+

Search Tips   |   Advanced Search

Hardware cryptographic device support for Web Services Security

In IBM WAS v6.1 or later, Web Services Security supports the use of cryptographic hardware devices. There are two ways in which to use hardware cryptographic devices with Web Services Security.


Enabling cryptographic operations on hardware devices

We can enable cryptographic operations on hardware devices. The keys used can be stored in a Java keystore file; it is not necessary to store them on the hardware device. The decision to use enable cryptographic operations on hardware devices is made at the server level only, not at the application level.

If cryptographic operations on hardware device is enabled, the Web Service Security run time first attempts to use the hardware device for cryptographic operations. If the attempt to use the hardware device fails or if the algorithm is not supported by the hardware device, the run time uses a software provider from the security providers list.

Enable this feature might improve the performance, depending on the hardware device. For more information on how to enable cryptographic operations on hardware devices, see Configure hardware cryptographic devices for Web Services Security.


Secure keys

Cryptographic keys can be stored on the hardware cryptographic device and never leave the device. These secure keys are confined to the hardware cryptographic device for security considerations rather than performance considerations. The option to select whether to use keys stored in a hardware cryptographic device or a Java keystore file can be made at the application level.

If the keystore reference is specified to be a hardware device configuration, the Web Services Security run time first attempts to obtain the cryptographic algorithm from the hardware device. If the algorithm is not supported or fails, the run time uses a software provider from the security providers list.

See further information about how to enable secure keys, see Enable cryptographic keys stored in hardware devices in Web Services Security.


Limitations

The hardware cryptographic device support for Web Services Security currently has the following limitations:


Long-term usage of session keys

We can configure WebSphere Application Server to use the hardware keystore, or we can configure the hardware acceleration card to allow the long-term usage of session keys. Session keys might be insecure.

If we are concerned about insecure session keys, configure WebSphere Application Server to use the hardware keystore. See the information about how to enable cryptographic keys stored in hardware devices in Web Services Security.

To configure the hardware acceleration card to allow the long-term usage of session keys, see the manufacturer's documentation for the specific hardware acceleration card. For example:

  1. For the nCipher nforce 1600 server Version 2.23.6, follow the nCipher documentation instructions.

  2. We can set the CKNFAST_SECURITY_ASSURANCES_OVERRIDE=longterm parameter in the cknfastrc configuration file. This configuration change eliminates the time limit that is associated with session keys.

  3. Follow the documentation for Cipher to restart the nCipher server.

  4. Restart WebSphere Application Server.


Related tasks

  • Enable hardware cryptographic devices for Web Services Security
  • Configure hardware cryptographic devices for Web Services Security
  • Enable cryptographic keys stored in hardware devices in Web Services Security