ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamy_5.4.0.1/50/webserv/wsseccfencsvreq.htm

88 lines
5.7 KiB
HTML
Raw Permalink Normal View History

2024-04-02 14:02:31 +00:00
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=utf-8">
<LINK rel="stylesheet" type="text/css" href="../../../rzahg/ic.css">
<title>Configure the Web services server for request decryption</title>
</head>
<BODY>
<!-- Java sync-link -->
<SCRIPT LANGUAGE="Javascript" SRC="../../../rzahg/synch.js" TYPE="text/javascript"></SCRIPT>
<h5><a name="wsseccfencsvreq"></a>Configure the Web services server for request decryption</h5>
<p>This task addresses configuring the server for request decryption. It describes modifying the extensions to indicate what parts of the request to decrypt. You need to know what parts the client encrypts when sending the request because the two configurations must match. It also describes configuring the bindings to indicate how to decrypt these parts.</p>
<p>For conceptual information on encrypting and decrypting Simple Object Access Protocol (SOAP) message, see <a href="wsseccfxmlenc.htm"> XML encryption</a>.</p>
<p>Perform the following steps in the WebSphere Development Studio Client for iSeries to configure the parts of the SOAP message that must be decrypted:</p>
<ol>
<li><p>Open the webservices.xml deployment descriptor for your Web services application in the Web Services Editor of the WebSphere Development Studio Client for iSeries. For more information, see <a href="astk.htm">Configure your Web services application</a>.</p></li>
<li><p>Click the <strong>Security Extensions</strong> tab.</p></li>
<li><p>Expand the <strong>Request Receiver Service Configuration Details --&gt; Required Confidentiality</strong> settings.</p></li>
<li><p>Select the parts of the message to decrypt that the client encrypts in the request sender. You can do this by clicking <strong>Add</strong> and selecting either <strong>bodycontent</strong> (the user data of the message) or <strong>usernametoken</strong> (the basic authentication information).</p></li>
<li><p>Save the file.</p></li>
</ol>
<p>Next, perform the following steps in the Web Services Editor to configure the information that is needed to decrypt the required parts:</p>
<ol>
<li><p>Click the <strong>Binding Configurations</strong> tab.</p></li>
<li><p>Expand the <strong>Request Receiver Binding Configuration Details --&gt; Encryption Information</strong> settings.</p></li>
<li><p>Click <strong>Edit</strong> to view the encryption information. The following table describes the purpose for each of these selections. Some of these definitions are based on the <a href="http://www.w3.org/TR/xmldsig-core" target="_">XML-Signature Syntax and Processing specification</a> <img src="www.gif" width="18" height="15" alt="Link outside Information Center"> (http://www.w3.org/TR/xmldsig-core).</p>
<table border="1" cellpadding="3" cellspacing="0">
<tr valign="top">
<th>Name</th>
<th>Purpose</th>
</tr>
<tr valign="top">
<td><strong>Encryption name</strong></td>
<td>Encryption name is the name of this encryption information entry. This is an alias for the entry.</td>
</tr>
<tr valign="top">
<td><strong>Data encryption method algorithm</strong></td>
<td>Data encryption method algorithms are designed for encrypting and decrypting data in fixed size, multiple octet blocks. This algorithm must be the same as the algorithm selected in the client request sender configuration.</td>
</tr>
<tr valign="top">
<td><strong>Key encryption method algorithm</strong></td>
<td>Key encryption method algorithms are public key encryption algorithms specified for encrypting and decrypting keys. This algorithm must be the same as the algorithm selected in the client request sender configuration.</td>
</tr>
<tr valign="top">
<td><strong>Encryption key name</strong></td>
<td>Encryption key name represents a Subject (from a certificate) found by the encryption key locator. the Subject is used by the key encryption method algorithm to decrypt the secret key, and the secret key is used to decrypt the data.
<p><strong>Note</strong>: The key chosen here should be a private key in the keystore configured by the key locator. The key should have the same Subject used by the client to encrypt the data. Encryption must be done using the public key and decryption by the private key (personal certificate). To ensure that the client encrypts the data with the correct public or private key, you must extract the public key from the server's keystore and add it to the keystore specified in the client request sender encryption configuration information.</p>
<p>For example, the personal certificate of a server is CN=Bob, O=IBM, C=US. Therefore the server contains the public and private key pair. The client sending the request should encrypt the data using the public key for CN=Bob, O=IBM, C=US. The server decrypts the data using the private key for CN=Bob, O=IBM, C=US.</p></td>
</tr>
<tr valign="top">
<td><strong>Encryption key locator</strong></td>
<td>This represents a reference to a key locator implementation. For more information on configuring key locators, see <a href="wsseccfkeyloc.htm">Configure key locators</a>.</td>
</tr>
</table><p></p></li>
<li><p>Save the file.</p></li>
</ol>
<p>It is very important to note that for decryption, the encryption key name chosen must refer to a personal certificate that can be located by the key locator of the server referenced in the encryption information. Enter the Subject of the personal certificate here, which is typically a Distinguished Name (DN). The Subject uses the default key locator to find the key. If a custom key locator is written, the encryption key name can be anything used by the key locator to find the correct encryption key. The encryption key locator references the implementation class that finds the correct key store where
this alias and certificate exist.</p>
</body>
</html>