Before you begin
These two tabs are used to configure the Web services security extensions and the Web services security bindings, respectively.
Why and when to perform this task
Complete the following steps to specify which parts of the response message to encrypt when configuring the server for response encryption:
Steps for this task
A user name token does not appear in the response so you do not need to select this option for the response. If you select this option, make sure that you also select it for the client response receiver. If you do not select this option, make sure that you do not select it for the client response receiver.
What to do next
After you specify which message parts to encrypt, you must specify which method to use message encryption. See Configuring the server for response encryption: choosing the encryption method for more information.Related concepts
XML encryption
Response sender
Related tasks
Configuring the server for response encryption: choosing the encryption
method
Configuring key locators using an assembly tool
Configuring key locators using the administrative console
Configuring the server security bindings using an assembly tool
Configuring the server security bindings using the administrative console