Encrypting message elements in consumer security constraints with keywords

You can specify which message parts to check for encryption when you configure the consumer security constraints for either the response consumer or the request consumer. The response consumer is configured for the client, and the request consumer is configured for the server.

Before you begin

Prior to completing this task, you must import your application into an assembly tool.

For information on how to import your application, see Importing enterprise applications.

About this task

Complete the following steps. You must configure either the client-side bindings in step 2 or the server-side bindings in step 3.

Procedure

  1. Start the assembly tool and click Window > Open Perspective > J2EE.
  2. Optional: Locate the client-side bindings using the Project Explorer window. The Client Deployment Descriptor window is displayed. This Web service contains the extensions that you must configure. Complete the following steps to locate the client-side bindings:
    1. Expand the Web Services > Client section and double-click the name of the Web service.
    2. Click the WS Extension tab and expand the Response Consumer Configuration section.
  3. Optional: Locate the server-side bindings using the Project Explorer window. The Web Services Editor window is displayed. This Web service contains the bindings that you must configure. Complete the following steps to locate the server-side bindings:
    1. Expand the Web Services > Services section and double-click the name of the Web service.
    2. Click the Extensions tab and expand the Request Consumer Service Configuration Details section.
  4. Expand the Required Confidentiality section. Confidentiality refers to encryption and integrity refers to digital signing. Confidentiality reduces the risk of someone intercepting the message as it moves across a network. With confidentiality specifications, the message is encrypted before it is sent and decrypted when it is received at the intended target. For more information on encryption, see XML encryption.
  5. Click Add to specify which parts of the message to check for encryption. The Required Confidentiality Dialog window is displayed. Complete the following steps to specify a configuration:
    1. Specify a name for the confidentiality element in the Required Confidentiality Name field.
    2. Specify a usage type in the Usage type field. This field specifies the requirement for the confidentiality element. The value of this attribute is either Required or Optional.
  6. Click Add under Message parts and select the message parts dialect. The http://www.ibm.com/websphere/webservices/wssecurity/dialect-was dialect specifies which message part to be checked for encryption using keywords. If you select this dialect, you can select one of the following keywords under Message parts keyword:
    bodycontent
    Specifies the user data portion of the message. If you select this keyword, the body is checked for encryption.
    usernametoken
    Specifies a username token that contains the basic authentication information such as a user name and a password. Usually, the username token is encrypted so that the user information is secure. If you select this keyword, the username token element is checked for encryption.
    digestvalue
    Specifies a unique digest value. When a part of the Simple Object Access Protocol (SOAP) message is signed, a unique digest value is created and is used by the receiving party to check the integrity of the message. You can encrypt the digestvalue element to secure the digest value. If you select this keyword, the digestvalue is checked for encryption.
    Note: You must have a matching configuration for the generator.
  7. Click OK to save your configuration.

What to do next

After you specify which message parts to check for encryption, you must specify which method is used to verify the encryption of the message parts. For more information, see Configuring encryption information for the consumer binding with an assembly tool.



In this information ...


IBM Redbooks, demos, education, and more

(Index)

Use IBM Suggests to retrieve related content from ibm.com and beyond, identified for your convenience.

This feature requires Internet access.

Task topic    

Terms of Use | Feedback

Last updated: Aug 29, 2010 9:31:45 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=vela&product=was-nd-mp&topic=twbs_specencryptkeyconsbind
File name: twbs_specencryptkeyconsbind.html