在您没有对用于发送请求的专用客户机的访问权时,通用服务客户机对于调试或测试服务很有用。可以设置服务的多种传输和安全配置、编辑请求参数以及发送附件。
成功调用请求后,其消息返回内容将添加到请求历史记录。您可以使用该功能来回顾不同时间生成的结果。
如果正在使用 IBM® Rational® Performance Tester 或 IBM Rational Service Tester for SOA Quality,可在请求历史记录中选择请求,并单击生成测试以生成将重放所有选定请求的测试。可编辑测试以将记录的测试值替换为可变测试数据,或对测试添加动态数据关联。还可在服务响应中针对 XML 文档的内容设置验证点。
The Java Runtime Environment (JRE) that the workbench uses must support the level of encryption required by the digital certificate that you select. For example, you cannot use a digital certificate that requires 256-bit encryption with a JRE that supports only 128-bit encryption. By default, the workbench is configured with restricted or limited strength ciphers. To use less restricted encryption algorithms, you must download and apply the unlimited jurisdiction policy files (local_policy.jar and US_export_policy.jar).
You can download unlimited jurisdiction policy files from this site: http://www.ibm.com/developerworks/java/jdk/security/50/
Click on IBM SDK Policy files, and then log in to developerWorks® to obtain the unlimited jurisdiction policy files. Before installing these policy files, back up the existing policy files in case you want to restore the original files later. Then overwrite the files in /jre/lib/security/ directory with the unlimited jurisdiction policy files.
Simple authentication (server authentication): In this case, the test client needs to determine whether the service can be trusted. You do not need to setup a key store. If you select the Always trust option, you do not need to provide a server certificat key store.
If you want to really authenticate the service, you can configure an certificate trust store, which contains the certificates of trusted services. In this case, the test will expect to receive a valid certificate.
Double authentication (client and server authentication): In this case, the service needs to authenticate the test client according to its root authority. You must provide the client certificate keystore that needs to be produced to authenticate the test as a certified client.
When recording a service test through a proxy, the recording proxy sits between the service and the client. In this case, you must configure the SSL settings of the recording proxy to authenticate itself as the actual service to the client (for simple authentication), and as the client to the service (for double authentication). This means that you must supply the recording proxy with the adequate certificates.
When using stub services, you can also configure the SSL settings of the stub service to authenticate itself as the actual server. This means that you must supply the service stub with the adequate certificate.
You can test services with digital certificates for both SSL and SOAP security protocol. Digital certificates must be contained in Java Key Store (JKS) keystore resources that are accessible in the workspace. When dealing with keystore files, you must set the password required to access the keys both in the security editor and the test editor. For SOAP security you might have to provide an explicit name for the key and provide a password to access the private keys in the keystore.
If you are deploying tests to agent computers, these files must also be added to the JRE that the IBM Agent Controller uses.
不支持数组。
由于缺少规范,Java 消息服务(JMS)传输不支持附件。包络直接使用 UTF-8 编码发送。
对于每个 Java 运行时环境 (JRE) 实施,所有安全算法不会始终可用。如果特定安全实施不可用,请将所需库添加到该产品使用的 JRE 的类路径。
通用服务测试程序按 XML 文档中所反应的情况显示包络。但是,安全算法将包络视为二进制代码。因此,您必须设置 SOAP 安全配置,以便使入局和出局消息能得以正确加密,但在测试内仍保持解密状态。
Microsoft .NET 传输协议不支持事务、作用域或双工方式请求,例如基于 MS-MQ 传输的回调或双向服务。