KMLM List
View email archives for the history of this mailing list.
|
|
|
|
sushidevelopers - Re: [sushidevelopers] new sushi deployment for testing
|
Message Thread:
Previous |
Next
|
- To: "Boerema, Cate" <Cate.Boerema@xxxxxxxxxxxxxxxxxxxx>
- From: Luiz Augusto Garcia da Silva <luizaugustogarcia@xxxxxxxxxxxx>
- Date: Fri, 16 Jul 2010 10:06:44 -0300
- Cc: "Andrew Wiles \[aew\]" <aew@xxxxxxxxxx>, Abdul Habra <ahabra@xxxxxxxxxxxxxxxxxxxx>, "Crego,Erin" <cregoe@xxxxxxxx>, "sushidevelopers@xxxxxxxxxxxxx" <sushidevelopers@xxxxxxxxxxxxx>
- Send Email to sushidevelopers@list.niso.org:
- Send new message
- Reply to this message
|
It's true! It has been difficult to collect statistics from all our
publisher/platforms, because each one has requires that the
authentication is done in a different way. Some of them use "wsse" over
HTTPS. Others expect authentication credentials in Requestor ID and/or
Customer ID. Others expect authentication parameter passed in HTTP BASIC
Authorization headers (in a lowest level). SUSHI clients that are
available on the network can not fit all.
What we, from Brazilian CAPES Consortia, did was use the code of
University of Pennsylvania's SUSHI Toolkit, availabe at
https://labs.library.upenn.edu/SushiToolkitDocs/site/ as the basis of
our own SUSHI client. We made some changes in order to support "wsse",
and particularly HTTP BASIC Authorization.
After these troubles and changes in order to solve them our SUSHI
client is able to collect statistics from all our publishers.
On 15/07/2010 20:36, Boerema, Cate wrote:
It is going to be really difficult to develop a SUSHI client that
works with all providers if they aren't aligned around the standard.
Our SUSHI client is currently expecting authentication to be passed
through any of the SUSHI standard request elements. If any provider
wants to test authenticating that way we'd be happy to help them test
using our client.
*From:* Andrew Wiles [aew] [mailto:aew@xxxxxxxxxx]
*Sent:* Thursday, July 15, 2010 7:16 AM
*To:* Abdul Habra; Crego,Erin
*Cc:* Boerema, Cate; sushidevelopers@xxxxxxxxxxxxx
*Subject:* RE: [sushidevelopers] new sushi deployment for testing
Another method we've seen used for authentication are the WSS
extensions to SOAP requests. ProQuest and Swetswise use this method.
*From:* sushidevelopers@xxxxxxxxxxxxx
[mailto:sushidevelopers@xxxxxxxxxxxxx] *On Behalf Of *Abdul Habra
*Sent:* 15 July 2010 14:42
*To:* Crego,Erin
*Cc:* Boerema, Cate; sushidevelopers@xxxxxxxxxxxxx
*Subject:* Re: [sushidevelopers] new sushi deployment for testing
I found this attached pdf on niso site.
http://www.niso.org/apps/group_public/download.php/2650/SUSHIauthentication20aug09.pdf
If I understand it correctly, It states that the user name/password
could be embedded in the RequestorID
Additionally, SOAP allows the envelope to be posted with an http GET
(and POST of course)
So if the client uses GET, adding username/password as parameters to
the URL, would it not break the soap request?
|
|
By Date:
Previous |
Next
|
Current Thread
|
By Thread:
Previous |
Next
|
- Re: [sushidevelopers] new sushi deployment for testing, (continued)
- RE: [sushidevelopers] new sushi deployment for testing, Andrew Wiles [aew] 11:42 GMT
- Re: [sushidevelopers] new sushi deployment fo, Luiz Augusto Garcia da Silva (you are here)
- RE: [sushidevelopers] new sushi deployment for testing, BAKER, Chris 13:58 GMT
- RE: [sushidevelopers] new sushi deployment for testing, Oliver Pesch 14:09 GMT
- Re: [sushidevelopers] new sushi deployment for testing, Luiz Augusto Garcia da Silva 14:32 GMT
- Re: [sushidevelopers] new sushi deployment for testing, thomas barker 14:55 GMT
- RE: [sushidevelopers] new sushi deployment for testing, Johnson, Alan 15:18 GMT
|
|