Chilkat Examples

ChilkatHOME.NET Core C#Android™AutoItCC#C++Chilkat2-PythonCkPythonClassic ASPDataFlexDelphi ActiveXDelphi DLLGoJavaLianjaMono C#Node.jsObjective-CPHP ActiveXPHP ExtensionPerlPowerBuilderPowerShellPureBasicRubySQL ServerSwift 2Swift 3,4,5...TclUnicode CUnicode C++VB.NETVBScriptVisual Basic 6.0Visual FoxProXojo Plugin

Chilkat2-Python Web API Examples

Primary Categories

ABN AMRO
AWS Secrets Manager
AWS Security Token Service
AWS Translate
Activix CRM
Adyen
Alibaba Cloud OSS
Amazon Cognito
Amazon DynamoDB
Amazon MWS
Amazon Pay
Amazon Rekognition
Amazon SP-API
Amazon Voice ID
Aruba Fatturazione
Azure Maps
Azure Monitor
Azure OAuth2
Azure Storage Accounts
Backblaze S3
Banco Inter
Belgian eHealth Platform
Bitfinex v2 REST
Bluzone
BrickLink
Bunny CDN
CallRail
CardConnect
Cerved
ClickBank
Clickatell
Cloudfare
Constant Contact
DocuSign
Duo Auth MFA
ETrade
Ecwid
Egypt ITIDA
Egypt eReceipt
Etsy
Facebook
Faire
Frame.io
GeoOp
GetHarvest
Global Payments
Google People
Google Search Console
Google Translate
Google Vision
Hungary NAV Invoicing
IBM Text to Speech
Ibanity
IntakeQ
JCC Cyprus
Jira
Lightspeed
MYOB
Magento
Mailgun
Malaysia MyInvois

Mastercard
MedTunnel
MercadoLibre
MessageMedia
Microsoft Calendar
Microsoft Group
Microsoft Tasks and Plans
Microsoft Teams
Moody's
Okta OAuth/OIDC
OneLogin OIDC
OneNote
OpenAI ChatGPT
PRODA
PayPal
Paynow.pl
Peoplevox
Populi
QuickBooks
Rabobank
Refinitiv
Royal Mail OBA
SCiS Schools Catalogue
SII Chile
SMSAPI
SOAP finkok.com
Salesforce
SendGrid
Shippo
Shopify
Shopware
Shopware 6
SimpleTexting
Square
Stripe
SugarCRM
TicketBAI
TikTok Shop
Trello
Twilio
Twitter API v2
Twitter v1
UPS
UniPin
VoiceBase
Vonage
WaTrend
Walmart v3
Wasabi
WhatsApp
WiX
WooCommerce
WordPress
Xero
Yahoo Mail
Yapily
Yousign
ZATCA
Zendesk
Zoom
_Miscellaneous_
eBay
effectconnect
hacienda.go.cr

 

 

 

(Chilkat2-Python) eHealth.gov.be RequestSecurityToken

Request a security token for use with the eHealth.gov.be SOAP web services.

For more information, see https://www.ehealth.fgov.be/ehealthplatform/fr/data/file/view/bf25682e28c6ccd0d06768c73a467176f63791dd?name=STS%20-%20WS%20Trust%20-%20Cookbook%20v1.0%20dd%2020012023.pdf

Chilkat2 Python Downloads

install with pip

pip3 install chilkat2

or download... Python Module for Windows, Linux, Alpine Linux, MacOS, Solaris

import sys
import chilkat2

# This requires the Chilkat API to have been previously unlocked.
# See Global Unlock Sample for sample code.

success = True

# Provide a certificate + private key.
# Note: If your certificate + private key is located on a hardware token or smartcard, you can call a different function to load from smartcard..
cert = chilkat2.Cert()
success = cert.LoadPfxFile("SSIN=12345678.acc.p12","p12_password")
if (success != True):
    print(cert.LastErrorText)
    sys.exit()

# Create the following XML to be signed..

# <?xml version="1.0" encoding="UTF-8"?>
# <soapenv:Envelope xmlns:ns="http://docs.oasis-open.org/ws-sx/ws-trust/200512" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
# 	<soapenv:Header>
# 		<wsse:Security xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" 
# 		xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">
# 			<wsse:BinarySecurityToken EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" 
# 			    ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" 
# 			    wsu:Id="X509-4A13D668E59AAC4F3816750824965588">{organization certificate}</wsse:BinarySecurityToken>			
# 			<wsu:Timestamp wsu:Id="TS-4A13D668E59AAC4F3816750824965567">
# 				<wsu:Created>2023-02-01T12:42:11.156Z</wsu:Created>
# 				<wsu:Expires>2023-02-01T12:58:51.156Z</wsu:Expires>
# 			</wsu:Timestamp>
# 		</wsse:Security>
# 	</soapenv:Header>
# 	<soapenv:Body wsu:Id="id-4A13D668E59AAC4F38167508249655911" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">
# 		<wst:RequestSecurityToken Context="RC-302613de-a809-46b5-931a-0a55bfca5937" 
# 		    xmlns:auth="http://docs.oasis-open.org/wsfed/authorization/200706"
# 		    xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
# 		    xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing"
# 		    xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy"
# 		    xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"
# 		    xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512">
# 			<wst:TokenType>http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1</wst:TokenType>
# 			<wst:RequestType>http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue</wst:RequestType>
# 			<wst:Claims Dialect="http://docs.oasis-open.org/wsfed/authorization/200706/authclaims">
# 				<auth:ClaimType Uri="urn:be:fgov:kbo-bce:organization:cbe-number">
# 					<auth:Value>{cbenumber}</auth:Value>
# 				</auth:ClaimType>
# 				<auth:ClaimType Uri="urn:be:fgov:ehealth:1.0:certificateholder:enterprise:cbe-number">
# 					<auth:Value>{cbenumber}</auth:Value>
# 				</auth:ClaimType>
# 			</wst:Claims>
# 			<wst:Lifetime>
# 				<wsu:Created>2023-02-01T08:30:10+02:00</wsu:Created>
# 				<wsu:Expires>2023-02-01T09:30:10+02:00</wsu:Expires>
# 			</wst:Lifetime>
# 			<wst:KeyType>http://docs.oasis-open.org/ws-sx/wstrust/200512/PublicKey</wst:KeyType>
# 		</wst:RequestSecurityToken>
# 	</soapenv:Body>
# </soapenv:Envelope>

xmlToSign = chilkat2.Xml()
xmlToSign.Tag = "soapenv:Envelope"
xmlToSign.AddAttribute("xmlns:ns","http://docs.oasis-open.org/ws-sx/ws-trust/200512")
xmlToSign.AddAttribute("xmlns:soapenv","http://schemas.xmlsoap.org/soap/envelope/")
xmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security",True,"xmlns:wsse","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd")
xmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security",True,"xmlns:wsu","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd")
xmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security|wsse:BinarySecurityToken",True,"EncodingType","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary")
xmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security|wsse:BinarySecurityToken",True,"ValueType","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3")
xmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security|wsse:BinarySecurityToken",True,"wsu:Id","X509-4A13D668E59AAC4F3816750824965588")

bdCert = chilkat2.BinData()
cert.ExportCertDerBd(bdCert)
xmlToSign.UpdateChildContent("soapenv:Header|wsse:Security|wsse:BinarySecurityToken",bdCert.GetEncoded("base64"))

xmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security|wsu:Timestamp",True,"wsu:Id","TS-4A13D668E59AAC4F3816750824965567")

dt = chilkat2.CkDateTime()
dt.SetFromCurrentSystemTime()
xmlToSign.UpdateChildContent("soapenv:Header|wsse:Security|wsu:Timestamp|wsu:Created",dt.GetAsTimestamp(False))
dt.AddSeconds(300)
xmlToSign.UpdateChildContent("soapenv:Header|wsse:Security|wsu:Timestamp|wsu:Expires",dt.GetAsTimestamp(False))
dt.AddSeconds(-300)

xmlToSign.UpdateAttrAt("soapenv:Body",True,"wsu:Id","id-4A13D668E59AAC4F38167508249655911")
xmlToSign.UpdateAttrAt("soapenv:Body",True,"xmlns:wsu","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd")
xmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",True,"Context","RC-302613de-a809-46b5-931a-0a55bfca5937")
xmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",True,"xmlns:auth","http://docs.oasis-open.org/wsfed/authorization/200706")
xmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",True,"xmlns:ds","http://www.w3.org/2000/09/xmldsig#")
xmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",True,"xmlns:wsa","http://schemas.xmlsoap.org/ws/2004/08/addressing")
xmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",True,"xmlns:wsp","http://schemas.xmlsoap.org/ws/2004/09/policy")
xmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",True,"xmlns:wsse","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd")
xmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",True,"xmlns:wst","http://docs.oasis-open.org/ws-sx/ws-trust/200512")
xmlToSign.UpdateChildContent("soapenv:Body|wst:RequestSecurityToken|wst:TokenType","http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1")
xmlToSign.UpdateChildContent("soapenv:Body|wst:RequestSecurityToken|wst:RequestType","http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue")

success = xmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken|wst:Claims",True,"Dialect","http://docs.oasis-open.org/wsfed/authorization/200706/authclaims")
success = xmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken|wst:Claims|auth:ClaimType[1]",True,"Uri","urn:be:fgov:ehealth:1.0:certificateholder:person:ssin")

xmlToSign.UpdateChildContent("soapenv:Body|wst:RequestSecurityToken|wst:KeyType","http://docs.oasis-open.org/ws-sx/wstrust/200512/PublicKey")

gen = chilkat2.XmlDSigGen()

gen.SigLocation = "soapenv:Envelope|soapenv:Header|wsse:Security|wsse:BinarySecurityToken"
gen.SigLocationMod = 1
gen.SigId = "SIG-4A13D668E59AAC4F38167508249656212"
gen.SigNamespacePrefix = "ds"
gen.SigNamespaceUri = "http://www.w3.org/2000/09/xmldsig#"
gen.SignedInfoPrefixList = "soapenv urn urn1"
gen.IncNamespacePrefix = "ec"
gen.IncNamespaceUri = "http://www.w3.org/2001/10/xml-exc-c14n#"
gen.SignedInfoCanonAlg = "EXCL_C14N"
gen.SignedInfoDigestMethod = "sha256"

# Set the KeyInfoId before adding references..
gen.KeyInfoId = "KI-4A13D668E59AAC4F3816750824965589"

# -------- Reference 1 --------
gen.AddSameDocRef("TS-4A13D668E59AAC4F3816750824965567","sha256","EXCL_C14N","wsse soapenv urn urn1","")

# -------- Reference 2 --------
gen.AddSameDocRef("id-4A13D668E59AAC4F38167508249655911","sha256","EXCL_C14N","urn urn1","")

# -------- Reference 3 --------
gen.AddSameDocRef("X509-4A13D668E59AAC4F3816750824965588","sha256","EXCL_C14N","_EMPTY_","")

gen.SetX509Cert(cert,True)

gen.KeyInfoType = "Custom"

# Create the custom KeyInfo XML..
xmlCustomKeyInfo = chilkat2.Xml()
xmlCustomKeyInfo.Tag = "wsse:SecurityTokenReference"
xmlCustomKeyInfo.AddAttribute("wsu:Id","STR-4A13D668E59AAC4F38167508249655810")
xmlCustomKeyInfo.UpdateAttrAt("wsse:Reference",True,"URI","#X509-4A13D668E59AAC4F3816750824965588")
xmlCustomKeyInfo.UpdateAttrAt("wsse:Reference",True,"ValueType","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3")

xmlCustomKeyInfo.EmitXmlDecl = False
gen.CustomKeyInfoXml = xmlCustomKeyInfo.GetXml()

# Load XML to be signed...
sbXml = chilkat2.StringBuilder()
xmlToSign.GetXmlSb(sbXml)

gen.Behaviors = "IndentedSignature"

# Sign the XML...
success = gen.CreateXmlDSigSb(sbXml)
if (success != True):
    print(gen.LastErrorText)
    sys.exit()

# The sbXml is sent as the HTTP request body below..
print(sbXml.GetAsString())

# -----------------------------------------------------------------------------------------------------------
# Send the SOAP requet to ask the server to issue a security token, which can then be used to access other SOAP services..
http = chilkat2.Http()

success = http.SetSslClientCert(cert)
if (success == False):
    print(http.LastErrorText)
    sys.exit()

http.SetRequestHeader("Content-Type","text/xml")

url = "https://services-acpt.ehealth.fgov.be/IAM/SecurityTokenService/v1/RequestSecurityToken"
# resp is a CkHttpResponse
resp = http.PostXml(url,sbXml.GetAsString(),"utf-8")
if (http.LastMethodSuccess == False):
    print(http.LastErrorText)
    sys.exit()

responseStatus = resp.StatusCode
print("Response Status Code = " + str(responseStatus))

# You'll want to check to see if the response status code = 200.
# If not, then the response body contains error information instead of a security token.
# This example will assume we received 200 status code.

print(resp.BodyStr)

# The response body contains XML like this:

# <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/">
#     <SOAP-ENV:Header/>
#     <SOAP-ENV:Body>
#         <wst:RequestSecurityTokenResponse xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512" Context="RC-302613de-a809-46b5-931a-0a55bfca5937">
#             <wst:RequestedSecurityToken>
#                 <Assertion xmlns="urn:oasis:names:tc:SAML:1.0:assertion" AssertionID="_3e8ea5c951b2167c274974750ace9b5d" 
# ...
#                 </Assertion>
#             </wst:RequestedSecurityToken>
#         </wst:RequestSecurityTokenResponse>
#     </SOAP-ENV:Body>
# </SOAP-ENV:Envelope>

# The portion of the response from  <Assertion ..> ... </Assertion>  is the SAML security token to be included
# in a subsesquent SOAP request.  It is extremely important to not modify the contents of the security token in any way, including not changing
# whitespace or any formatting.  Therefore, we get the response body exactly as-is, to be used in a SOAP request.

# Copy the response body to a Chilkat BinData object.
bdSecToken = chilkat2.BinData()
resp.GetBodyBd(bdSecToken)

# Let's save the bdSecToken to a file, and pick it up in the next example where it is used
# in a SOAP request, such as in this example:  AddressBook Search for Professionals

bdSecToken.WriteFile("qa_data/tokens/ehealth-fgov-be-sectoken.xml")

print("OK")

 

© 2000-2024 Chilkat Software, Inc. All Rights Reserved.