+

Search Tips   |   Advanced Search

Set the signing information using JAX-RPC for the consumer binding on the application level


Configure the signing information for the server-side request consumer and the client-side response consumer bindings at the application level.

For transitioning users: For WAS version 6.x or earlier only, in the server-side extensions file and the client-side deployment descriptor extensions file, specify which parts of the message are signed.trns

Set the key information that is referenced by the key information references on the signing information panel within the admin console. WAS uses the signing information on the consumer side to verify the integrity of the received SOAP message by validating that the message parts are signed. Complete the following steps to configure the signing information for the server-side request consumer and client-side response consumer sections of the bindings files on the application level.

 

  1. Access the admin console.

    To access the admin console, enter http://localhost:port_number/ibm/console in your Web browser unless we have changed the port number.

  2. Click Applications > Application Types > WebSphere enterprise apps > application_name.

  3. Under Manage modules, click URI_name.

  4. Under WS-Security Properties we can access the signing information for the request generator and response generator bindings.

  5. Under Required properties, click Signing information.

  6. Click New to create a signing information configuration, click Delete to delete an existing configuration, or click the name of an existing signing information configuration to edit its settings.

    If creating a new configuration, enter a name in the Signing information name field.

  7. Select a signature method algorithm from the Signature method field.

    The signature method is the algorithm used to convert the canonicalized <SignedInfo> element in the binding file into the <SignatureValue> element. The algorithm specified for the consumer, which is either the request consumer or the response consumer configuration, must match the algorithm specified for the generator, which is either the request generator or response generator configuration. WAS supports the following pre-configured algorithms:

  8. Select a canonicalization method from the Canonicalization method field. The canonicalization method algorithm is used to canonicalize the <SignedInfo> element before it is incorporated as part of the digital signature operation. The canonicalization algorithm specified for the generator must match the algorithm for the consumer. WAS supports the following pre-configured algorithms:

  9. Select a key information signature type from the Key information signature type field. The key information signature type specifies how the <KeyInfo> element in the SOAP message is digitally signed. WAS supports the following signature types:

    None

    The key is not signed.

    Keyinfo

    The entire KeyInfo element is signed.

    Keyinfochildelements

    The child elements of the KeyInfo element are signed.

    If we do not specify one of the previous signature types, WAS uses keyinfo, by default. The key information signature type for the consumer must match the signature type for the generator.

  10. Under Additional properties, click Key information references.

    1. Click New to create a key information reference or click the name of an existing entry to edit its configuration. The Key information references panel is displayed.

    2. Enter a name in the Name field.

    3. Select a key information reference in the Key information reference field. This reference is the key information configuration name that specifies the key information used by this signing information configuration.

  11. Return to the Signing information panel. Under Additional properties, click Part references. On the Part references panel, we can specify references to the message parts defined in the deployment descriptor extensions file.

    1. Click New to create a new Part reference or click the name of an existing part reference to edit its configuration. The Part reference panel is displayed.

    2. Enter a name in the Part name field. This name is the name of the required integrity configuration in the deployment descriptor extensions file and specifies the message parts that must be digitally signed.

    3. Select a digest method algorithm from the Digest method algorithm field. WAS supports the following pre-configured algorithms:

      • http://www.w3.org/2000/09/xmldsig#sha1

      • http://www.w3.org/2001/04/xmlenc#sha256

      • http://www.w3.org/2001/04/xmlenc#sha512

      To specify a custom algorithm, configure the custom algorithm in the Algorithm URI panel before setting the digest method algorithm.

  12. Under Additional properties, click Transforms.

    1. Click New to create a new transform or click the name of an existing transform to edit its configuration.

    2. Enter a name in the Transform name field.

    3. Select a transform algorithm from the Transform algorithm field.

      WAS supports the following pre-configured algorithms:

      • http://www.w3.org/2001/10/xml-exc-c14n#

      • http://www.w3.org/TR/1999/REC-xpath-19991116

        Do not use this transform algorithm if we want the configured application to be compliant with the Basic Security Profile (BSP). Instead use http://www.w3.org/2002/06/xmldsig-filter2 to ensure compliance.

      • http://www.w3.org/2002/06/xmldsig-filter2

      • http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#STR-Transform

      • http://www.w3.org/2002/07/decrypt#XML

      • http://www.w3.org/2000/09/xmldsig#enveloped-signature

      The transform algorithm that you select for the consumer must match the transform algorithm that you select for the generator. For each part reference in the signing information, specify both a digest method algorithm and a transform algorithm.

  13. Click OK.

  14. Click Save at the top of the panel to save the configuration.

 

Results

After completing these steps, we have configured the signing information for the consumer.

 

Next steps

Specify a similar signing information configuration for the generator.


Key information references collection
Key information reference settings

 

Related concepts


Basic Security Profile compliance tips

 

Related tasks


Set the signing information using JAX-RPC for the generator binding on the application level
Set consumer signing using JAX-RPC to protect message integrity