Configure the client for response decryption: Decrypting the message parts

Prior to completing these steps, read either of the following topics to become familiar with the Security Extensions tab and the Port Binding tab in the Web Services Client Editor within the Assembly Toolkit...

These two tabs are used to configure the Web services security extensions and the Web services security bindings, respectively.

Complete the following steps to specify which response message parts to decrypt when configuring the client for response decryption. The server response encryption and client response decryption configurations must match.

  1. Launch the Assembly Toolkit.

  2. Open the J2EE perspective by clicking Window > Open Perspective > Other > J2EE.

  3. Select the Web services enabled EJB or Web module.

  4. In the Project Navigator window, locate the META-INF directory for an EJB module or the WEB-INF directory for a Web module.

  5. Right-click the webservicesclient.xml file, click here Open With > Web Services Client Editor.

  6. Click the Security Extensions tab, which is located at the bottom of the Web services client editor within the Assembly Toolkit.

  7. Expand the Response Receiver Configuration > Required Confidentiality section.

  8. Select the parts of the message that decrypt by clicking Add and selecting either Bodycontent or Usernametoken.The following information describes these message parts...

    Bodycontent The user data portion of the message.

    Usernametoken The basic authentication information, if selected.

    The information selected in this step is encrypted by the server in the response sender.

    Note that A username token is typically not sent in the response. Thus, you usually do not need to select username token.

After you specify which message parts to decrypt, specify which method to use when decrypting the response message. See Configuring the client for response decryption: Choosing a decryption method for more information.


See Also

Response receiver
XML encryption
Configuring the client for response decryption: Choosing a decryption method
Configuring the client security bindings using the Assembly Toolkit
Configuring the security bindings on a server acting as a client using the administrative console
Configuring key locators using the Assembly Toolkit
Configuring key locators using the administrative console