Response generator (sender) binding configuration settings
Use this page to specify the binding configuration for the response generator or response sender.
- Click .
- Click Manage modules.
- Click the Uniform Resource Identifier (URI).
- Under Web Services Security Properties, click Web services: Server security bindings.
- Under Response generator (sender) binding, click Edit custom.
根據啟用安全時所指派的安全角色而定,您可能會有建立或編輯配置資料之文字輸入欄位或按鈕的存取權。 請檢閱管理角色說明文件,以進一步瞭解應用程式伺服器的有效角色。
The security constraints or bindings are defined using the application assembly process before the application is installed.
An assembly tool is not available on the z/OS® platform.
If the security constraints are defined in the application, you must either define the corresponding binding information or select the Use defaults option on this panel and use the default binding information for the cell level or the server-level. The default binding that is provided by this product is a sample. Do not use this sample in a production environment without modifying the configuration. The security constraints define what is signed or encrypted in the Web Services Security message. The bindings define how to enforce the requirements.
Digital signature security constraint (integrity)
The following table shows the required and optional binding information when the digital signature security constraint (integrity) is defined in the deployment descriptor.
Information type | Required or optional |
---|---|
Signing information | Required |
Key information | Required |
Key locators | Optional |
Collection certificate store | Optional |
Token generator | Optional |
Properties | Optional |
You can use the key locators and the collection certificate store that are defined at either the cell level or the server-level.
Encryption constraint (confidentiality)
The following table shows the required and optional binding information when the encryption constraint (confidentiality) is defined in the deployment descriptor.
Information type | Required or optional |
---|---|
Encryption information | Required |
Key information | Required |
Key locators | Optional |
Collection certificate store | Optional |
Token generator | Optional |
Properties | Optional |
You can use the key locators and the collection certificate store that are defined at either the cell level or the server-level.
Security token constraint
The following table shows the required and optional binding information when the security token constraint is defined in the deployment descriptor.
Information type | Required or optional |
---|---|
Token generator | Required |
Collection certificate store | Optional |
Properties | Optional |
You can use the collection certificate store that is defined at either the cell level or the server-level.
Use defaults
Select this option if you want to use the default binding information from the cell or server level.
If you select this option, the application server checks for binding information on the server level. If the binding information does not exist on the server level, the application server checks the cell level.
Port
Specifies the port number in the web service that is defined during application assembly.
Web service
Specifies the name of the web service that is defined during application assembly.