+

Search Tips   |   Advanced Search


Security tokens

Security tokens are always contained in a header. NeoLoad supports the following security tokens:

The button makes it possible to add a security token.


Username


This security token provides the associated request with LoginID / Password -type authentication.

A username token has the following properties:


Timestamp

This token provides the associated request with a lifespan.

EN_prefs-wss-timestamp

A timestamp token has the following properties:


Encryption

This token provides encryption for all or part of the associated SOAP request.

EN_prefs-wss-encrypt

An encryption token has the following properties:

  • Encryption may be applied to parts of the SOAP request body only. To do this, you need to specify which XML elements are to be encrypted. If no particular part is specified, the whole message body will be encrypted.

    • Id: ID of the XML tag to be encrypted.
    • Name: Name of the XML tag to be encrypted.
    • Namespace: Namespace of the XML tag to be encrypted.
    • Encoding: the part of the XML tag to be encrypted.
      Two choices are available: the entire tag, or just the tag content.


    Signature

    This security token provides a signature for all or part of the associated SOAP request.

    EN_prefs-wss-sign

    A signature token has the following properties:

    • Key store: Keystore used by the token (the key store may use variables). For more information about importing a new key store into NeoLoad, see Keystores Manager.
    • Password: Keystore password (the password may contain variables).
    • Alias: Alias of the key being used (the alias may contain variables).
    • Canonicalization algorithm: Canonical formatting algorithm used. Canonical formatting modifies the XML message to eliminate the superfluous characters and thus obtain a standardized format for the message.
    • Signature algorithm: Algorithm used to generate the request signature.
    • Key ID type: Key ID type sets the form that the information relating to the key will take; basically, if the information is the key or if it is just a reference to a key known to the server.
    • Use the first certificate in the certificate chain: Using the certificate for the alias rather than the certificate chain to generate the signature.

    A signature may be applied to parts of the SOAP request body only. To do this, it is necessary to specify which XML elements are to be signed. If no particular part is specified, the whole message body is signed.

    • Id: ID of the XML tag to be signed.
    • Name: Name of the XML tag to be signed.
    • Namespace: Namespace of the XML tag to be signed.
    • Encoding: Part of the XML tag to be signed.
      Two choices are available: the entire tag, or just the tag content.


    Home