Keys

 

Overview

Keys are used for XML signature and encryption.

There are two predominant kinds of keys used in the current Web services security implementation...

Public key Examples include Rivest Shamir Adleman (RSA) encryption and Digital Signature Algorithm (DSA) encryption
Secret key Examples include Data Encryption Standard (DES) encryption

In public key-based signature, a message is signed using sender private key and is verified using the sender public key. In public key-based encryption, a message is encrypted using the receiver public key and is decrypted using the receiver private key. In secret key-based signature and encryption, the same key is used by both parties.

While the current implementation of Web services security can support both kinds of keys, there are a few items to note:

 

Create a new key object

To create a new key object in the key store file, go to...

Console | Servers | Application Servers | server | Web Services: Default bindings for Web Services Security Key Locators | key_locator_name | Keys | New

The Key Name specifies the name of the key object found in the key store file.

The Key Alias specifies an alias for the key object and is used when the key locator searches for the key objects in the key store.

 

See also...

  1. Key locator collection
  2. Key locator configuration settings
  3. Key configuration settings
  4. Key locator
  5. Securing Web services using XML digital signature
  6. Key configuration settings