Default Web services security configuration

WebSphere® Application Server Version 6 provides a variety of sample configurations that you can configure through the WAS administrative console. The configurations that you specify are reflected on the cell or server level. Do not use these configurations in a production environment as they are for sample and testing purposes only. To make modifications to these sample configurations, it is recommended that you use the administrative console provided by WAS.

For a Web services security-enabled application, correctly configure a deployment descriptor and a binding. In WAS Version 6, one set of default bindings is shared by the applications to make application deployment easier. The default binding information for server level can be overridden by the binding information on the application level. The Application Server searches for binding information for an application on the application level before searching the server level.

This article contains information on the sample default bindings, keystores, key locators, collection certificate store, trust anchors, and trusted ID evaluators.

 

Default generator binding

WAS Version 6 provides a sample set of default generator binding. The default generator binding contain both signing information and encryption information.

The sample signing information configuration is called gen_signinfo and contains the following configurations:

The sample encryption information configuration is called gen_encinfo and contains the following configurations:

 

Default consumer binding

WAS Version 6 provides a sample set of default consumer binding. The default consumer binding contain both signing information and encryption information.

The sample signing information configuration is called con_signinfo and contains the following configurations:

The encryption information configuration is called con_encinfo and contains the following configurations:

 

Sample keystore configurations

WAS provides the following keystores. You can work with these keystores outside of the Application Server by using the iKeyman utility or the key tool.

The iKeyman utility is located in the following directories:

The key tool is located in the following directories:

The following sample keystores are for testing purposes only; do not use these keystores in a production environment:

 

Sample key locators

Key locators

Key locators are used to locate the key for digital signature, encryption, and decryption. For information on how to modify these sample key locator configurations, see the following articles:

SampleGeneratorSignatureKeyStoreKeyLocator

This key locator is used by generator to sign the SOAP message. The signing key name is SOAPRequester, which is referenced in the signing information as the signing key name. It is configured to use the ${USER_INSTALL_ROOT}/etc/ws-security/samples/dsig-sender.ks keystore and the com.ibm.wsspi.wssecurity.keyinfo.KeyStoreKeyLocator keystore key locator.

SampleConsumerSignatureKeyStoreKeyLocator

This key locator is used by the consumer to verify the digital signature in the SOAP message. The signing key is SOAPProvider, which is referenced in the signing information as the signing key name. It is configured to use the ${USER_INSTALL_ROOT}/etc/ws-security/samples/dsig-receiver.ks keystore and the com.ibm.wsspi.wssecurity.keyinfo.KeyStoreKeyLocator keystore key locator.

SampleGeneratorEncryptionKeyStoreKeyLocator

This key locator is used by the generator to encrypt the SOAP message. It is configured to use the ${USER_INSTALL_ROOT}/etc/ws-security/samples/enc-sender.jceks keystore and the com.ibm.wsspi.wssecurity.keyinfo.KeyStoreKeyLocator keystore key locator.

SampleConsumerEncryptionKeyStoreKeyLocator

This key locator is used by the consumer to decrypt an encrypted SOAP message. It is configured to use the ${USER_INSTALL_ROOT}/etc/ws-security/samples/enc-receiver.jceks keystore and the com.ibm.wsspi.wssecurity.keyinfo.KeyStoreKeyLocator keystore key locator.

SampleX509TokenKeyLocator

This key locator is used by the consumer to verify a digital certificate in an X.509 certificate. It is configured to use the ${USER_INSTALL_ROOT}/etc/ws-security/samples/enc-receiver.jceks keystore and the com.ibm.wsspi.wssecurity.keyinfo.KeyStoreKeyLocator keystore key locator.

 

Sample collection certificate store

Collection certificate stores are used to validate the certificate path. For information on how to modify this sample collection certificate store, see the following articles:

SampleCollectionCertStore

This collection certificate store is used by the response consumer and the request generator to validate the signer certificate path.

 

Sample trust anchors

Trust anchors are used to validate the trust of the signer certificate. For information on how to modify the sample trust anchor configurations, see the following articles:

 

Sample trusted ID evaluators

Trusted ID evaluators are used to establish trust before asserting the identity in identity assertion. For information on how to modify the sample trusted ID evaluator configuration, see Configuring trusted ID evaluators on the server or cell level.

SampleTrustedIDEvaluator

This trusted ID evaluator uses the com.ibm.wsspi.wssecurity.id.TrustedIDEvaluatorImpl implementation. The default implementation of com.ibm.wsspi.wssecurity.id.TrustedIDEvaluator contains a list of trusted identities. This list is defined as properties with trustedId_* as the key and the value as the trusted identity.

Complete the following steps to define this information for the server level in the WAS administrative console:

  1. Click Servers > Application servers > server_name.

  2. Under Security, click Web services: Default bindings for Web services security.

  3. Under Additional properties, click Trusted ID evaluators > SampleTrustedIDEvaluator.

 

Related tasks

Configuring the key locator for the generator binding on the application level

Configuring the key locator for the consumer binding on the application level

Configuring the key locator on the server or cell level

Configuring the collection certificate store for the generator binding on the application level

Configuring the collection certificate store for the consumer binding on the application level

Configuring the collection certificate store on the server or cell-level bindings

Configuring trust anchors for the generator binding on the application level

Configuring trust anchors for the consumer binding on the application level

Configuring trust anchors on the server or cell level

Configuring trusted ID evaluators on the server or cell level