Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Secure web services > Secure web services > Administer Web Services Security > Administer message-level security for JAX-WS web services > Secure messages using SAML


Configure client and provider bindings for the SAML sender-vouches token

Configure the client and provider policy set attachments and bindings for the SAML sender-vouches token, which includes the sender-vouches confirmation method. The sender-vouches confirmation method is used when a server needs to propagate the client identity or behavior of the client. This function is enabled in WAS v7.0.0.9 and later releases.

To use the function, first install WAS v7.0.0.9, which includes SAML sender-vouches support. After installing Version 7.0.0.9, create one or more new server profiles, or add SAML configuration settings to an existing profile. For example, in a WAS ND environment, there are multiple profiles. Read about setting up the SAML configuration for more information. The sender-vouches token must be protected using either message-level security or HTTPS transport. Therefore, determine which type of security to use.

A SAML sender-vouches token is a SAML token that uses the sender-vouches subject confirmation method. A SOAP message sender is required to protect the integrity of SOAP messages and SAML tokens so that a receiver can verify that the message contents and SAML tokens were not modified by unauthorized parties. WAS with SAML provides numerous default SAML token application policy sets and several general client and provider binding samples. The policy set for the SAML sender-vouches token is similar to the SAML bearer token policy set. The procedure shows how to create a sender-vouches policy set based on the attached SAML bearer token policy set. Before you can configure the client and provider bindings for the SAML sender-vouches token, attach SAML bearer token client and provider bindings to the JAX-WS application. For more information about the bearer policy sets, read about configuring client and provider bindings for the SAML bearer token.

We must use application-specific custom bindings instead of general bindings for sender-vouches. Therefore, if you configure sender-vouches policy sets and bindings from attached bearer token policy sets and bindings, ensure that the assigned bindings are application-specific bindings.

The procedure for creating the sender-vouches policy set begins with attaching the Web services bearer token policy sets.


Procedure

Complete the associated steps to configure the selected protection method. Follow the first set of steps to protect messages using message-level security, or follow the second set of steps to protect messages using HTTPS transport.


General sample bindings for JAX-WS applications
SSL client certificate authentication
Signing SAML tokens at the message level
Configure client and provider bindings for the SAML bearer token
Configure policy sets and bindings to communicate with STS
Encode passwords in files
IBM WAS V6.1 Security Handbook

+

Search Tips   |   Advanced Search