Configure the server for request decryption: Decrypting the message parts
Complete this task to specify which parts of the request message must be decrypted by the server. You must know which parts of the request message the client encrypts because the server must decrypt the same message parts.Prior to completing these steps, read either of the following topics to become familiar with the Security Extensions tab and the Binding Configurations tab...
- Configuring the server security bindings using the Assembly Toolkit
- Configuring the server security bindings using the administrative console
These two tabs are used to configure the Web services security extensions and Web services security bindings, respectively.
- Launch the Assembly Toolkit.
- Open the J2EE perspective by clicking Window > Open Perspective > Other > J2EE.
- Select the Web services-enabled Enterprise JavaBean (EJB) or Web module.
- In the Project Navigator window, locate the META-INF directory for an EJB module or the WEB-INF directory for a Web module.
- Right-click the webservices.xml file, and click Open With > Web Services Editor.
- Click the Security Extensions tab, which is located at the bottom of the Web services editor within the Assembly Toolkit.
- Expand the Request Receiver Service Configuration Details > Required Confidentiality section.
- Select the parts of the message to decrypt.The message parts selected for the request decryption on the server must match the message parts selected for the message encryption on the client. Click Add and select either of the following message parts...
bodycontent The user data section of the message.
usernametoken This token is the basic authentication information.
After you specify which parts of the request message to decrypt, specify the method to use decrypt the message. See Configuring the server for request decryption: Choosing the decryption method for more information.
See AlsoRequest receiver
Configuring the server for request decryption: choosing the decryption method
Configuring key locators using the Assembly Toolkit
Configuring key locators using the administrative console
Configuring the server security bindings using the Assembly Toolkit
Configuring the server security bindings using the administrative console