Operating Systems: i5/OS
             Personalize the table of contents and search results

 

Key configuration settings

 

Use this page to define the mapping of a logical name to a key alias in a keystore file. To view this administrative console panel for the key collection on the cell level, complete the following steps:

  1. Click Security > Web services

  2. Under Default generator bindings, click Token Generators > token_generator_name.

  3. Under Additional properties, click Callback handler > Keys.

  4. Specify a new key configuration by clicking New or by clicking the key configuration name to modify the settings.

Keys are also available by clicking Key locators > key_locator_name. Under Additional properties, click Keys > New. To view this administrative console page for the key locator collection on the server level, complete the following steps:

  1. Click Servers > Application servers > server_name.

  2. Under Security, click Web services: Default bindings for Web services security.

  3. Under Default generator bindings, click Token Generators > token_generator_name.

  4. Under Additional properties, click Callback handler > Keys.

  5. Specify a new key configuration by clicking New or by clicking the key configuration name to modify the settings.

Keys are also available by clicking Key locators > key_locator_name. Under Additional properties, click Keys > New. To use this administrative console page for the key locator collection on the application level, complete the following steps:

  1. Click Applications > Enterprise applications > application_name.

  2. Click Manage modules > URI_name.

  3. [V6 only] Under Additional properties, you can access key locators for the following bindings:

  4. Under Web Services Security Properties, you can access key locators for the following bindings:

  5. Specify a new key configuration by clicking New or by clicking the key configuration name to modify the settings.

Key name

[V5 and 6 only]

Specifies the name of the key object. For digital signatures, the key name is used by the request sender or request generator signing information to determine which key is used to digitally sign the message. For encryption, the key name is used to determine the key used for encryption.

The key name must be a fully qualified, distinguished name. For example, CN:Bob,O=IBM,C=US.

Note: If you enter the distinguished name with spaces before or after commas and equal symbols, the application server normalizes the distinguished names automatically during run time by removing these extra spaces.

Key alias

[V5 and 6 only]

Specifies the alias for the key object, which is used by the key locator to find the key within the keystore file.

Key password

[V5 and 6 only]

Password that is needed to access the key object within the keystore file.




 

Related tasks


Configuring the key locator using JAX-RPC for the generator binding on the application level

 

Related Reference

Key collection

 

Reference topic