+

Search Tips   |   Advanced Search

Response receiver binding collection

Use this page to specify the binding configuration for receiver response messages for Web services security.

There is an important distinction between V5.x and V6.0.x and later applications. The information in this article supports V5.x applications only that are used with WebSphere Application Server V6.0.x and later. The information does not apply to V6.0.x and later applications. To view this console page...

  1. Click Applications > Enterprise applications > application.

  2. Click Manage modules > URI_file_name > Web Services: Client security bindings.

  3. Under Response receiver binding, click Edit.

Signing information

[V5 only]

Specify the configuration for the signing parameters. Signing information is used to sign and to validate parts of the message including the body and the timestamp.

You can also use these parameters for X.509 validation when the authentication method is IDAssertion and the ID type is X509Certificate, in the server-level configuration. In such cases, fill in the certificate path fields only.

Encryption information

[V5 only]

Specify the configuration for the encryption and decryption parameters.

Encryption information is used for encrypting and decrypting various parts of a message, including the body and the user name token.

Trust anchors

[V5 only]

Specify a list of keystore objects that contain the trusted root certificates that are self-signed or issued by a certificate authority.

The certificate authority authenticates a user and issues a certificate. After the certificate is issued, the keystore objects, which contain these certificates, use the certificate for certificate path or certificate chain validation of incoming X.509-formatted security tokens.

Collection certificate store

[V5 only]

Specify a list of the untrusted, intermediate certificate files.

The collection certificate store contains a chain of untrusted, intermediate certificates. The CertPath API attempts to validate these certificates, which are based on the trust anchor.

Key locators

[V5 only]

Specify a list of key locator objects that retrieve the keys for a digital signature and encryption from a keystore file or a repository.

The key locator maps a name or a logical name to an alias or maps an authenticated identity to a key. This logical name is used to locate a key in a key locator implementation.




 

Related concepts


Response receiver

 

Related tasks


Configure the client for response decryption: decrypting the message parts
Configure the client for response decryption: choosing a decryption method
Configure the client for response digital signature verification: verifying the message parts
Configure the client for response digital signature verification: choosing the verification method
Securing Web services for V5.x applications using XML encryption

 

Reference topic