Operating Systems: i5/OS
Personalize the table of contents and search results
Securing Web services for V5.x applications using identity assertion
authentication
With the identity assertion authentication method, the security
token generates a wsse:Username Token element that contains a wsse:Username
element. On the request sender side, a callback handler is invoked to generate
the security token. On the request receiver side, the security token is validated.
Unlike basicauth authentication, trust is established through the use of a
security token rather than through user name and password validation.
There is an important distinction between Version
5.x and V6.0.x and later applications. The information
in this article supports V5.x applications only that are used
with WebSphere Application Server V6.0.x and later. The information
does not apply to V6.0.x and later applications.
WebSphere
Application Server provides several different methods to secure your Web services.
Identity assertion authentication is one of these methods. You might also
secure your Web services using any of the following methods:
- XML digital signature
- XML encryption
- Basicauth authentication
- Identity assertion authentication
- Signature authentication
- Pluggable token
Overview
To use identity assertion authentication to secure Web services,
complete the following tasks:
Procedure
- Secure the client for identity assertion authentication.
- Configuring the client for identity assertion: specifying the method
- Configuring the client for identity assertion: collecting the authentication
method
- Secure the server for identity assertion authentication.
- Configuring the server to handle identity assertion authentication
- Configuring the server to validate identity assertion authentication
information
Results
After completing these steps, you have secured your Web services by
using identity assertion authentication.
}
Configuring the client for identity assertion: specifying the method
Configuring the client for identity assertion: collecting the authentication
method
Configuring the server to handle identity assertion authentication
Configuring the server to validate identity assertion authentication
information
Related concepts
Identity assertion authentication method
Security token
Related tasks
Securing Web services for V5.x applications based on WS-Security
|