+

Search Tips   |   Advanced Search

Enable cryptographic keys stored in hardware devices in Web Services Security

We can enable individual web service applications to use cryptographic keys stored in hardware devices in Web Services Security.

We must first configure the hardware acceleration device using the key management panels in the console. See Configure hardware cryptographic devices for Web Services Security

  1. In the console, click Servers > Server types > WebSphere application servers and then select the server name.

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

  3. Under Additional properties, click key locators.

  4. Select the key locator name.

  5. Under Key store, specify the name of the keystore configuration.

    If the keystore reference is specified to a hardware device configuration, the Web Services Security runtime first attempts to obtain the cryptographic algorithm from the hardware device. If the hardware device is not supported or if it fails, the runtime for Web Services Security obtains the cryptographic algorithm from the security providers list. Read about creating a keystore configuration for a preexisting keystore file for more information about how to create the name of a keystore configuration.

    (dist) If hardware acceleration is enabled, the Web Services Security run time first attempts to use the hardware device for cryptographic operations. If the attempt to use the hardware device fails or if the algorithm is not supported by the hardware device, the runtime will use a software provider from the security providers list. The runtime displays a warning message that you failed to use hardware cryptographic provider but the process will continue using the software provided.

  6. Click OK.


Results

If the name of the keystore reference is a Java keystore file, a hardware acceleration device configured at the application server level (ws-security.xml) will be used for cryptographic operations.


Related concepts

  • Hardware cryptographic device support for Web Services Security


    Related tasks

  • Configure hardware cryptographic devices for Web Services Security
  • Create a keystore configuration for a preexisting keystore file