Skip to main content

Enabling and configuring the TESB PEP

To enable authorization on a TESB service endpoint, it is necessary to install the TESB PEP interceptor. This can be done in a number of different ways. The easiest way for a JAX-WS based endpoint is to use the following WS-Policy expression:

<tpa:Authorization xmlns:tpa="" type="XACML" />

This will automatically install the PolicyEnforcementPoint interceptor and ensure that only authorized requests invoke on the endpoint. When the PEP is installed in this way, an additional property ("tesb.pdp.address") is needed to tell the PEP where to find the PDP. This can be done in the "etc/org.talend.esb.authorization.pdp.cfg" configuration file, by setting a value for the "tesb.pdp.address" property. Alternatively, it can be set as a property on the endpoint, e.g.:

<jaxws:server ...>
        <entry key="tesb.pdp.address" 

See the 'syncope-esb-xacml' example for more information on adding the PolicyEnforcementPoint to a JAX-WS service endpoint. It is also possible to create the PEP interceptor and add it directly to the CXF interceptor chain for the endpoint. For example:

    <property name="pdpAddress" 

This can then be added to the Interceptor chain of a JAX-WS endpoint via:

<jaxws:endpoint ...>
        <ref bean="XACMLInterceptor"/>

The PEP can also be added to the Interceptor chain of a JAX-RS endpoint via:

<jaxrs:server ...>
        <ref bean="XACMLInterceptor"/>

See the 'syncope-esb-xacml-rest' example for more information on adding the PolicyEnforcementPoint to a JAX-RS service endpoint. An example of how to use the co-located PDP is given in the ‘syncope-esb-xacml-coloc' example. In this example, the service provider obtains the PDP from the OSGi registry via:

<reference id="pdpBean"  

<bean class="org.talend.esb.authorization.xacml.rt.pep.CXFXACMLAuthorizingInterceptor"
    <property name="policyDecisionPoint" ref="pdpBean"/>

Did this page help you?

If you find any issues with this page or its content – a typo, a missing step, or a technical error – let us know how we can improve!