File name: uwbs_reqsend.html
Request sender binding collection
Use this page to specify the binding configuration to send request
messages for Web services security.
Important: There is an important distinction between Version 5.x and
Version 6 and later applications. The information in this article supports
Version 5.x applications only that are used with WebSphere Application
Server Version 6.0.x and later. The information does not apply to Version
6.0.x and later applications.
To view this administrative console page, complete the following steps:
- Click Applications > Enterprise applications > application_name.
- Click Manage modules > URI_file_name.
- Under Web Services Security Properties, click Web
services: Client security bindings.
- Under Request sender binding, click Edit.
Web services security namespace
Specifies the namespace that is used by Web services security to send a
request. However, this field configures the namespace value only and does
not enforce the semantics of the specification related to the namespace. Web
services security uses the processing semantic only in draft 13 of the OASIS
specification. The following schemas are available:
- http://schemas.xmlsoap.org/ws/2003/06/secext
- http://schemas.xmlsoap.org/ws/2002/07/secext
- http://schemas.xmlsoap.org/ws/2002/04/secext
- None
The namespace used by the response sender is based on the namespace of
the incoming message in the request receiver.
Signing information
Specifies the configuration for the signing parameters. Signing
information is used to sign and validate parts of the message including the
body and time stamp.
You can also use these parameters for X.509 validation when the Authentication
method is IDAssertion and the ID Type is X509Certificate,
in the server-level configuration. In such cases, you must fill in the Certificate
Path fields only.
Encryption information
Specifies the configuration for the encrypting and decrypting parameters.
Encryption information is used for encrypting and decrypting various parts
of a message, including the body and user name token.
Key locators
Specifies a list of key locator objects that retrieve the keys
for digital signature and encryption from a keystore file or a repository.
The key locator maps a name or a logical name to an alias or maps an authenticated
identity to a key. This logical name is used to locate a key in a key locator
implementation.
Login mappings
Specifies a list of configurations for validating tokens within
incoming messages.
Login mappings map the authentication method to the Java Authentication
and Authorization Service (JAAS) configuration.
To configure JAAS, complete the following steps:
- Click Security > Secure administration, applications, and infrastructure.
- Under the Java Authentication and Authorization Service field, select Application
logins or System logins.
|
