WAS v8.5 > Reference > SetsResponse consumer (receiver) binding configuration settings page
Use this page to specify the binding configuration for the response consumer.
To view this dmgr console page...
- Click Applications > Application Types > WebSphere enterprise applications > application_name.
- Under Modules, click Manage modules.
- Click the Uniform Resource Identifier (URI).
- Under Web Services Security Properties, click Web services: Client security bindings.
- Under Response consumer (receiver) binding, click Edit custom.
Depending on your assigned security role when security is enabled, you might not have access to text entry fields or buttons to create or edit configuration data. Review the administrative roles documentation to learn more about the valid roles for the application server.
The security constraints or bindings are defined using the application assembly process before the application is installed.
WAS v8.5 provides assembly tools to assemble the application.
The default binding provided by this product is a sample. Do not use this sample in a production environment without modifying the configuration. The security constraints define what is signed or encrypted in the Web Services Security message. The bindings define how to enforce the requirements.
Digital signature security constraint (integrity)
The following table shows the required and optional binding information when the digital signature security constraint (integrity) is defined in the deployment descriptor.
Binding information for digital signature security constraints. The binding information is used for validating digital signature.
We can use the key locators, collection certificate stores, and trust anchors that are defined at the server level.
Information type Required or optional Signing information Required Key information Required Token consumer Optional Key locators Optional Collection certificate store Optional Trust anchors Optional Properties Optional
Encryption constraint (confidentiality)
The following table shows the required and optional binding information when the encryption constraint (confidentiality) is defined in the deployment descriptor.
Binding information for encryption constraints. The binding information is used for decrypting messages.
We can use the key locators, collection certificate store, and trust anchors that are defined at the application or server level.
Information type Required or optional Encryption information Required Key information Required Token consumer Optional Key locators Optional Collection certificate store Optional Trust anchors Optional Properties Optional
Security token constraint
The following table shows the required and optional binding information when the security token constraint is defined in the deployment descriptor.
Binding information for security token constraints. The binding information is used for digital signature verification and for decrypting messages.
Information type Required or optional Token consumer Required Collection certificate store Optional Trust anchors Optional Properties Optional We can use the collection certificate store and trust anchors that are defined at the application or server level.
Use defaults
Select this option to use the default binding information from the server level.
Component
Enterprise bean in an assembled EJB module.
Port
Port in the web service defined during application assembly.
Web service
Name of the web service defined during application assembly.
Related
Configure token generators using JAX-RPC to protect message authenticity at the application level
Reference:
Request generator (sender) binding configuration settings
Request consumer (receiver) binding configuration settings
Response generator (sender) binding configuration settings