Before you begin
Important distinction between Version 5.x and Version 6.0.x applications
Note: The
information in this article supports version 5.x applications only that are
used with WebSphere Application Server Version 6.0.x. The information does
not apply to version 6.0.x applications.
Prior to completing
these steps, read either of the following topics to familiarize yourself with
the WS Extensions tab and the WS Binding tab in the Client Deployment Descriptor
editor within an assembly tool:
These two tabs are used to configure the Web services security
extensions and Web services security bindings, respectively.
Why and when to perform this task
Complete the following steps to specify which encryption method
to use when configuring the client for request encryption:
Steps for this task
- Launch an assembly tool. For more information on the
assembly tools, see Assembly tools.
- Open the J2EE perspective by clicking Window > Open perspective
> Other > J2EE.
- Click Windows > Open perspective > Other > J2EE.
- Click Application Client Projects > application_name >
appClientModule > META-INF.
- Right-click the application-client.xml file, select Open
with > Deployment descriptor editor.
- Click the WS binding tab, which is located at the bottom of the
Client Deployment Descriptor editor within the assembly tool.
- Expand Security request sender binding configuration > Encryption
information.
- Select an encryption option and click Edit to view the encryption
information or click Add to add another option. The
following table describes the purpose of this information. Some of these definitions
are based on the XML-Encryption specification, which is located at the following
Web address: http://www.w3.org/TR/xmlenc-core
- Encryption name
- Refers to the name of the encryption information entry.
- Data encryption method algorithm
- Encrypts and decrypts data in fixed size, multiple octet blocks.
- Key encryption method algorithm
- Represents public key encryption algorithms that are specified for encrypting
and decrypting keys.
- Encryption key name
- Represents a Subject (Owner field of the certificate) from a public
key certificate found by the encryption key locator, which is used by the
key encryption method algorithm to encrypt the private key. The private key
is used to encrypt the data.
The key chosen must be a public key
of the target. Encryption must be done using the public key and decryption
must be done by the target using the private key (the personal certificate
of the target).
- Encryption key locator
- Represents a reference to a key locator implementation class that locates
the correct key store where the alias and the certificate exist. For more
information on configuring key locators, see Configuring key locators using an assembly tool and Configuring key locators using the administrative console.
- Optional: Select Show only FIPS Compliant Algorithms
if you only want the FIPS compliant algorithms to be shown in the Data
Encryption method algorithm and Key Encryption method algorithm drop-down
lists. Use this option if you expect this application to be run on a WebSphere
Application Server that has set the Use the Federal Information Processing
Standard (FIPS) option in the Global security panel of the
WebSphere Administrative Console.