Use this page to specify the binding configuration to send request
messages for Web services security.
- Web services security namespace
-
Specifies the namespace used by Web services security to send a request.
However, this field configures the namespace value only and does not enforce
the semantics of the specification related to the namespace. Web services
security uses the processing semantic only in draft 13 of the OASIS specification.
The following schemas are available:
- http://schemas.xmlsoap.org/ws/2003/06/secext
- http://schemas.xmlsoap.org/ws/2002/07/secext
- http://schemas.xmlsoap.org/ws/2002/04/secext
- None
The namespace used by the response sender is based on the namespace of
the incoming message in the request receiver.
- Signing Information
- Specifies the configuration for the signing parameters. Signing
information is used to sign and validate parts of the message including the
body and time stamp.
You can also use these parameters for X.509 validation when the Authentication
Method is IDAssertion and the ID Type is X509Certificate in
the server-level configuration. In such cases, you must fill in the Certificate
Path fields only.
- Encryption Information
- Specifies the configuration for the encrypting and decrypting parameters.
Encryption information is used for encrypting and decrypting various parts
of a message including the body and user name token.
- Key Locators
- Specifies a list of key locator objects that retrieve the keys
for digital signature and encryption from a key store file or a repository.
The key locator maps a name or a logical name to an alias or maps an authenticated
identity to a key. This logical name is used to locate a key in a key locator
implementation.
- Login Mappings
- Specifies a list of configurations for validating tokens within
incoming messages.
Login mappings map the authentication method to the Java Authentication
and Authorization Service (JAAS) configuration.
To configure JAAS, use the administrative console and click Security
> JAAS Configuration.