Request receiver [Settings]

Draft 13 WS-Security binding for the consumption of inbound requests from the caller.

To view this pane in the console, click the following path:

Service integration > Web services > WS-Security bindings > request-receiver-binding_name .

This panel is one of a set of panels that allow you to configure the service integration bus in accordance with WS-Security Draft 13 (also known as the Web Services Security Core Specification). However, use of WS-Security Draft 13 is deprecated, and you should only use it to enable inter-operation between applications running in WebSphere® Application Server Version 5.1 and , or to allow continued use of an existing Web services client application that has been written to the WS-Security Draft 13 specification.

Configuration tab

The Configuration tab shows configuration properties for this object. These property values are preserved even if the runtime environment is stopped then restarted. See the information center task descriptions for information about how to apply configuration changes to the runtime environment.

General Properties

WS-Security version

Identifies the version of the WS-Security specification this configuration uses.

Required No
Data type Text

Binding Type

The type of binding. This is one of request consumer, request generator, response consumer and response generator.

Required No
Data type Text

Name

The name of the binding.

Required Yes
Data type Text

Additional Properties

Signing information
Specifies the configuration for the signing parameters. You also can use these parameters for X.509 certificate validation when the authentication method is IDAssertion and the ID type is X509Certificate in the server-level configuration. In such cases, only fill in the Certificate path field.
Encryption information
Specifies the configuration for the XML encryption and decryption parameters. If the data and key encryption algorithms are specified, the application server only accepts elements that are encrypted with those algorithms.
Trust anchors
Specifies a list of keystore configurations that contain root-trusted certificates. These configurations are used for certificate path validation of the incoming X.509-formatted security tokens. You must create the keystore using the key tool utility. Do not use the key management utility because it does not create a keystore with the expected format.
Collection certificate store
Specifies a list of untrusted, intermediate certificate files. This collection certificate store is used for certificate path validation of incoming X.509-formatted security tokens. The root-trusted certificates are specified in the Trust anchors panel.
Key locators
Specifies a list of key locator configurations that retrieve the key for signature and encryption. You can customize a key locator class to retrieve keys from other types of repositories. The default implementation retrieves keys from a keystore.
Trusted ID evaluators
Specifies a list of trusted identity (ID) evaluators that determine whether the identity-asserting authority is trusted. You can use trusted ID evaluators for backward compatibility with Version 5 applications. However, it is recommended that you use a login module instead.
Login mappings
Specifies a list of configurations for validating security tokens within incoming messages.


Terms of Use | Feedback

Last updated: Oct 21, 2010 10:04:34 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=compass&product=was-nd-mp&topic=SIBWSSecurityRequestReceiverBindingConfig_DetailForm
File name: SIBWSSecurityRequestReceiverBindingConfig_DetailForm.html