Important distinction between Version 5.x and Version 6 applications
Note: The information in this article supports version 5.x applications only that are used with WebSphere Application Server Version 6. The information does not apply to version 6 applications. Prior to completing these steps, read either of the following topics to become familiar with the WS Extensions tab and the WS Bindings tab:
These two tabs are used to configure the Web services security extensions and Web services security bindings, respectively.
Complete this task to specify which decryption method is used by the server to decrypt the request message. You must know which decryption method the client uses because the server must use the same method.
The key chosen must be a private key in the key store configured by the key locator. The key requires the same Subject used by the client to encrypt the data. Encryption must be done using the public key and decryption by using the private key (personal certificate). To ensure that the client encrypts the data with the correct public or private key, extract the public key from the server key store and add it to the key store specified in the encryption configuration information for the client request sender.
For example, the personal certificate of a server is CN=Bob, O=IBM, C=US. Therefore the server contains the public and private key pair. The client sending the request should encrypt the data using the public key for CN=Bob, O=IBM, C=US. The server decrypts the data using the private key for CN=Bob, O=IBM, C=US.
It is important to note that for decryption, the encryption key name chosen must refer to a personal certificate that can be located by the key locator of the server referenced in the encryption information. Enter the Subject of the personal certificate here, which is typically a Distinguished Name (DN). The Subject uses the default key locator to find the key. If a custom key locator is written, the encryption key name can be anything used by the key locator to find the correct encryption key. The encryption key locator references the implementation class that finds the correct key store where this alias and certificate exist. Refer to Configuring key locators using an assembly tool and Configuring key locators using the administrative console for more information.
Related concepts
XML encryption
Related tasks
Configuring the server for request decryption: decrypting the message parts
Configuring key locators using an assembly tool
Configuring key locators using the administrative console
Configuring the server security bindings using an assembly tool
Configuring the server security bindings using the administrative console
Related information
XML Encryption Syntax and Processing W3C Recommendation 10 December 2002