Contents

  • 1 Overview
    • 1.1 Stakeholders
    • 1.2 Project Plan
      • 2 Documentation
        • 2.1 Architecture
        • 2.2 Specifications
        • 2.3 Implementation Guides
          • 3 Reference Implementations
            • 3.1 Services
            • 3.2 Data Bindings
            • 3.3 Test Clients
              • 4 Examples

Overview

Stakeholders

Milwaukee CountyDane CountyWaukesha CountyKenosha County
WarrantsXX
Protection OrdersXXX

Project Plan

Documentation

Architecture

Architecture diagram

Specifications

Service Definitions (WSDLs)

WarrantService http://www.wijiscommons.org/warrants/wsdl/WarrantService.wsdl
ProtectionOrderService http://www.wijiscommons.org/warrants/wsdl/ProtectionOrderService.wsdl

Message Schemas (XSDs)

Message NameXSDZIP
WarrantIssue v1.3 (2009-03-04; current)
v1.2 (2008-06-23)
v1.1 (2007-09-10)
v1.0 (2007-01-29)
WarrantSchemas_1.3.zip
WarrantSchemas_1.2.zip
WarrantSchemas_1.1.zip
WarrantSchemas_1.0.zip
WarrantResponse v1.2 (2009-03-04; current)
v1.2 (2008-06-23)
v1.1 (2007-09-10)
v1.0 (2007-01-29)
WarrantService v1.3 (2009-03-04; current)
v1.2 (2008-06-23)
v1.1 (2007-09-10)
v1.0 (2007-01-29)
ProtectionOrderIssue v1.3 (2009-03-04; current)
v1.2 (2008-06-23)
v1.1 (2007-10-19)
v1.0 (2007-03-30)
ProtectionOrderSchemas_1.3.zip
ProtectionOrderSchemas_1.2.zip
ProtectionOrderSchemas_1.1.zip
ProtectionOrderSchemas_1.0.zip
ProtectionOrderResponse v1.3 (2009-03-04; current)
v1.2 (2008-06-23)
v1.1 (2007-10-19)
v1.0 (2007-03-30)
ProtectionOrderService v1.3 (2009-03-04; current)
v1.2 (2008-06-23)
v1.1 (2007-10-19)
v1.0 (2007-03-30)

N.B. This table only references the top-level message XSD. The full set of GJXDM XSD can be found in the ZIP file or by traversing the schemaLocation references.

Security Policy

Implementation Guides

Certificate and Secure Server Setup

The WIJIS security policy specifies that X.509 certificates be used for both client and server authentication. WIJIS has co-ordinated with the DA-IT agency to provide certificate authority (CA) support for exchange partners. You can use the following step-by-step guides for acquiring and installing X.509 authentication certificates:
Step-by-step instructions for creating Warrant and/or Protection Order web service for the Microsoft .NET platform.

WarrantsProtectionOrderService_step_by_step.doc

Reference Implementations


Services

Revised (03-16-2009) .NET implementation of warrant and protection order sevices combined: warrant-po.zip
WarrantServiceJava.NET
Service Interface Warrant.java WarrantServiceInterfaces.cs
(autogenerated using wsdl.exe)
Service Implementation WarrantServiceImpl.java Service.cs
(autogenerated using wsdl.exe)
Helper Classes WarrantServiceHelperMethodsIssue.java
WarrantServiceHelperMethodsResponse.java
HelperMethods.cs
ApplicationEventLog.cs
Project Archive Eclipse project ZIP archive

ProtectionOrderServiceJava.NET
Service Interface ProtectionOrder.java ProtectionOrderServiceInterfaces.cs
(autogenerated using wsdl.exe)
Service Implementation ProtectionOrderServiceImpl.java Service.cs
(autogenerated using wsdl.exe)
Helper Classes ProtectionOrderServiceHelperMethodsIssue.java
ProtectionOrderServiceHelperMethodsResponse.java
HelperMethods.cs
ApplicationEventLog.cs
Project Archive Eclipse project Zip archive

Data Bindings

Example ANT build file for generating JAXB bindings from the message schemas and XFire clients from the WSDLs.

Test Clients

Java.NETPython
Simple Client for Warrant and Protection
Order Services hosted by WIJIS
Simple Client for Warrant and Protection
Order Services hosted by Agencies
exampleClientScript.py

Examples

Sample SOAP Messages:

warrantIssue.xml
warrantResponse.xml
warrantService.xml
protectionOrderIssue.xml
protectionOrderResponse.xml
protectionOrderService.xml

An additional collection of Warrant/PO issue messages sent from the CCAP test queues: samples.zip