Use this page to define the mapping of a logical name to a key
alias in a keystore file.
To view this administrative console page for the key locator collection
on the server level, complete the following steps:
- Click server_name.
- Under Security, click JAX-WS and JAX-RPC security runtime.
Mixed-version environment: In a mixed node cell with a server using Websphere Application
Server version 6.1 or earlier, click
Web services: Default bindings
for Web services security.
mixv
- Under JAX-RPC Default generator bindings, click Token Generators > token_generator_name.
- Under Additional properties, click Callback handler > Keys.
- Specify a new key configuration by clicking New or by clicking
the key configuration name to modify the settings.
Keys are also available by clicking
Key locators > key_locator_name.
Under Additional properties, click
Keys > New.
To use this administrative console page for the key locator collection
on the application level, complete the following steps:
- Click application_name.
- Under Modules, click Manage modules > URI_name.
Under Additional properties, you can access key locators
for the following bindings:
- For the Request generator, click Web services: Client security bindings.
Under Request generator (sender) binding, click Edit custom > Key locators.
Under Additional properties, click Keys.
- For the Request consumer, click Web services: Server security bindings.
Under Request consumer (receiver) binding, click Edit custom > Key locators.
Under Additional properties, click Keys.
- For the Response generator, click Web services: Server security bindings.
Under Response generator (sender) binding, click Edit custom > Key locators.
Under Additional properties, click Keys.
- For the Response consumer, click Web services: Client security bindings.
Under Response consumer (receiver) binding, click Edit custom > Key
locators. Under Additional properties, click Keys.
- Under Web Services Security Properties, you can access key locators for
the following bindings:
- For the Request sender, click Web services: Client security bindings.
Under Request sender binding, click Edit > Key locators. Under Additional
properties, click Keys.
- For the Request receiver, click Web services: Server security bindings.
Under Request receiver binding, click Edit > Key locators. Under
Additional properties, click Keys.
- For the Response sender, click Web services: Server security bindings.
Under Response sender binding, click Edit > Key locators. Under
Additional properties, click Keys.
- For the Response receiver, click Web services: Client security bindings.
Under Response receiver binding, click Edit > Key locators. Under
Additional properties, click Keys.
- Specify a new key configuration by clicking New or by clicking
the key configuration name to modify the settings.
Specifies the name of the key object. For digital signatures, the
key name is used by the request sender or request generator signing information
to determine which key is used to digitally sign the message. For encryption,
the key name is used to determine the key used for encryption.
The key name must be a fully qualified, distinguished name. For example, CN:Bob,O=IBM,C=US.
Note: If you enter the distinguished name with spaces before or after commas
and equal symbols, the application server normalizes the distinguished names
automatically during run time by removing these extra spaces.