Network Deployment (Distributed operating systems), v8.0 > Reference > Sets


Required security token [Settings]

Specifies accepted stand-alone security tokens within a consumed message. Stand-alone security tokens are those not already used for signature or encryption. Defining a required security token means that messages containing a token of that type will be processed according to the usage assertion. The security token will not be used for authentication unless it is also specified within a caller.

Service integration -> Web services -> WS-Security configurations -> v1-inbound-config_name -> [Request consumer] Required Security Token -> required-security-token_name .


Configuration tab

These property values are preserved even if the runtime environment is stopped then restarted.


General Properties



Name

The name of the security token.

Required Yes
Data type String


URI

Namespace URI of the security token.

This is the namespace Uniform Resource Identifier (URI) of the security token within the consumed message.

If you specify a Username token or X.509 certificate security token, you do not have to specify a URI. If you specify a custom token, enter the URI of the QName for the value type. If you specify Lightweight Third Party Authentication (LTPA), enter the following WAS predefined value type URI: http://www.ibm.com/websphere/appserver/tokentype/5.0.2. If you specify Lightweight Third Party Authentication propagation (LTPA_PROPAGATION), enter the following WAS predefined value type URI: http://www.ibm.com/websphere/appserver/tokentype.

Required No
Data type String


Local name

Local name of the security token.

WAS has the following predefined local name types:

Username token

X509 certificate token

# X509 certificates in a PKIPath

A list of X509 certificates and CRLs in a PKCS#7

LTPA

For Lightweight Third Party Authentication, the local name type is LTPA.

LTPA_PROPAGATION

For Lightweight Third Party Authentication token propagation, the local name type is LTPA_PROPAGATION.

Attention:

Required Yes
Data type String


Usage

Indicates the assertion of the required security token constraint.

Required Yes
Data type drop-down list
Range

Optional

Both messages that meet or do not meet the required integrity constraint are accepted.

Required

The required integrity constraint must be met by the incoming message.


Administrative console buttons
Administrative console preferences

+

Search Tips   |   Advanced Search