First, you create the necessary policy subcomponents: the policy target, the rule, and the rule-combining algorithm.
首先,要创建必要的策略子组件:策略目标、规则和规则组合算法。
2
Signature: The policy signed with a hashing algorithm and base 64 encoded.
signature:采用哈希算法签名并采用base 64编码的策略。
3
The problem in this case was that the policy used different algorithm suites for the bootstrap message exchange with the Security Token service (STS) and the actual conversation with the service.
在这种情况下问题是,对于与Security Token Service (STS)的引导程序消息交换和与服务的实际会话,策略使用不同的算法套件。