WAS v8.5 > Develop applications > Develop web services - Security (WS-Security) > Configure Web Services Security during application assembly > Configure identity assertion for v5.x web services with an assembly tool

Secure web services for v5.x applications using identity assertion authentication

With the identity assertion authentication method, the security token generates a <wsse:UsernameToken> element containing a <wsse:Username> element. On the request sender side, a callback handler is invoked to generate the security token. On the request receiver side, the security token is validated. Unlike BasicAuth authentication, trust is established through the use of a security token rather than through user name and password validation.

There is an important distinction between v5.x and v6.0.x and later applications. The information in this article supports v5.x applications only used with WebSphere Application Server v6.0.x and later. The information does not apply to v6.0.x and later applications.

WAS provides several different methods to secure the web services. Identity assertion authentication is one of these methods. You might also secure the web services using any of the following methods:

To use identity assertion authentication to secure web services, complete the following tasks:

  1. Secure the client for identity assertion authentication.

    1. Configure the client for identity assertion: specifying the method
    2. Configure the client for identity assertion: collecting the authentication method

  2. Secure the server for identity assertion authentication.

    1. Configure the server to handle identity assertion authentication
    2. Configure the server to validate identity assertion authentication information


Results

After completing these steps, we have secured the web services using identity assertion authentication.


Related concepts:

Secure web services
Identity assertion authentication method
Security token


Related


Configure the client for identity assertion: specifying the method
Configure the client for identity assertion: collecting the authentication method
Configure the server to handle identity assertion authentication
Configure the server to validate identity assertion authentication information


+

Search Tips   |   Advanced Search