Customizing signature and verification process.
Application may control XML Security Library behavior using
different context objects:
New context objects are created for each operation and could not be
reused. XML Security Library also uses context objects to store
temporary data and return additional information to the application.
Example 12. SAML signature validation.
|