WebSphere Application Server Network Deployment, Version 6.0.x   Operating Systems: AIX, HP-UX, Linux, Solaris, Windows
             [TIP: Focusing the table of contents and search results]

Adding a standalone timestamp in generator security constraints

You can specify a standalone timestamp when you configure the generator security constraints for either the request generator or the response generator. The request generator is configured for the client and the response generator is configured for the server.

Before you begin

Prior to completing this task, you must import your application into an assembly tool.

For information on how to import your application, see Importing enterprise applications.

About this task

The timestamp determines if the message is valid based upon the time that the message is sent by one machine and then received by another machine. Complete the following steps. You must configure either the client-side extensions in step 2 or the server-side extensions in step 3.

Procedure

  1. Start the assembly tool.
  2. Switch to the Java 2 Platform, Enterprise Edition (J2EE) perspective. Click Window > Open Perspective > J2EE.
  3. Optional: Locate the client-side extensions using the Project Explorer window. The Client Deployment Descriptor window is displayed. This Web service contains the extensions that you need to configure. Complete the following steps to locate the client-side extensions:
    1. Expand the Web Services > Client section and double-click the name of the Web service.
    2. Click the WS Extension tab and expand the Request Generator Configuration section.
  4. Optional: Locate the server-side extensions using the Project Explorer window. The Web Services Editor window is displayed. This Web service contains the extensions that you need to configure. Complete the following steps to locate the server-side extensions:
    1. Expand the Web Services > Services section and double-click the name of the Web service.
    2. Click the Extensions tab and expand the Response Generator Service Configuration Details section.
  5. Expand the Add Timestamp section and select the Use Add Timestamp option. When you select this option, a timestamp is added to the message that is sent.
  6. Specify an expiration time for the timestamp, which helps defend against replay attacks. Complete the following steps to configure the timestamp:
    1. Expand the Expires subsection within the Add Timestamp section.
    2. Select the Use Expires option.
    3. Specify an expiration time for the timestamp. The lexical representation for the duration is the [ISO 8601] extended format PnYnMnDTnHnMnS, where:
      P
      Precedes the date and time values.
      nY
      Represents the number of years in which the timestamp is in effect. Select a value from 0 to 99 years.
      nM
      Represents the number of months in which the timestamp is in effect. Select a value from 0 to 11 months.
      nD
      Represents the number of days in which the timestamp is in effect. Select a value from 0 to 30 days.
      T
      Separates the date and time values.
      nH
      Represents the number of hours in which the timestamp is in effect. Select a value from 0 to 23 hours.
      nM
      Represents the number of minutes in which the timestamp is in effect. Select a value from 0 to 59 minutes.
      nS
      Represents the number of seconds in which the timestamp is in effect. The number of seconds can include decimal digits to arbitrary precision. You can select a value from 0 to 59 for the seconds and from 0 to 9 for tenths of a second.

      For example, 1 year, 2 months, 3 days, 10 hours, and 30 minutes is represented as P1Y2M3DT10H30M. Typically, you might configure a message timestamp for between 10 and 30 minutes. For example, 10 minutes is represented as P0Y0M0DT0H10M0S.




Related tasks
Adding a nonce for integrity in generator security constraints with keywords
Signing message elements in generator security constraints with keywords
Signing message elements in generator security constraints with an XPath expression
Adding time stamps for integrity to generator security constraints with an XPath expression
Configuring Web services security while assembling Web services applications
Task topic    

Terms of Use | Feedback

Last updated: Mar 8, 2007 8:14:28 PM CST
http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/twbs_specstandtimegenbind.html

© Copyright IBM Corporation 2004, 2006. All Rights Reserved.
This information center is powered by Eclipse technology. (http://www.eclipse.org)