+

Search Tips   |   Advanced Search

Custom keystore settings


To configure custom keystore files. Custom keystore files are alternatives to the key management support built into the WAS. The callback handler uses the custom version of the keystore configuration that includes keys.

Configure custom keystore files for message parts when we are editing a default cell or server binding. We can also configure application specific bindings for tokens and message parts that are required by the policy set.

To view this admin console page when we are editing a default cell binding...

  1. Click Services > Policy sets > Default policy set bindings.

  2. Click the WS-Security policy in the Policies table.

  3. Click the Authentication and protection link in the Main message security policy bindings section.

  4. Click a protection_token link in the Protection tokens table.

  5. Click the Callback handler link in the Additional bindings section.

  6. Select Custom from the list in the Keystore section.

  7. Click the Custom keystore configuration link.

To view this admin console page when we are configuring application specific bindings for tokens and message parts that are required by the policy set...

  1. Click Applications > Application Types > WebSphere enterprise apps .

  2. Select an application that contains Web services. The application must contain a service provider or a service client.

  3. Click the Service provider policy sets and bindings link or the Service client.policy sets and bindings in the Web Services Properties section.

  4. Select a binding. You must have previously attached a policy set and assigned a application specific binding.

  5. Click the WS-Security policy in the Policies table.

  6. Click the Authentication and protection link in the Main message security policy bindings section.

  7. Click a protection_token link in the Protection tokens table.

  8. Click the Callback handler link in the Additional bindings section.

  9. Select Custom from the list in the Keystore section.

  10. Click the Custom keystore configuration link.

This admin console panel applies only to Java™ API for XML Web Services (JAX-WS) applications.

Keystore

Use this section to specify information about the custom keystores.

Full path

Full path to where the keystore file is located. Enter the path to the keystore file in this required field. We can use system variables for portions of the path. For example we might enter ${USER_INSTALL_ROOT}/etc/ws-security/myKeyStore.jks. Required for the custom keystore configuration.

Type

Type of the keystore file to use.

to use.

Confirm password

to be use and confirms the one entered in the field.

Key

Use this section to specify information about the key.

Name

Name of the key to use. Enter the name of the key to be used in this required field.

Alias

Alias name of the key to use. Enter the alias of the name of the key to use in this required field.

for the key to use.

We cannot set a password for public keys for asymmetric signature inbound and encryption outbound. The and Confirm fields display only for the following:

client asymmetric signature outbound AsymmetricBindingInitiatorSignatureToken0
client asymmetric encryption inbound AsymmetricBindingInitiatorEncryptionToken0
server asymmetric signature outbound AsymmetricBindingRecipientSignatureToken0
server asymmetric encryption inbound AsymmetricBindingRecipientEncryptionToken0

Confirm password

Confirmation of the password for the key to use. Enter the password that you entered in the field to confirm.

Similar to the field, we cannot confirm the password for public keys for asymmetric signature inbound and encryption outbound.





 

Related tasks


Set policy set bindings
Manage policy sets

 

Related


Protection token settings (generator or consumer)
WS-Security authentication and protection
Policy set bindings settings
Callback handler settings