9A F8 6C B1 21 32 CE 88 3C 67 .g.S:M..l.!2..<g
    00B0: 2B 31 EA 1E 5D 26 0D 91 C0 97 F3 64 C9 9F 51 34 +1..]&.....d..Q4
    00C0: D9 A8 56 1C B8 46 62 8C 53 B8 EB E8 B8 94 ..V..Fb.S.....
    *** ServerHelloDone
    [read] MD5 and SHA1 hashes: len = 4
    0000: 0E 00 00 00 ....
    *** ClientKeyExchange, RSA PreMasterSecret, v3.0
    Random Secret: { 3, 0, 93, 240, 54, 45, 201, 36, 26, 84, 144, 76, 18, 32, 241, 29, 208, 244, 47, 63, 127, 113, 205, 22, 115, 183, 222, 202, 208, 173, 81, 168, 13, 177, 7, 184, 230, 85, 213, 248, 251, 113, 36, 156, 236, 171, 97, 216 }
    [write] MD5 and SHA1 hashes: len = 68
    0000: 10 00 00 40 B4 EC 49 02 09 61 36 4F 86 07 26 12 [email protected]..&.
    0010: 70 E2 EE 78 5F C8 6A 01 F9 32 89 1C 8B C4 2B 34 p..x_.j..2....+4
    0020: E3 B4 21 CA 60 E2 8A 56 B5 B2 20 BE FC 3B 5E 0A ..!.`..V.. ..;^.
    0030: D9 81 BB 35 49 C0 22 F6 69 1C F6 84 A7 45 12 C0 ...5I.".i....E..
    0040: 22 1E 86 47 "..G
    main, WRITE: SSL v3.0 Handshake, length = 68
    SESSION KEYGEN:
    PreMaster Secret:
    0000: 03 00 5D F0 36 2D C9 24 1A 54 90 4C 12 20 F1 1D ..].6-.$.T.L. ..
    0010: D0 F4 2F 3F 7F 71 CD 16 73 B7 DE CA D0 AD 51 A8 ../?.q..s.....Q.
    0020: 0D B1 07 B8 E6 55 D5 F8 FB 71 24 9C EC AB 61 D8 .....U...q$...a.
    CONNECTION KEYGEN:
    Client Nonce:
    0000: 3B 73 6B 85 BE 9C D3 DB 5A 32 3B 01 10 A9 FE 33 ;sk.....Z2;....3
    0010: 15 3E 95 5A E7 5E 50 F6 64 32 1F 50 63 71 1E 7F .>.Z.^P.d2.Pcq..
    Server Nonce:
    0000: 00 00 38 01 01 FD 89 4E F8 A1 2B FB 7D CD CD 91 ..8....N..+.....
    0010: 45 B0 64 C9 52 D1 2C 9B C2 8F CD AD B1 20 3E A2 E.d.R.,...... >.
    Master Secret:
    0000: 47 F8 BE 08 39 E9 48 F3 21 49 49 AA EA 35 D6 A6 G...9.H.!II..5..
    0010: 8C 1A 71 B6 EA 9C C5 CC C4 AF 86 D0 25 6D 89 DE ..q.........%m..
    0020: 5E FD 8C FC 2A 3C 18 35 6C B6 67 B0 F8 F7 E1 A3 ^...*<.5l.g.....
    Client MAC write Secret:
    0000: 35 EA 82 28 5D A7 9E E0 84 B7 EE D0 E3 42 09 77 5..(]........B.w
    Server MAC write Secret:
    0000: 0F 09 07 42 F3 44 F6 B0 A0 6E 8E 96 D6 DA E5 F5 ...B.D...n......
    Client write key:
    0000: 54 6A E0 5E 8B 05 03 59 D4 1F E3 FB B9 83 62 F4 Tj.^...Y......b.
    Server write key:
    0000: D5 7B 57 5B 29 58 36 7E 79 59 4F 66 20 9A 13 62 ..W[)X6.yYOf ..b
    ... no IV for cipher
    main, WRITE: SSL v3.0 Change Cipher Spec, length = 1
    *** Finished, v3.0
    MD5 Hash: { 15, 249, 230, 83, 227, 150, 56, 210, 34, 235, 9, 89, 131, 214, 230, 12 }
    SHA1 Hash: { 108, 86, 236, 53, 127, 202, 85, 117, 129, 156, 34, 177, 24, 29, 176, 163, 175, 46, 72, 236 }
    [write] MD5 and SHA1 hashes: len = 40
    0000: 14 00 00 24 0F F9 E6 53 E3 96 38 D2 22 EB 09 59 ...$...S..8."..Y
    0010: 83 D6 E6 0C 6C 56 EC 35 7F CA 55 75 81 9C 22 B1 ....lV.5..Uu..".
    0020: 18 1D B0 A3 AF 2E 48 EC ......H.
    Plaintext before ENCRYPTION: len = 56
    0000: 14 00 00 24 0F F9 E6 53 E3 96 38 D2 22 EB 09 59 ...$...S..8."..Y
    0010: 83 D6 E6 0C 6C 56 EC 35 7F CA 55 75 81 9C 22 B1 ....lV.5..Uu..".
    0020: 18 1D B0 A3 AF 2E 48 EC 70 B3 E7 C1 D9 6D D4 01 ......H.p....m..
    0030: EE F1 A5 DE F5 D1 11 8C ........
    main, WRITE: SSL v3.0 Handshake, length = 56
    main, READ: SSL v3.0 Change Cipher Spec, length = 1
    main, READ: SSL v3.0 Handshake, length = 56
    Plaintext after DECRYPTION: len = 56
    0000: 14 00 00 24 FF 99 25 8F B3 9E B7 A8 CA FF 48 64 ...$..%.......Hd
    0010: 77 DB BC EE 0C 74 A5 7C 61 A0 16 65

  • Http url connection

    Hello every one
    actually i successfully login to webpage using httpPost
    String urlEncodedContent = preparePostContent(LOGIN_USER_NAME, LOGIN_PASSWORD);
                HttpURLConnection urlConnection = doHttpPost(TARGET_URL, urlEncodedContent);
                String response = readResponse(urlConnection);but how can navigate from the page which i login to it to other web page in order to get its content
    in other words
    if i login to www.site.com/login.html
    after logging from application i want to go to www.site.com/content/html but i lose my session so i get the content empty !!!
    thanks

    I guarantee that this will work for you: [Java Programmatic Browser|http://www.swview.org/blog/java-programmatic-browser]
    What you will do is visit the login page, submit the form and continue to the page you want. Look at the httpunit api for details (form submission).

  • Getting the response code from a http url connection

    The following program bombs if it does not find a page
    import java.net.*;
    import java.io.*;
    public class URLReader {
    public static void main(String[] args) throws Exception {
    URL yahoo = new URL("http://www.yahoo.com/sadjhasjd.html");
    HttpURLConnection client = (HttpURLConnection) yahoo.openConnection();
    int resp_code = 0;
    if(client!=null)
    resp_code = client.getResponseCode();
    I want to get the page that the yahoo returns if it cannot get the page.... just cut and paste the above address in a web browser and see what you get.....how can i get that page back....the above thing throws an IOException...............
    thanks
    sharad

    The problem is it doesn't like .htm or .html for some reason.. I don't know this reason but somebody else might..
    Just try taking the .html off the link like this, then I'm sure you'll get the error now.
    URL yahoo = new URL("http://www.yahoo.com/sadjhasjd");
    I know it's not what you want but that is all I can offer. It seems to only look for the main index.htm(l) or welcome.htm(l) files. Sorry thats as much as I can offer on this.

  • I have multiple SSID, but want users of a single SSID to be redirected to a HTTP or HTTPS URL (LAN SERVER for authentication)

    Hi team,
    I  have multiple SSID, but want users of a single SSID to be redirected to a HTTP or HTTPS URL (LAN SERVER for authentication)
    I am very curious and it is important. I want to see how to achieve this with CISCO WLC !!!

    http://10.229.3.99/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=10.229.3.99/login.html?switch_url=https://1.1.1.1/login.html&ap_mac=e8:40:40:ad:cc:80&wlan=MO-GUEST&redirect=www.geo.tv/
    I wanted if someone connects to WLAN "MO-GUEST" automatically the user should be redirected to http://10.229.3.99/login.html and once authenticated by 10.229.3.99 , he/she should be allowed to access anything as normal. [ actually i just want automatic url redirection for the first time for the user of wlan "MO-GUEST"
    waiting expert opinions.

  • Name of .crl and .crt file missing from HTTP URL in certificate details

    Hello Everyone,
    I am in the process of building a 2-tier Windows Server 2012 R2 PKI. The CA name of both the offline standalone root CA and enterprise subordinate CA have spaces in it (we'll call the CA name, 'Test Lab Root CA' for point of reference).
    When I submitted the certificate request for the subordinate CA to the root CA and viewed the attributes/extensions of the pending request, I noticed the HTTP URL is missing the name of the .crt and .crl file.
    The AIA extension reads URL=http://test.domainname.com/pki/.crt
    in the issued certificate details.
    The CDP extension reads URL=http://test.domainname.com/pki/.crl
    in the issued certificate details.
    The AIA and CDP location HTTP URLs are configured as http://test.domainname.com/pki/<CertificateName>.crt and  http://test.domainname.com/pki/<CRLNameSuffix><DeltaCRLAllowed>.crl, respectively on the
    root CA. 
    The LDAP URL shows the .crt and .crl file name (with %20 replacing the spaces) perfectly fine. The LDAP URL is configured using variables as well. It's just the HTTP URL that is missing the name of the file altogether. 
    I have read about the issue where spaces are not being replaced with %20 in the URL on Windows Server 2012 and a hotfix is available for that issue. But this issue seems to be slightly different and I'm running Windows Server 2012 R2. I tried installing
    the hotfix to see if it would help, but the hotfix can't install because it doesn't apply to Server 2012 R2.
    I've been trying to find a technet discussion or blog article for a week to see if anyone has seen this and what the fix is, but I'm coming up empty. I only find talks about %20 not replacing the space in the name.
    Does anyone have any insight to my particular issue? I don't want to issue the subordinate CA certificate until I know the HTTP URL populates the CRL and CRT file name correctly. I can get around this by typing out the name of the file (with spaces and not
    %20... e.g. http://test.domainname.com/pki/Test Lab Root CA.crl) in the URL via the registry and the URL displays the name of the file (with %20 in the name) when I do another certificate request and check the attributes/extensions in the
    pending request. However, I prefer to avoid manually typing out the name of the file in the registry. I'd like to use the variables if at all possible. 
    Any help/guidance would be greatly appreciated.
    Thank you.

    On Fri, 27 Mar 2015 03:42:28 +0000, Brian Komar [MVP] wrote:
    You have totally messed up the URLs.
    If you run certutil -getreg ca\CRLPublicationURLs and certutil -getreg ca\CACertPublicationURLs, you will see that you do not have correct use of variables when compared to the settings that follow:
    The URLs should be set to the following for an offline CA:
    certutil -setreg CA\CRLPublicationURLs "1:%WINDIR%\system32\CertSrv\CertEnroll\%%3%%8%%9.crl\n2:http://test.domainname.com/pki/%%3%%8%%9.crl"
    *certutil -setreg CA\CACertPublicationURLs  "1:%WINDIR%\system32\CertSrv\CertEnroll\%%1_%%3%%4.crt\n2:http://*test.domainname.com*/pki/%%1_%%3%%4.crt"*
    For an issuing CA, they should be set to:
    The URLs should be set to the following for an offline CA:*certutil -setreg CA\CRLPublicationURLs "65:%WINDIR%\system32\CertSrv\CertEnroll\%%3%%8%%9.crl\n6:http://test.domainname.com/pki/%%3%%8%%9.crl"*
    *certutil -setreg CA\CACertPublicationURLs  "1:%WINDIR%\system32\CertSrv\CertEnroll\%%1_%%3%%4.crt\n2:http://**test.domainname.com**/pki/%%1_%%3%%4.crt"*
    Just a clarification here, if you're running the above certutil commands at
    the command prompt you only need single % characters in the command line.
    The double % characters are only required if the commands are being run in
    a batch file.
    Paul Adare - FIM CM MVP

  • How to encrypt UserID and Password in HTTP url

    Hello experts,
         We want to encrypt UserID and Password which has used in http URL in SAP PI 7.1.
    As we have used SOAP adapter with Transport Protocol HTTP for sender server.
    Kindly help us on it.
    Regards,
    Poonam.

    Hi,
    please go through below blog,
    http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/b04408cc-f10e-2c10-b5b7-af11026b2393?QuickLink=index&overridelayout=true
    please go through below threads,
    SOAP Envelope with user id password
    Soap ---to ----file scenario
    regards,
    ganesh.

  • Http Request through URL Connection?

    Hi ,
    Iam using an Applet (under JRE 1.3.0). Iam trying to send a Http Request using URL Connection. It is working fine . However, if the response time of the server is more than 3 minutes , the Response is not coming back to the server and the Applet is in a loop trying to read from the Server. I have observed that the request is sent to the server and it is processed successfully.
    When I test it in my local devp. machine it is working fine till 15 minutes which is my requirement.
    Can anybody suggest what should be the possible reasons and any workaround for it?
    Regards,
    TejoKiran.Y

    Iam copying the code fragments for the Applet Iam using . Is it a problem with the code? I heard that the URLConnection never times out . How is that it is not able to read the Response?
    <CODE >
    <HttpMessage>
    public class HttpMessage {
    URL servlet = null;
    Hashtable headers = null;
    public HttpMessage(URL servlet) {
    this.servlet = servlet;
    public InputStream sendGetMessage(Properties args) throws IOException {
    String argString = ""; // default
    if (args != null) {
    argString = "?" + toEncodedString(args);
    URL url = new URL(servlet.toExternalForm() + argString);
    // Turn off caching
    URLConnection con = url.openConnection();
    con.setUseCaches(false);
    // Send headers
    sendHeaders(con);
    return con.getInputStream();
    private void sendHeaders(URLConnection con) {
    if (headers != null) {
    Enumeration enum = headers.keys();
    while (enum.hasMoreElements()) {
    String name = (String) enum.nextElement();
    String value = (String) headers.get(name);
    con.setRequestProperty(name, value);
    </HttpMssage>
    <Code used to Read the Response.>
                        URL url = new URL(getDocumentBase(),"/ccls/test/delay.jsp");
                        HttpMessage msg = new HttpMessage(url);
                        InputStream in = msg.sendGetMessage(null);
                             char[] buff = new char[2048];
                             int bytesRead;
                             int ch;
                             StringBuffer sbtextbox = new StringBuffer("");
                             DataInputStream data = new DataInputStream(
                                                           new BufferedInputStream(in));
                             String line;
                        while ((line = data.readLine()) != null) {
                                  sbtextbox.append(line+"\r\n");
    </Code used to Read the Response.>
    </CODE>

  • OS X10.4.11 update, Safari won't connect to secure (HTTPS) URLs

    Didn't find any discussion of this particular symptom of the update, so thought I'd ask.
    Installed 10.4.11 update over the weekend, which contained Safari v3.0.4. After the (uneventful) install and reboot, I'm unable to connect to any secure (HTTPS) URL. Browser seems to work on non-secure connections (HTTP). My FIREFOX browser on the same machine still works.
    Haven't experienced any crashing or other OS issues, only the "Can't make a secure connection" with Safari (so far).
    Suggestions would be appreciated.

    Did you recently install the latest Security upgrade, but did not "repair permissions" on the restart? If so, that's your answer. I have found it essential to "Repair permissions" before and after any Apple system update, or Security update. Otherwise oddities may appear in the operating system.
    Also, sometimes reapplying the Combo Update specific to your current version of OS X remedies these types of problems. Here too, it's important to "repair permissions" etc.

  • How to connect HTTP URL

    hai guys,
      I developed one report and data downloaded into application path and file format is CSV. My development was working fine . Now I want to change file downloaded into FTP location ( this is also working). Now i want to connect HTTP URL path.
    How to connect HTTP URL path ( Not Open method  only connect)
    Thanks in advance

    Hello,
    U can make use of these Fm to connect to URL.
    Use this code.
    CNHT
    CALL FUNCTION 'WS_EXECUTE'                        "#EC *
      EXPORTING
        COMMANDLINE        = LV_CMDLINE
        PROGRAM            = LV_PGMNAME
      EXCEPTIONS
        FRONTEND_ERROR     = 1
        NO_BATCH           = 2
        PROG_NOT_FOUND     = 3
        ILLEGAL_OPTION     = 4
        GUI_REFUSE_EXECUTE = 5
        OTHERS             = 6.
    IF SY-SUBRC <> 0.
    Where LV_CMDLINE = WWW.SAP.COM
          LV_PGMNAME = IEXPLORE.EXE
    If useful reward points
    Vasanth
    Message was edited by: Vasanth M

  • ARR2.5 anonymous authentication problem in Lync connectivity

    Hello all,
    I'm stuck in the middle of deploying ARR to support mobility,
    I would just like to say that Lync discovery test used to work before i deployed
    ARR 2.5 ,
    I followed all the steps in all the guides,
    for some reason when i run connectivity online check tool (from Microsoft)
    i get the following error:
    Testing HTTP authentication methods for URL https://lyncdiscover.DOMAIN.com/Autodiscover/AutodiscoverService.svc/root/user.
    HTTP authentication test failed.
    Tell me more about this issue and how to resolve it
    Additional Details
    Initial anonymous HTTP(s) request didn't fail, but Anonymous isn't a supported Authentication Method for this scenario.
    HTTP Response Headers:
    Pragma: no-cache
    X-MS-Server-Fqdn: clvlync01.lan.coolvision.biz
    X-Content-Type-Options: nosniff
    Content-Length: 225
    Cache-Control: no-cache
    Content-Type: application/json
    Expires: -1
    Server: Microsoft-IIS/8.0
    X-AspNet-Version: 4.0.30319
    X-Powered-By: ASP.NET,ARR/2.5
    Date: Thu, 06 Mar 2014 08:47:41 GMT
    Elapsed Time: 699 ms.
    when i explore the url i get the xml file:
    <resource xmlns="http://schemas.microsoft.com/rtc/2012/03/ucwa" rel="user" href="https://lync01.lan.DOMAIN.biz/Autodiscover/AutodiscoverService.svc/root/user">
    <link rel="xframe" href="https://lync01.lan.DOMAIN.biz/Autodiscover/AutodiscoverService.svc/root/user/xframe"/>
    </resource>
    ARR LOG:
    connectivity:
    2014-03-06 09:54:52 lyncfeIP GET / X-ARR-CACHE-HIT=0&X-ARR-LOG-ID=1d849d36-c51b-4426-ae17-3d73a8e521d5 443 - 10.192.255.33 Mozilla/5.0+(Windows+NT+6.3;+WOW64)+AppleWebKit/537.36+(KHTML,+like+Gecko)+Chrome/33.0.1750.146+Safari/537.36
    - 200 0 0 78
    user browse:
    2014-03-06 09:59:47 lyncfeIP GET /abs/handler/C-12ca-12cc.lsabs X-ARR-CACHE-HIT=0&X-ARR-LOG-ID=460bbf67-83ec-4558-99b0-279ee55fe7a3 443 - 2.55.5.51 OC/4.0.7577.4419+(Microsoft+Lync+2010) - 404 0 0 0
    In most places people ask to disable delegation... but i don't see an option in
    the ARR .... i've tried to disable feature delegation (on the iis server) and it didn't helped.
    is there any chance it's have anything to do with my lync kerberos account ?
    please advise me what to do i'm lost.
    thanks in advance

    Check the process to deploy IIS ARR as reverse proxy step by step, you can refer to the following blog:
    http://blogs.technet.com/b/nexthop/archive/2013/02/19/using-iis-arr-as-a-reverse-proxy-for-lync-server-2013.aspx
    Lisa Zheng
    TechNet Community Support

  • Problems with SAP BC to post a request to https URL

    Hello,
    in a integration scenario one of our partners wants to send a xml to our server via https.<br/>
    I tried this internal with a test business connector. I simple use the WmPublic.pub.client http service.<br/>
    I try to post a record to an https:// URL and get an error. It seems that there is some trouble with the ssl handshake. However it is working in the browser.<br/>
    The option Security -> Certificates -> Trusted Certificates -> CA Certificates Directory is 'unspecified'. Therefore no server certificate should be reject.<br/>
    <br/>
    Now I got an 'iaik.security.ssl.SSLException: Peer sent alert: Alert Fatal: handshake failure<br/>
    ' error. I do not find any helpful entries in this forum. Did anyone solve this issue?<br/>
    <br/>
    Thank you,<br/>
    Nils<br/>
    <br/>
    error:<br/>
    2009-08-03 10:08:13 CEST iaik.security.ssl.SSLException: Peer sent alert: Alert Fatal: handshake failure<br/>
         at iaik.security.ssl.r.f(Unknown Source)<br/>
         at iaik.security.ssl.x.b(Unknown Source)<br/>
         at iaik.security.ssl.x.a(Unknown Source)<br/>
         at iaik.security.ssl.r.d(Unknown Source)<br/>
         at iaik.security.ssl.SSLTransport.startHandshake(Unknown Source)<br/>
         at iaik.security.ssl.SSLTransport.getInputStream(Unknown Source)<br/>
         at iaik.security.ssl.SSLSocket.getInputStream(Unknown Source)<br/>
         at com.wm.net.NetURLConnection.trySSLConnect(NetURLConnection.java:691)<br/>
         at com.wm.net.NetURLConnection.httpsConnect(NetURLConnection.java:562)<br/>
         at com.wm.net.NetURLConnection.connect(NetURLConnection.java:171)<br/>
         at com.wm.net.HttpURLConnection.getOutputStream(HttpURLConnection.java:419)<br/>
         at com.wm.net.HttpContext.getOutputStream(HttpContext.java:578)<br/>
         at com.wm.net.HttpContext.getOutputStream(HttpContext.java:554)<br/>
         at com.wm.net.HttpContext.post(HttpContext.java:338)<br/>
         at pub.client.http(client.java:512)<br/>
    <br/>
    SAP BC Info:<br/>
    Software <br/>
    Product webMethods Integration Server <br/>
    Version 4.6 (Standard Encryption)    Release Notes  <br/>
    Updates BC46_CoreFix7  <br/>
    Build Number 940 + CoreFix 7 [Fixes 1-205 + SP1-3] <br/>
    SSL Standard (40-bit), Provider: IAIK 2.6 <br/>
      <br/>
    Server Environment <br/>
    Java Version 1.3.1_20 (47.0) <br/>
    Java Vendor Sun Microsystems Inc. <br/>
    Java Home /usr/jdk1.3.1_20/jre <br/>
    Java VM Version 1.3.1_20-b03 <br/>
    Java VM Info Java HotSpot(TM) Client VM (mixed mode) <br/>
    Classpath /usr/local/sapbc46/server/updates/BC46_CoreFix7.jar<br/>
    /usr/local/sapbc46/server/lib/server.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/java/lib/i18n.jar<br/>
    /usr/java/jre/lib/rt.jar<br/>
    /usr/local/sapbc46/server/lib/classes<br/>
    /usr/local/sapbc46/server/lib/client.jar<br/>
    /usr/local/sapbc46/server/lib/mail.jar<br/>
    /usr/local/sapbc46/server/lib/server.jar<br/>
    packages/SAP/code/classes<br/>
    packages/SAP/code/jars/static/inqmyxml.jar<br/>
    packages/SAP/code/jars/static/jARM.jar<br/>
    packages/SAP/code/jars/static/jCO.jar<br/>
    packages/SAP/code/jars/static/sapjco.jar<br/>
    packages/SAP/code/jars/static/sapxmltoolkit.jar<br/>
    packages/WmPartners/code/classes<br/>
    packages/WmWin32/code/classes <br/>
    OS Linux <br/>
    OS Platform i386 <br/>
    OS Version 2.6.18.8-0.13-default <br/>
    Current User sapbc <br/>
    Working Dir /usr/local/sapbc46/server<br/>

    Ok - in this case you need to include to session based SSL setup in your flow (scenario).
    The pub.security:setKeyAndChain and pub.security:clearKeyAndChain services are used to control which client certificate
    the SAP BC server presents to remote servers. You need to use these services to switch between certificates and
    certificate chains if you are not using aliases for remote servers.
    List of services to be used:
    pub.security:clearKeyAndChain
    -- Associates the default key and certificate chain with the subsequent set of invoked services.
    pub.security:setKeyAndChain
    -- Processes a digital signature to make sure that the provided data has not been modified. The signature input is the DER encoding of the PKCS#7 SignedData object.
    pub.security.pkcs7:sign
    -- Creates a PKCS7 SignedData object.
    pub.security.pkcs7:verify
    -- Processes a digital signature to make sure that the provided data has not been modified.
    pub.security.util:createMessageDigest
    -- Generates a message digest for a given message.
    pub.security.util:getCertificateInfo
    -- Retrieves information (e.g., serial number, issuer, expiration date) from a digital certificate.
    pub.security.util:loadPKCS7CertChain
    -- Converts a certificate chain that is in PKCS7 format to a list (a one-dimensional array) of byte arrays.
    Example:
    Invoke pub.client:http to send data to Company D.
    Invoke pub.security:setKeyAndChain using the key and certificate chain for Company B.
    Invoke pub.client:http to send data to Company B.
    Invoke pub.security:setKeyAndChain using the key and certificate chain for Company C.
    Invoke pub.client:http to send data to Company C.
    Invoke pub.security:clearKeyAndChain to revert back to the default key and certificate chain for Company
    Au2019s server.
    Invoke pub.client:http to send data to Company D.
    Edited by: Kai Lerch-Baier on Aug 3, 2009 1:47 PM

  • Map Viewer URL Connection Issue

    Hi,
    I have an UI project, for which i have created a Deployment Profile named 'adfXXXXXUI' nothing but created a adflibrary for that UI project.
    While creating the adf jar, i have come across an Option called 'Connections' .
    Here i have selected Connection Names Only ... means i will be getting all the names of the connections i have created & those will be reflected in my local connection.xml file.
    After configuring the rest of the params, i deployed my UI project to "deploy -> adfXXXXXUI.jar".
    And we have used this jar to integrate with another UI application ... And the taskflows avilable in the jar will be used in the other UI application.
    Now here is my problem ... Actually my connections.xml file has a URL Connection. This is how it looks like....
    <?xml version = '1.0' encoding = 'UTF-8'?>
    <References xmlns="http://xmlns.oracle.com/adf/jndi">
    <Reference name="MapServer" className="oracle.adf.model.connection.url.HttpURLConnection" xmlns="">
    <Factory className="oracle.adf.model.connection.url.URLConnectionFactory"/>
    <RefAddresses>
    <XmlRefAddr addrType="MapServer">
    <Contents>
    <urlconnection name="MapServer" url="http://sbsys1.intra.schneider.com:8109/mapviewer"/>
    </Contents>
    </XmlRefAddr>
    </RefAddresses>
    </Reference><Reference name="snibuilddb" className="oracle.jdeveloper.db.adapter.DatabaseProvider" credentialStoreKey="snibuilddb" xmlns="">
    <Factory className="oracle.jdeveloper.db.adapter.DatabaseProviderFactory"/>
    <RefAddresses>
    <StringRefAddr addrType="subtype">
    <Contents>oraJDBC</Contents>
    </StringRefAddr>
    <StringRefAddr addrType="user">
    <Contents>sni_guest</Contents>
    </StringRefAddr>
    <StringRefAddr addrType="port">
    <Contents>3720</Contents>
    </StringRefAddr>
    <StringRefAddr addrType="hostname">
    <Contents>uxsys186v</Contents>
    </StringRefAddr>
    <SecureRefAddr addrType="password"/>
    <StringRefAddr addrType="serviceName">
    <Contents>snit0.world</Contents>
    </StringRefAddr>
    <StringRefAddr addrType="DeployPassword">
    <Contents>true</Contents>
    </StringRefAddr>
    <StringRefAddr addrType="oraDriverType">
    <Contents>thin</Contents>
    </StringRefAddr>
    </RefAddresses>
    </Reference>
    </References>
    All the taskflows avaialble in my jar using the URL connection which mentioned above. But the adflibray jar got created with a file named 'jar-connection.xml', where i can see <Reference/> as an empty Tag. Because i have selected connections name only as an option when creating the adflibrary for my UI.
    Hence it is appearing so ... But when i added this jar to the other application, i have dragged & dropped the taskflows as a region on to the JSPX page. And i started running the page. On the page .... i can see only the data which is not making use of MapServer connection defiition. Along with that, some maps needs to rendered .. but that is not happening. Rest of the page with the filter critieria is being displayed properly.
    Now i have selected Include Connection Details as an option, by editing the adfLibrary Deployment profile of the UI & redeployed & found the same thing. Like, though i specify the Include Connection Details as an option ... i did not see those URL connection details in my jar-connection.xml file.Still it is not working.
    All the taskflows inside the jar are trying to use this URL connection from jar-connection.xml, which is avaiable inside the adfLibUI.jar.
    I tried with a scenorio some thing like ... For the application to which i have added this adfUILibrary, there itself i created a URLConnection ... but it did not worked as well.
    Requesting you to let me know how can i get avail of my URL connection in to my jar ...
    Thanks & Regards,
    Kiran Konjeti

    This is purely ssl issue. You can try adding the below logic first.. This code basically sets ssl properties for us.
    import java.security.Security;
    Security.addProvider(new com.sun.net.ssl.internal.ssl.Provider());
    Properties properties = System.getProperties();
    String handlers = System.getProperty("java.protocol.handler.pkgs");
    if (handlers == null) {
        // nothing specified yet (expected case)
        properties.put("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol");
    else {
        // something already there, put ourselves out front
        properties.put("java.protocol.handler.pkgs", "com.sun.net.ssl.internal.www.protocol|".concat(handlers));     
    System.setProperties(properties);
    Below you start your code....

Maybe you are looking for

  • Want to install SSD and make it the main drive

    Hello, I just purchased my Lenovo IdeaCenter H530 Desktop and straight away installed a GT640 video card.   Everything seems good and I'm waiting to install a SSD.   I would like to run windows 8.1 from the SSD as the primary drive, and use the 1TB H

  • Up-to-date program reply time.

    I've requested my copy of mountain lion since 10am yesterday morning and I have not gotten a reply as yet. Is anyone still waiting for a reply like me?

  • Best way to back up

    We have two Mac laptops (I'm buying a MacBook Air) and we have all our data (work/private) on those two laptops -- which is scary without backup! I hope to get some advice on how to best backup for laptops. 1) External HD. I'm not sure exactly how TM

  • Use ADF Default Database Connection

    Hi All, I am writing a class that requires to connect to the database and perform some functions. This class is invoked from a button. My challenge is, how can I use the current adf application database connection (jndi) instead of creating another c

  • Using tzupdater on windows 2003 machine; multiple JRE instances

    Hi All, Apologies in advance if this is the wrong forum. Alas i am a newbie at Java and have been thrown into the fire to update our JRE with the tzupdater tool. I'm having trouble figuring out if the tool is working correctly and how to apply it to