Validating xml without namespace
One countermeasure to the increased number of threats is to follow best practices, including a simplification of use of XML Signature where possible.This usually includes verifying information in the certificate such as the expiration date, the purpose of the certificate, checking that it is not revoked, etc.Key Validation is typically more than a library implementation issue, and often involves the incorporation of application specific information.This article is described based on DB2 9.7 for Linux®, UNIX® and Windows®.
This content is no longer being updated or maintained.
How that transform is implemented is then out of scope for the signature protocol - a named transform can very well be built in XSLT.
Validating xml without namespace comments