Configure the client for request encryption: Choosing the encryption method
Prior to completing these steps, read either of the following topics to familiarize yourself with the Security Extensions tab and the Port Binding tab in the Web Services Client Editor within the Assembly Toolkit...
- Configuring the client security bindings using the Assembly Toolkit
- Configuring the security bindings on a server acting as a client using the administrative console
These two tabs are used to configure the Web Services Security extensions and Web Services Security bindings, respectively.
Complete the following steps to specify which encryption method to use when configuring the client for request encryption...
- Launch the Assembly Toolkit.
- Open the J2EE perspective by clicking Window > Open Perspective > Other > J2EE.
- Select the Web services-enabled Enterprise JavaBean (EJB) or Web module.
- In the Project Navigator window, locate the META-INF directory for an EJB module or the WEB-INF directory for a Web module.
- Right-click the webservicesclient.xml file, and click Open With > Web Services Client Editor.
- Click the Port Binding tab, which is located at the bottom of the Web services client editor within the Assembly Toolkit.
- Expand Security Request Sender Binding Configuration > Encryption Information.
- Select an encryption option and click Edit to view the encryption information or click Add to add another option. The following table describes the purpose of this information. Some of these definitions are based on the XML-Encryption specification, which is located at the following Web address: http://www.w3.org/TR/xmlenc-core
Encryption name Refers to the name of the encryption information entry.
Data encryption method algorithm Encrypts and decrypts data in fixed size, multiple octet blocks.
Key encryption method algorithm Represents public key encryption algorithms that are specified for encrypting and decrypting keys.
Encryption key name Represents a Subject (Owner field of the certificate) from a public key certificate found by the encryption key locator, which is used by the key encryption method algorithm to encrypt the private key. The private key is used to encrypt the data.
The key chosen must be a public key of the target. Encryption must be done using the public key and decryption must be done by the target using the private key (the personal certificate of the target).
Encryption key locator Represents a reference to a key locator implementation class that locates the correct key store where the alias and the certificate exist. For more information on configuring key locators, see Configuring key locators using the Assembly Toolkit and Configuring key locators using the administrative console.
For more information, see Configuring key locators using the Assembly Toolkit and Configuring key locators using the Administrative Console.
You must specify which parts of the request message to encrypt. See Configuring the client for request encryption: Encrypting the message parts if you have not previously specified this information.
See AlsoRequest sender
Securing Web services using XML encryption
Configuring the client for request encryption: Encrypting the message parts
Configuring key locators using the Assembly Toolkit
Configuring key locators using the administrative console
XML Encryption Syntax and Processing W3C Recommendation 10 December 2002