Before you begin
Prior to completing these steps, read either of the following topics to become familiar with the Security Extensions tab and the Binding Configurations tab in the Web Services Editor within the WebSphere Application Server Toolkit: These two tabs are used to configure the Web services security extensions and the Web services security bindings, respectively.Why and when to perform this task
Complete the following steps to specify which digital signature method to use when configuring the server for response signing:Steps for this task
The following table describes the purpose of this information. Some of these definitions are based on the XML-Signature specification, which is located at the following address: http://www.w3.org/TR/xmldsig-core .
Name | Purpose |
---|---|
Canonicalization method algorithm | Canonicalizes the <SignedInfo> element before the information is digested as part of the signature operation. Use the same algorithm on the client response receiver. The algorithm selected for the server response sender configuration must match the algorithm selected in the client response receiver configuration. |
Digest method algorithm | Applies to the data after transforms are applied, if specified, to yield the <DigestValue> element. Signing the <DigestValue> binds resource content to the signer key. The algorithm selected for the server response sender configuration must match the algorithm selected in the client response receiver configuration. |
Signature method algorithm | Converts the canonicalized <SignedInfo> element into the <SignatureValue> element. The algorithm selected for the server response sender configuration must match the algorithm selected in the client response receiver configuration. |
Signing key name | Represents the key entry associated with the signing key locator. The key entry refers to an alias of the key, which is found in the key store and is used to sign the request. |
Signing key locator | Represents a reference to a key locator implementation class that locates the correct key store where the alias and certificate exists. For more information on configuring key locators, see any of the following files: |
Results
You have specified which method is used to digitally sign a message when the server sends a message to a client.What to do next
After you configure the server to digitally sign the response message, you must configure the client to verify the digital signature contained in the response message. See Configuring the client for response digital signature verification: Verifying the message parts for more information.