Configure the server for request decryption: decrypting the message parts
Use the WS Extensions tab and the WS Binding configurations tab to specify which parts of the request message must be decrypted by the server.
Important: There is an important distinction between Version 5.x and Version 6 and later applications. The information supports Version 5.x applications only used with WAS v6.0.x and later. The information does not apply to Version 6.0.x and later applications.
Complete this task to specify which parts of the request message must be decrypted by the server. We must know which parts of the request message the client encrypts because the server must decrypt the same message parts. Prior to completing these steps, read either of the following topics to become familiar with the WS Extensions tab and the WS Binding configurations tab:
- Configure the server security bindings using an assembly tool
- Configure the server security bindings using the administrative console
These two tabs are used to configure the Web Services Security extensions and Web Services Security bindings, respectively.
Complete the following steps to configure the request receiver extensions:
- Launch an assembly tool. For more information, see the related information on Assembly Tools.
- Switch to the Java EE perspective. Click Window > Open Perspective > J2EE.
- Click EJB Projects > application_name > ejbModule > META_INF.
- Right-click the webservices.xml file, and click Open with > Web services editor.
- Click the Extensions tab, which is located at the bottom of the web services editor within the assembly tool.
- Expand the Request receiver service configuration details > Required confidentiality section.
- Select the parts of the message to decrypt. The message parts selected for the request decryption on the server must match the message parts selected for the message encryption on the client. Click Add and select either of the following message parts:
- bodycontent
- The user data section of the message.
- usernametoken
- This token is the basic authentication information.
What to do next
After specified which parts of the request message to decrypt, specify the method to use decrypt the message. See Configure the server for request decryption: choosing the decryption method for more information.
Related concepts
XML encryption Development and assembly tools
Related tasks
Configure the server for request decryption: choosing the decryption method Configure key locators using an assembly tool Configure key locators using the administrative console Configure the server security bindings using an assembly tool Configure the server security bindings using the administrative console