Encryption information configuration settings: Methods
Configure the encryption and decryption parameters for the signature method, digest method, and canonicalization method.
The specifications listed on this page for the signature method, digest method, and canonicalization method are located in the World Wide Web Consortium (W3C) document entitled, XML Encryption Syntax and Processing: W3C Recommendation 10 Dec 2002.
To view this administrative console page:
- Click Applications > Application Types > WebSphere enterprise applications > application_name and complete one of the following steps:
- Click Manage modules > URI_file_name > Web Services: Client Security Bindings. Under Request sender binding, click Edit. Under Web Services Security Properties, click Encryption Information.
- Under Modules, click Manage modules > URI_file_name > Web Services: Server Security Bindings. Under Response sender binding, click Edit. Under Web Services Security Properties, click Encryption Information.
- Select None or Dedicated encryption information. The application server can have either one or no encryption configurations for the request sender and the response sender bindings. If we are not using encryption, select None. To configure encryption for either of these two bindings, select Dedicated encryption information and specify the configuration settings using the fields described in this topic.
Fix packs that include updates to the SDK might overwrite unrestricted policy files. Back up unrestricted policy files before applying a fix pack and reapply these files after the fix pack is applied.
Encryption information name
Name for the encryption information.
Key locator reference
Name used to reference the key locator.
We can configure these key locator reference options on the cell level, the server level, and the application level. The configurations listed in the field are a combination of the configurations on these three levels.
To configure the key locators on the cell level, complete the following steps:
- Click Security > JAX-WS and JAX-RPC security runtime.
- Under Additional properties, click Key locators.
To configure the key locators on the server level:
- Click Servers > Server Types > WebSphere application servers > server.
- Under Security, click security runtime.
Mixed-version environment: In a mixed node cell with a server using WebSphere Application Server version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv
- Under Additional properties, click Key locators.
To configure the key locators on the application level, complete the following steps:
- Click Applications > Application Types > WebSphere enterprise applications > application_name.
- Under Modules, click Manage modules > URI_name.
- Under Web Services Security Properties, we can access the key locators for the following bindings:
- For the Request sender, click Web services: Client security bindings. Under Request sender binding, click Edit. Under Additional properties, click Key locators.
- For the Request receiver, click Web services: Server security bindings. Under Request receiver binding, click Edit. Under Additional properties, click Key locators.
- For the Response sender, click Web services: Server security bindings. Under Response sender binding, click Edit. Under Additional properties, click Key locators.
- For the Response receiver, click Web services: Client security bindings. Under Response receiver binding, click Edit. Under Additional properties, click Key locators.
Encryption key name
Name of the encryption key that is resolved to the actual key by the specified key locator.
Information Value Data type String
Key encryption algorithm
Algorithm uniform resource identifier (URI) of the key encryption method.
The following algorithms are supported:
- http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p.
When running with IBM Software Development Kit (SDK) Version 1.4, the list of supported key transport algorithms does not include this one. This algorithm appears in the list of supported key transport algorithms when running with JDK 1.5 or later.
By default, the RSA-OAEP algorithm uses the SHA1 message digest algorithm to compute a message digest as part of the encryption operation. Optionally, we can use the SHA256 or SHA512 message digest algorithm by specifying a key encryption algorithm property. The property name is: com.ibm.wsspi.wssecurity.enc.rsaoaep.DigestMethod. The property value is one of the following URIs of the digest method:
- http://www.w3.org/2001/04/xmlenc#sha256
- http://www.w3.org/2001/04/xmlenc#sha512
By default, the RSA-OAEP algorithm uses a null string for the optional encoding octet string for the OAEPParams. We can provide an explicit encoding octet string by specifying a key encryption algorithm property. For the property name, we can specify com.ibm.wsspi.wssecurity.enc.rsaoaep.OAEPparams. The property value is the base 64-encoded value of the octet string.
Important: We can set these digest method and OAEPParams properties on the generator side only. On the consumer side, these properties are read from the incoming SOAP message.
- http://www.w3.org/2001/04/xmlenc#rsa-1_5.
- http://www.w3.org/2001/04/xmlenc#kw-tripledes.
- http://www.w3.org/2001/04/xmlenc#kw-aes128.
- http://www.w3.org/2001/04/xmlenc#kw-aes192. To use the 192-bit key encryption algorithm, we must download the unrestricted Java Cryptography Extension (JCE) policy file.
Restriction: Do not use the 192-bit key encryption algorithm if we want your configured application to be in compliance with the Basic Security Profile (BSP).
- http://www.w3.org/2001/04/xmlenc#kw-aes256. To use the 256-bit key encryption algorithm, we must download the unrestricted JCE policy file.
If an InvalidKeyException error occurs and we are using the 129xxx or 256xxx encryption algorithm, the unrestricted policy files might not exist in the configuration.
Java Cryptography Extension
By default, the Java Cryptography Extension (JCE) is shipped with restricted or limited strength ciphers. To use 192-bit and 256-bit AES encryption algorithms, we must apply unlimited jurisdiction policy files.
(Dist) Note: Before downloading these policy files, back up the existing policy files (local_policy.jar and US_export_policy.jar in the WAS_HOME/java/jre/lib/security/ directory) prior to overwriting them in case we want to restore the original files later.
(ZOS) Note: Before downloading these policy files, back up the existing policy files (local_policy.jar and US_export_policy.jar in the WAS_HOME/java/lib/security/ directory) prior to overwriting them in case we want to restore the original files later.
Important: Your country of origin might have restrictions on the import, possession, use, or re-export to another country, of encryption software. Before downloading or using the unrestricted policy files, we must check the laws of our country, its regulations, and its policies concerning the import, possession, use, and re-export of encryption software, to determine if it is permitted.
Application server platforms and IBM Developer Kit, Java Technology Edition, Version 1.4.2
To download the policy files, complete one of the following sets of steps:
- (AIX) (Linux) (Windows) (ZOS) For application server platforms using IBM Developer Kit, Java Technology Edition, Version 1.4.2, including the AIX, Linux, and Windows platforms to obtain unlimited jurisdiction policy files:
- Go to the following website: IBM developer kit: Security information
- Click Java 1.4.2
- Click IBM SDK Policy files.
The Unrestricted JCE Policy files for SDK 1.4 website is displayed.
- Enter your user ID and password or register with IBM to download the policy files. The policy files are downloaded onto the machine.
- (Solaris) (HPUX) For application server platforms using the Sun-based Java SE Development Kit 6 (JDK 6) Version 1.4.2, including the Solaris environments and the HP-UX platform to obtain unlimited jurisdiction policy files:
- Go to the following website: http://java.sun.com/j2se/1.4.2/download.html
- Click Archive area.
- Locate the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files 1.4.2 information and click Download. The jce_policy-1_4_1.zip file is downloaded onto the machine.
After completing these steps, two Java archive (JAR) files are placed in the JVM jre/lib/security/ directory.
(iSeries) IBM i and IBM Software Development Kit 1.4
For the IBM i and IBM Software Development Kit Version 1.4, the tuning of Web Services Security is not required. The unrestricted jurisdiction policy files for the IBM SDK Version 1.4 are automatically configured when the prerequisite software is installed.
For the IBM i 5.4 operating system and IBM Software Development Kit Version 1.4, the unrestricted jurisdiction policy files for the IBM Java Developer Kit 1.4 are automatically configured by installing product 5722SS1 Option 3, Extended Base Directory Support.
For IBM i (formerly known as IBM i V5R3) and IBM Software Development Kit Version 1.4, the unrestricted jurisdiction policy files for the IBM Software Development Kit Version 1.4 are automatically configured by installing product 5722AC3, Crypto Access Provider 128-bit.
(iSeries) IBM i and IBM Software Development Kit 1.5
For IBM i 5.4 and IBM i (formerly known as IBM i V5R3) and IBM Software Development Kit 1.5, the restricted JCE jurisdiction policy files are configured, by default. We can download the unrestricted JCE jurisdiction policy files from the following website: Security information: IBM J2SE 5 SDKs
To configure the unrestricted jurisdiction policy files for IBM i and the IBM SDK Version 1.5:
- Make backup copies of these files:
/QIBM/ProdData/Java400/jdk15/lib/security/local_policy.jar /QIBM/ProdData/Java400/jdk15/lib/security/US_export_policy.jar- Download the unrestricted policy files from IBM developer kit: Security information to the /QIBM/ProdData/Java400/jdk15/lib/security directory.
- Go to this website: IBM developer kit: Security information
- Click J2SE 5.0.
- Scroll down and click IBM SDK Policy files. The Unrestricted JCE Policy files for the SDK website is displayed.
- Click Sign in and provide the IBM intranet ID and password.
- Select the appropriate unrestricted JCE policy files, and then click Continue.
- View the license agreement> I Agree.
- Click Download Now.
- Use the DSPAUT command to ensure *PUBLIC is granted*RX data authority but also ensure that no object authority is provided to both the local_policy.jar and the US_export_policy.jar files in the /QIBM/ProdData/Java400/jdk15/lib/security directory. For example:
DSPAUT OBJ('/qibm/proddata/java400/jdk15/lib/security/local_policy.jar')- Use the CHGAUT command to change authorization, if needed. For example:
CHGAUT OBJ('/qibm/proddata/java400/jdk15/lib/security/local_policy.jar') USER(*PUBLIC) DTAAUT(*RX) OBJAUT(*NONE)
Data encryption algorithm
Algorithm Uniform Resource Identifiers (URI) of the data encryption method.
The following algorithms are supported:
- http://www.w3.org/2001/04/xmlenc#tripledes-cbc
- http://www.w3.org/2001/04/xmlenc#aes128-cbc
- http://www.w3.org/2001/04/xmlenc#aes192-cbc
Restriction: Do not use the 192-bit data encryption algorithm if we want your configured application to be in compliance with the Basic Security Profile (BSP).
- http://www.w3.org/2001/04/xmlenc#aes256-cbc
By default, the JCE ships with restricted or limited strength ciphers. To use 192-bit and 256- bit AES encryption algorithms, we must apply unlimited jurisdiction policy files. See Key encryption algorithm field description.
Related:
Basic Security Profile compliance tips Configure encryption using JAX-RPC to protect message confidentiality at the application level Encryption information collection Key locator collection