Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Secure web services > Secure web services > Web Services Security concepts > Web Services Security concepts > Web Services Security provides message integrity, confidentiality, and authentication > High-level architecture for Web Services Security > Overview of platform configuration and bindings


Keys

Use keys for XML digital signature and encryption.

There are two predominant kinds of keys used in the current Web Services Security implementation:

In public key-based signature, a message is signed using the sender private key and is verified using the sender public key. In public key-based encryption, a message is encrypted using the receiver public key and is decrypted using the receiver private key. In secret key-based signature and encryption, the same key is used by both parties.

While the current implementation of Web Services Security can support both kinds of keys, the format of the message differs slightly between public key-based encryption and secret key-based encryption.
Overview of platform configuration and bindings

+

Search Tips   |   Advanced Search