WebSphere WebSphere Application Server Network Deployment, Version 6.1.x Operating Systems: AIX, HP-UX, i5/OS, Linux, Solaris, Windows, z/OS

Getting WS-Security information from the owning parties

About this task
You get, from the owning parties, the WS-Security configurations for the client (in the case of an inbound service) and the target Web service (in the case of an outbound service). This information is found in the following files on the owners systems:
  • Key stores (.ks, .jks and .jceks files).
  • Certificate stores (.cer files).
  • Security settings (the ibm-webservicesclient-ext.xmi file for the client, and the ibm-webservices-ext.xmi file for the Web service).
  • Binding information - for example the location of a keystore file on the file system (the ibm-webservicesclient-bnd.xmi file for the client, and the ibm-webservices-bnd.xmi file for the Web service).

If the client is hosted on WebSphere Application Server, and the Web service security settings are created using IBM Web services tooling (for example Rational Application Developer), then the files that contain the security settings and binding information have the exact file names (*.xmi) noted previously. For clients and Web services from other vendors, these files have different file names.

You need to copy the key store and certificate store files to the WebSphere Application Server file system, and to enter and configure (as WS-Security bindings and configurations) the security settings that are contained in the .xmi files. There are tools available (for example Rational Application Developer) that can parse the .xmi files for you.

Related concepts
Service integration technologies and WS-Security
Related tasks
Securing Web services applications using JAX-RPC at the message level

Task topic

Terms of use | Feedback


Timestamp icon Last updated: 26 February 2009
http://publib.boulder.ibm.com/infocenter/wasinfo/v6r1/index.jsp?topic=/com.ibm.websphere.pmc.nd.multiplatform.doc/tasks/tjw_wss_getinfo.html

Copyright IBM Corporation 2004, 2009. All Rights Reserved.
This information center is powered by Eclipse technology. (http://www.eclipse.org)