Configure the server for response signing: digitally signing message parts

 

Before you begin

Important distinction between V5.x and v6.x applications

Note: The information in this article supports v5.x applications only that are used with WAS v6.x. The information does not apply to v6.0.x applications.

Prior to completing these steps, read either of the following topics to become familiar with the Extensions tab and the Binding configurations tab in the Web services editor within an assembly tool such as the Application Server Toolkit or Rational Web Developer:

These two tabs are used to configure the Web services security extensions and the Web services security bindings, respectively.

 

Overview

Complete the following steps to specify which message parts to digitally sign when configuring the server for response signing:

 

Procedure

  1. Launch an assembly tool. For more information on the assembly tools, see Assembly tools

  2. Click Windows > Open perspective > Other > J2EE.

  3. Click EJB Projects > application _name >ejbModule > META-INF

  4. Right-click the webservices.xml file and click Open with > Web services editor.

  5. Click the Extensions tab, which is located at the bottom of the Web Services Editor within the assembly tool.

  6. Expand Response sender service configuration details > Integrity. Integrity refers to digital signature while confidentiality refers to encryption. Integrity decreases the risk of data modification while the data is transmitted across the Internet. For more information on digitally signing SOAP messages, see XML digital signature.

  7. Indicate the parts of the message to sign by clicking Add, and selecting Body, Timestamp, or Securitytoken.

    The following list contains descriptions of the message parts:

    Body

    The body is the user data portion of the message.

    Timestamp

    The time stamp determines if the message is valid based on the time that the message is sent and then received. If timestamp if selected, proceed to the next step and click Add Created Time Stamp, which indicates that the time stamp is added to the message.

    Securitytoken

    The security token is used for authentication. If this option is selected, the authentication information is added to the message.

  8. Optional: Expand the Add created time stamp section. Select this option if you want a time stamp added to the message. You can specify an expiration time for the time stamp, which helps defend against replay attacks. The lexical representation for duration is the ISO 8601 extended format, PnYnMnDTnHnMnS, where:

    • nY represents the number of years.

    • nM represents the number of months.

    • nD represents the number of days.

    • T is the date and time separator.

    • nH represents the number of hours.

    • nM represents the number of minutes.

    • nS represents the number of seconds. The number of seconds can include decimal digits to arbitrary precision.

    For example, to indicate a duration of 1 year, 2 months, 3 days, 10 hours, and 30 minutes, the format is: P1Y2M3DT10H30M. Typically, you configure a message time stamp for about 10 to 30 minutes. 10 minutes is represented as: P0Y0M0DT0H10M0S. The P character precedes time and date values.

 

Result

Important: If you configure the client and server signing information correctly, but receive a Soap body not signed error when executing the client, you might need to configure the actor. We can configure the actor in the following locations on the client in the Web Services Client Editor within the assembly tool:

  • Click Security extensions > Client service configuration details and indicate the actor information in the Actor URI field.

  • Click Security extensions > Request sender configuration > Details and indicate the actor information in the Actor field.

You must configure the same actor strings for the Web service on the server, which processes the request and sends the response back. Configure the actor in the following locations in the Web Services Editor within the WebSphere Application Server Toolkit:

  • Click Security extensions > Server service configuration.

  • Click Security extensions > Response sender service configuration details > Details and indicate the actor information in the Actor field.

The actor information on both the client and server must refer to the same exact string. When the actor fields on the client and server match, the request or response is acted upon instead of being forwarded downstream. The actor fields might be different when you have Web services acting as a gateway to other Web services. However, in all other cases, make sure that the actor information matches on the client and server. When Web services are acting as a gateway and they do not have the same actor configured as the request passing through the gateway, Web services do not process the message from a client. Instead, these Web services send the request downstream. The downstream process that contains the correct actor string processes the request. The same situation occurs for the response. Therefore, it is important that you verify that the appropriate client and server actor fields are synchronized. You have specified which message parts to digitally sign when the server sends a response to the client.

 

What to do next

After you specifying which message parts to digitally sign, specify which method is used to digitally sign the message. See Configuring the server for response signing: choosing the digital signature method for more information.


 

See Also


XML digital signature
Response sender
Response receiver

 

Related Tasks


Securing Web services for v5.x applications using XML digital signature
Configuring the client security bindings using an assembly tool
Configuring the server security bindings using an assembly tool
Configuring the server security bindings using the administrative console
Configuring the server for response signing: choosing the digital signature method
Configuring the client for response digital signature verification: verifying the message parts
Configuring the client for response digital signature verification: choosing the verification method