+

Search Tips   |   Advanced Search

Key configuration settings

Use this page to define the mapping of a logical name to a key alias in a keystore file. To view this console panel for the key collection on the cell level...

  1. Click Security > Web services

  2. Under Default generator bindings, click Token Generators > token_generator_name.

  3. Under Additional properties, click Callback handler > Keys.

  4. Specify a new key configuration by clicking New or by clicking the key configuration name to modify the settings.

Keys are also available by clicking Key locators > key_locator_name. Under Additional properties, click Keys > New. To view this console page for the key locator collection on the server level...

  1. Click Servers > Application servers > server.

  2. Under Security, click Web services: Default bindings for Web services security.

  3. Under Default generator bindings, click Token Generators > token_generator_name.

  4. Under Additional properties, click Callback handler > Keys.

  5. Specify a new key configuration by clicking New or by clicking the key configuration name to modify the settings.

Keys are also available by clicking Key locators > key_locator_name. Under Additional properties, click Keys > New. To use this console page for the key locator collection on the application level...

  1. Click Applications > Enterprise applications > application.

  2. Click Manage modules > URI_name.

  3. [V6 only] Under Additional properties, you can access key locators for the following bindings:

    • For the Request generator, click Web services: Client security bindings. Under Request generator (sender) binding, click Edit custom > Key locators. Under Additional properties, click Keys.

    • For the Request consumer, click Web services: Server security bindings. Under Request consumer (receiver) binding, click Edit custom > Key locators. Under Additional properties, click Keys.

    • For the Response generator, click Web services: Server security bindings. Under Response generator (sender) binding, click Edit custom > Key locators. Under Additional properties, click Keys.

    • For the Response consumer, click Web services: Client security bindings. Under Response consumer (receiver) binding, click Edit custom > Key locators.Under Additional properties, click Keys.

  4. Under Web Services Security Properties, you can access key locators for the following bindings:

    • For the Request sender, click Web services: Client security bindings. Under Request sender binding, click Edit > Key locators. Under Additional properties, click Keys.

    • For the Request receiver, click Web services: Server security bindings. Under Request receiver binding, click Edit > Key locators. Under Additional properties, click Keys.

    • For the Response sender, click Web services: Server security bindings. Under Response sender binding, click Edit > Key locators. Under Additional properties, click Keys.

    • For the Response receiver, click Web services: Client security bindings. Under Response receiver binding, click Edit > Key locators. Under Additional properties, click Keys.

  5. Specify a new key configuration by clicking New or by clicking the key configuration name to modify the settings.

Key name

[V5 and 6 only]

Name of the key object. For digital signatures, the key name is used by the request sender or request generator signing information to determine which key is used to digitally sign the message. For encryption, the key name is used to determine the key used for encryption.

The key name must be a fully qualified, distinguished name. For example, CN:Bob,O=IBM,C=US.

If you enter the distinguished name with spaces before or after commas and equal symbols, the appserver normalizes the distinguished names automatically during run time by removing these extra spaces.

Key alias

[V5 and 6 only]

Specify the alias for the key object, which is used by the key locator to find the key within the keystore file.

Key password

[V5 and 6 only]

Password that is needed to access the key object within the keystore file.




 

Related tasks


Configure the key locator using JAX-RPC for the generator binding on the application level

 

Related Reference

Key collection

 

Reference topic