Chilkat Examples

ChilkatHOME.NET Core C#Android™AutoItCC#C++Chilkat2-PythonCkPythonClassic ASPDataFlexDelphi ActiveXDelphi DLLGoJavaLianjaMono C#Node.jsObjective-CPHP ActiveXPHP ExtensionPerlPowerBuilderPowerShellPureBasicRubySQL ServerSwift 2Swift 3,4,5...TclUnicode CUnicode C++VB.NETVBScriptVisual Basic 6.0Visual FoxProXojo Plugin

Lianja Web API Examples

Primary Categories

ABN AMRO
AWS Secrets Manager
AWS Security Token Service
AWS Translate
Activix CRM
Adyen
Alibaba Cloud OSS
Amazon Cognito
Amazon DynamoDB
Amazon MWS
Amazon Pay
Amazon Rekognition
Amazon SP-API
Amazon Voice ID
Aruba Fatturazione
Azure Maps
Azure Monitor
Azure OAuth2
Azure Storage Accounts
Backblaze S3
Banco Inter
Belgian eHealth Platform
Bitfinex v2 REST
Bluzone
BrickLink
Bunny CDN
CallRail
CardConnect
Cerved
ClickBank
Clickatell
Cloudfare
Constant Contact
DocuSign
Duo Auth MFA
ETrade
Ecwid
Egypt ITIDA
Egypt eReceipt
Etsy
Facebook
Faire
Frame.io
GeoOp
GetHarvest
Global Payments
Google People
Google Search Console
Google Translate
Google Vision
Hungary NAV Invoicing
IBM Text to Speech
Ibanity
IntakeQ
JCC Cyprus
Jira
Lightspeed
MYOB
Magento
Mailgun
Malaysia MyInvois

Mastercard
MedTunnel
MercadoLibre
MessageMedia
Microsoft Calendar
Microsoft Group
Microsoft Tasks and Plans
Microsoft Teams
Moody's
Okta OAuth/OIDC
OneLogin OIDC
OneNote
OpenAI ChatGPT
PRODA
PayPal
Paynow.pl
Peoplevox
Populi
QuickBooks
Rabobank
Refinitiv
Royal Mail OBA
SCiS Schools Catalogue
SII Chile
SMSAPI
SOAP finkok.com
Salesforce
SendGrid
Shippo
Shopify
Shopware
Shopware 6
SimpleTexting
Square
Stripe
SugarCRM
TicketBAI
TikTok Shop
Trello
Twilio
Twitter API v2
Twitter v1
UPS
UniPin
VoiceBase
Vonage
WaTrend
Walmart v3
Wasabi
WhatsApp
WiX
WooCommerce
WordPress
Xero
Yahoo Mail
Yapily
Yousign
ZATCA
Zendesk
Zoom
_Miscellaneous_
eBay
effectconnect
hacienda.go.cr

 

 

 

(Lianja) eHealth.gov.be RequestSecurityToken

Request a security token for use with the eHealth.gov.be SOAP web services.

For more information, see https://www.ehealth.fgov.be/ehealthplatform/fr/data/file/view/bf25682e28c6ccd0d06768c73a467176f63791dd?name=STS%20-%20WS%20Trust%20-%20Cookbook%20v1.0%20dd%2020012023.pdf

Chilkat Lianja Extension Download

Chilkat Lianja Extension

// This requires the Chilkat API to have been previously unlocked.
// See Global Unlock Sample for sample code.

llSuccess = .T.

// Provide a certificate + private key.
// Note: If your certificate + private key is located on a hardware token or smartcard, you can call a different function to load from smartcard..
loCert = createobject("CkCert")
llSuccess = loCert.LoadPfxFile("SSIN=12345678.acc.p12","p12_password")
if (llSuccess <> .T.) then
    ? loCert.LastErrorText
    release loCert
    return
endif

// Create the following XML to be signed..

// <?xml version="1.0" encoding="UTF-8"?>
// <soapenv:Envelope xmlns:ns="http://docs.oasis-open.org/ws-sx/ws-trust/200512" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
// 	<soapenv:Header>
// 		<wsse:Security xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" 
// 		xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">
// 			<wsse:BinarySecurityToken EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" 
// 			    ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" 
// 			    wsu:Id="X509-4A13D668E59AAC4F3816750824965588">{organization certificate}</wsse:BinarySecurityToken>			
// 			<wsu:Timestamp wsu:Id="TS-4A13D668E59AAC4F3816750824965567">
// 				<wsu:Created>2023-02-01T12:42:11.156Z</wsu:Created>
// 				<wsu:Expires>2023-02-01T12:58:51.156Z</wsu:Expires>
// 			</wsu:Timestamp>
// 		</wsse:Security>
// 	</soapenv:Header>
// 	<soapenv:Body wsu:Id="id-4A13D668E59AAC4F38167508249655911" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">
// 		<wst:RequestSecurityToken Context="RC-302613de-a809-46b5-931a-0a55bfca5937" 
// 		    xmlns:auth="http://docs.oasis-open.org/wsfed/authorization/200706"
// 		    xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
// 		    xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing"
// 		    xmlns:wsp="http://schemas.xmlsoap.org/ws/2004/09/policy"
// 		    xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"
// 		    xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512">
// 			<wst:TokenType>http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1</wst:TokenType>
// 			<wst:RequestType>http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue</wst:RequestType>
// 			<wst:Claims Dialect="http://docs.oasis-open.org/wsfed/authorization/200706/authclaims">
// 				<auth:ClaimType Uri="urn:be:fgov:kbo-bce:organization:cbe-number">
// 					<auth:Value>{cbenumber}</auth:Value>
// 				</auth:ClaimType>
// 				<auth:ClaimType Uri="urn:be:fgov:ehealth:1.0:certificateholder:enterprise:cbe-number">
// 					<auth:Value>{cbenumber}</auth:Value>
// 				</auth:ClaimType>
// 			</wst:Claims>
// 			<wst:Lifetime>
// 				<wsu:Created>2023-02-01T08:30:10+02:00</wsu:Created>
// 				<wsu:Expires>2023-02-01T09:30:10+02:00</wsu:Expires>
// 			</wst:Lifetime>
// 			<wst:KeyType>http://docs.oasis-open.org/ws-sx/wstrust/200512/PublicKey</wst:KeyType>
// 		</wst:RequestSecurityToken>
// 	</soapenv:Body>
// </soapenv:Envelope>

loXmlToSign = createobject("CkXml")
loXmlToSign.Tag = "soapenv:Envelope"
loXmlToSign.AddAttribute("xmlns:ns","http://docs.oasis-open.org/ws-sx/ws-trust/200512")
loXmlToSign.AddAttribute("xmlns:soapenv","http://schemas.xmlsoap.org/soap/envelope/")
loXmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security",.T.,"xmlns:wsse","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd")
loXmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security",.T.,"xmlns:wsu","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd")
loXmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security|wsse:BinarySecurityToken",.T.,"EncodingType","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary")
loXmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security|wsse:BinarySecurityToken",.T.,"ValueType","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3")
loXmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security|wsse:BinarySecurityToken",.T.,"wsu:Id","X509-4A13D668E59AAC4F3816750824965588")

loBdCert = createobject("CkBinData")
loCert.ExportCertDerBd(loBdCert)
loXmlToSign.UpdateChildContent("soapenv:Header|wsse:Security|wsse:BinarySecurityToken",loBdCert.GetEncoded("base64"))

loXmlToSign.UpdateAttrAt("soapenv:Header|wsse:Security|wsu:Timestamp",.T.,"wsu:Id","TS-4A13D668E59AAC4F3816750824965567")

loDt = createobject("CkDateTime")
loDt.SetFromCurrentSystemTime()
loXmlToSign.UpdateChildContent("soapenv:Header|wsse:Security|wsu:Timestamp|wsu:Created",loDt.GetAsTimestamp(.F.))
loDt.AddSeconds(300)
loXmlToSign.UpdateChildContent("soapenv:Header|wsse:Security|wsu:Timestamp|wsu:Expires",loDt.GetAsTimestamp(.F.))
loDt.AddSeconds(-300)

loXmlToSign.UpdateAttrAt("soapenv:Body",.T.,"wsu:Id","id-4A13D668E59AAC4F38167508249655911")
loXmlToSign.UpdateAttrAt("soapenv:Body",.T.,"xmlns:wsu","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd")
loXmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",.T.,"Context","RC-302613de-a809-46b5-931a-0a55bfca5937")
loXmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",.T.,"xmlns:auth","http://docs.oasis-open.org/wsfed/authorization/200706")
loXmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",.T.,"xmlns:ds","http://www.w3.org/2000/09/xmldsig#")
loXmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",.T.,"xmlns:wsa","http://schemas.xmlsoap.org/ws/2004/08/addressing")
loXmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",.T.,"xmlns:wsp","http://schemas.xmlsoap.org/ws/2004/09/policy")
loXmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",.T.,"xmlns:wsse","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd")
loXmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken",.T.,"xmlns:wst","http://docs.oasis-open.org/ws-sx/ws-trust/200512")
loXmlToSign.UpdateChildContent("soapenv:Body|wst:RequestSecurityToken|wst:TokenType","http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1")
loXmlToSign.UpdateChildContent("soapenv:Body|wst:RequestSecurityToken|wst:RequestType","http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue")

llSuccess = loXmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken|wst:Claims",.T.,"Dialect","http://docs.oasis-open.org/wsfed/authorization/200706/authclaims")
llSuccess = loXmlToSign.UpdateAttrAt("soapenv:Body|wst:RequestSecurityToken|wst:Claims|auth:ClaimType[1]",.T.,"Uri","urn:be:fgov:ehealth:1.0:certificateholder:person:ssin")

loXmlToSign.UpdateChildContent("soapenv:Body|wst:RequestSecurityToken|wst:KeyType","http://docs.oasis-open.org/ws-sx/wstrust/200512/PublicKey")

loGen = createobject("CkXmlDSigGen")

loGen.SigLocation = "soapenv:Envelope|soapenv:Header|wsse:Security|wsse:BinarySecurityToken"
loGen.SigLocationMod = 1
loGen.SigId = "SIG-4A13D668E59AAC4F38167508249656212"
loGen.SigNamespacePrefix = "ds"
loGen.SigNamespaceUri = "http://www.w3.org/2000/09/xmldsig#"
loGen.SignedInfoPrefixList = "soapenv urn urn1"
loGen.IncNamespacePrefix = "ec"
loGen.IncNamespaceUri = "http://www.w3.org/2001/10/xml-exc-c14n#"
loGen.SignedInfoCanonAlg = "EXCL_C14N"
loGen.SignedInfoDigestMethod = "sha256"

// Set the KeyInfoId before adding references..
loGen.KeyInfoId = "KI-4A13D668E59AAC4F3816750824965589"

// -------- Reference 1 --------
loGen.AddSameDocRef("TS-4A13D668E59AAC4F3816750824965567","sha256","EXCL_C14N","wsse soapenv urn urn1","")

// -------- Reference 2 --------
loGen.AddSameDocRef("id-4A13D668E59AAC4F38167508249655911","sha256","EXCL_C14N","urn urn1","")

// -------- Reference 3 --------
loGen.AddSameDocRef("X509-4A13D668E59AAC4F3816750824965588","sha256","EXCL_C14N","_EMPTY_","")

loGen.SetX509Cert(loCert,.T.)

loGen.KeyInfoType = "Custom"

// Create the custom KeyInfo XML..
loXmlCustomKeyInfo = createobject("CkXml")
loXmlCustomKeyInfo.Tag = "wsse:SecurityTokenReference"
loXmlCustomKeyInfo.AddAttribute("wsu:Id","STR-4A13D668E59AAC4F38167508249655810")
loXmlCustomKeyInfo.UpdateAttrAt("wsse:Reference",.T.,"URI","#X509-4A13D668E59AAC4F3816750824965588")
loXmlCustomKeyInfo.UpdateAttrAt("wsse:Reference",.T.,"ValueType","http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3")

loXmlCustomKeyInfo.EmitXmlDecl = .F.
loGen.CustomKeyInfoXml = loXmlCustomKeyInfo.GetXml()

// Load XML to be signed...
loSbXml = createobject("CkStringBuilder")
loXmlToSign.GetXmlSb(loSbXml)

loGen.Behaviors = "IndentedSignature"

// Sign the XML...
llSuccess = loGen.CreateXmlDSigSb(loSbXml)
if (llSuccess <> .T.) then
    ? loGen.LastErrorText
    release loCert
    release loXmlToSign
    release loBdCert
    release loDt
    release loGen
    release loXmlCustomKeyInfo
    release loSbXml
    return
endif

// The sbXml is sent as the HTTP request body below..
? loSbXml.GetAsString()

// -----------------------------------------------------------------------------------------------------------
// Send the SOAP requet to ask the server to issue a security token, which can then be used to access other SOAP services..
loHttp = createobject("CkHttp")

llSuccess = loHttp.SetSslClientCert(loCert)
if (llSuccess = .F.) then
    ? loHttp.LastErrorText
    release loCert
    release loXmlToSign
    release loBdCert
    release loDt
    release loGen
    release loXmlCustomKeyInfo
    release loSbXml
    release loHttp
    return
endif

loHttp.SetRequestHeader("Content-Type","text/xml")

lcUrl = "https://services-acpt.ehealth.fgov.be/IAM/SecurityTokenService/v1/RequestSecurityToken"
loResp = loHttp.PostXml(lcUrl,loSbXml.GetAsString(),"utf-8")
if (loHttp.LastMethodSuccess = .F.) then
    ? loHttp.LastErrorText
    release loCert
    release loXmlToSign
    release loBdCert
    release loDt
    release loGen
    release loXmlCustomKeyInfo
    release loSbXml
    release loHttp
    return
endif

lnResponseStatus = loResp.StatusCode
? "Response Status Code = " + str(lnResponseStatus)

// You'll want to check to see if the response status code = 200.
// If not, then the response body contains error information instead of a security token.
// This example will assume we received 200 status code.

? loResp.BodyStr

// The response body contains XML like this:

// <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/">
//     <SOAP-ENV:Header/>
//     <SOAP-ENV:Body>
//         <wst:RequestSecurityTokenResponse xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512" Context="RC-302613de-a809-46b5-931a-0a55bfca5937">
//             <wst:RequestedSecurityToken>
//                 <Assertion xmlns="urn:oasis:names:tc:SAML:1.0:assertion" AssertionID="_3e8ea5c951b2167c274974750ace9b5d" 
// ...
//                 </Assertion>
//             </wst:RequestedSecurityToken>
//         </wst:RequestSecurityTokenResponse>
//     </SOAP-ENV:Body>
// </SOAP-ENV:Envelope>

// The portion of the response from  <Assertion ..> ... </Assertion>  is the SAML security token to be included
// in a subsesquent SOAP request.  It is extremely important to not modify the contents of the security token in any way, including not changing
// whitespace or any formatting.  Therefore, we get the response body exactly as-is, to be used in a SOAP request.

// Copy the response body to a Chilkat BinData object.
loBdSecToken = createobject("CkBinData")
loResp.GetBodyBd(loBdSecToken)

release loResp

// Let's save the bdSecToken to a file, and pick it up in the next example where it is used
// in a SOAP request, such as in this example:  AddressBook Search for Professionals

loBdSecToken.WriteFile("qa_data/tokens/ehealth-fgov-be-sectoken.xml")

? "OK"


release loCert
release loXmlToSign
release loBdCert
release loDt
release loGen
release loXmlCustomKeyInfo
release loSbXml
release loHttp
release loBdSecToken

 

© 2000-2024 Chilkat Software, Inc. All Rights Reserved.