Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Secure web services > Secure web services > Administer Web Services Security > Administer message-level security for JAX-RPC web services > Configure Web Services Security using JAX-RPC at the platform level
Configure trust anchors on the server or cell level
We can configure a list of keystore objects that contain trusted root certificates to be used for certificate path validation of incoming X.509-formatted security tokens.
Prior to completing the steps to configure trust anchors, create the keystore file using the key tool. WAS provides the key tool in the install_dir/java/jre/bin/keytool file. This task provides the steps that are needed to configure a list of keystore objects that contain trusted root certificates. These objects are used for certificate path validation of incoming X.509-formatted security tokens. Keystore objects within trust anchors contain trusted root certificates that are used by the CertPath API to determine whether to trust a certificate chain.
We can configure trust anchors on the server level and the cell level. In the following steps, use the first step to access the server-level default bindings and use the second step to access the cell-level bindings.
Procedure
- Access the default bindings for the server level.
- Click Servers > Server Types > WebSphere application servers > server_name
.
- Under Security, click JAX-WS and JAX-RPC security runtime.
Mixed-version environment: In a mixed node cell with a server using Websphere Application Server version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv
- Click Security > Web services to access the default bindings on the cell level.
- Under Additional properties, click Trust anchors.
- Click one of the following to work with trust anchor configuration:
- New
- To create a trust anchor configuration. Enter a unique name for the trust anchor in the Trust anchor name field.
- Delete
- To delete an existing configuration.
- an existing trust anchor configuration
- To edit the settings for an existing trust anchor.
- Specify a password in the Key store password field used to access the keystore file.
- Specify the absolute location of the keystore file in the Key store path field. IBM recommends that you use the USER_INSTALL_ROOT variable as a portion of the keystore path.
To change this predefined variable, click Environment > WebSphere variables . The USER_INSTALL_ROOT variable might display on the second page of variables.
- Specify the type of keystore file in the key store type field. WAS supports the following keystore types:
- JKS
- Use this option if you are not using Java Cryptography Extensions (JCE) and your keystore file uses the Java Key Store (JKS) format.
- JCEKS
- Use this option if you are using Java Cryptography Extensions.
- PKCS11KS (PKCS11)
- Use this option if your keystore file uses the PKCS#11 file format. Keystore files that use this format might contain Rivest Shamir Adleman (RSA) keys on cryptographic hardware or might encrypt keys that use cryptographic hardware to ensure protection.
- PKCS12KS (PKCS12)
- Use this option if your keystore file uses the PKCS#12 file format.
- Click OK and Save to save the configuration.
Results
You have configured trust anchors at the server or cell level.
Configure Web Services Security using JAX-RPC at the platform level