WAS v8.5 > Develop applications > Develop web services - Security (WS-Security) > Configure Web Services Security during application assembly > Configure XML encryption for v5.x web services with an assembly tool

Configure the server for response encryption: choosing the encryption method

We can specify which method the server uses to encrypt the response message.

There is an important distinction between v5.x and v6.0.x and later applications. The information in this article supports v5.x applications only used with WebSphere Application Server v6.0.x and later. The information does not apply to v6.0.x and later applications.

Prior to completing these steps, read either of the following topics to become familiar with the Extensions tab and the Binding configurations tab in the web services editor within an assembly tool:

These two tabs are used to configure the Web Services Security extensions and Web Services Security bindings, respectively. To specify which method the server uses to encrypt the response message:

  1. Launch an assembly tool. For more information, see the related information on Assembly Tools.
  2. Switch to the Java EE perspective. Click Window > Open Perspective > J2EE.

  3. Click EJB Projects > application_name > ejbModule > META_INF.
  4. Right-click the webservices.xml file, and click Open with > Web services editor.

  5. Click the Binding Configurations tab, located at the bottom of the Web Services Editor within the assembly tool.

  6. Expand Response sender binding configuration details > Encryption information.

  7. Click Edit to view the encryption information. The following table describes the purpose of this information. Some of these definitions are based on the XML-Encryption specification, located at the following web address: http://www.w3.org/TR/xmlenc-core

    Encryption name

    Refers to the name of the encryption information entry.

    Data encryption method algorithm

    Encrypts and decrypts data in fixed size, multiple octet blocks. The algorithm selected for the server response sender configuration must match the algorithm selected in the client response receiver configuration.

    Key encryption method algorithm

    Represents public key encryption algorithms specified for encrypting and decrypting keys. The algorithm selected for the server response sender configuration must match the algorithm selected in the client response receiver configuration.

    Encryption key name

    Represents a Subject from a public key certificate typically distinguished name (DN) found by the encryption key locator and used by the key encryption method algorithm to encrypt the private key. The private key is used to encrypt the data.

    The key name chosen in the server response sender encryption information must be the public key of the key configured in the client response receiver encryption information. Encryption by the response sender must be done using the public key and decryption must be done by the response receiver using the associated private key (the personal certificate of the response receiver).

    Encryption key locator

    The encryption key locator represents a reference to a key locator implementation class that finds the correct key store where the alias and the certificate exist. For more information, see the tasks for configuring key locators.

  8. Select Show only FIPS Compliant Algorithms if you only want the FIPS compliant algorithms to be shown in the Data Encryption method algorithm and Key Encryption method algorithm drop-down lists. Use this option if you expect this application to be run on a WAS that has set the Use the United States Federal Information Processing Standard (FIPS) algorithms option in the SSL certificate and key management panel of the dmgr console for WAS.


Results

The encryption key name chosen must refer to a public key of the response receiver. For the encryption key name, use the Subject of the public key certificate, typically a Distinguished Name (DN). The name chosen is used by the default key locator to find the key. If you write a custom key locator , the encryption key name might be anything used by the key locator to find the correct encryption key (a public key). The encryption key locator references the implementation class that finds the correct key store where the alias and certificate exist.

Specify which parts of the response message to encrypt. See the task for configuring the server for response encryption if we have not previously specified this information.


Related concepts:

XML encryption
Development and assembly tools


Related


Configure the server for response encryption: encrypting the message parts
Configure key locators using an assembly tool
Configure key locators
Configure the server security bindings using an assembly tool
Configure the server security bindings


Related information:

XML Encryption Syntax and Processing W3C Recommendation 10 December 2002


+

Search Tips   |   Advanced Search