Network Deployment (Distributed operating systems), v8.0 > Administer applications and their environment > Administer web services (generally applicable) > Administer deployed web services applications


Manage policy sets and bindings for services references

Use this administrative console task to manage policy sets and bindings for the service reference, its endpoints, and operations.

Before completing this task, install one or more Java API for API for XML-based Web Services (JAX-WS) web services, that contain at least one client service reference.

You have developed a web service that contains all the necessary artifacts and deployed your web services application into your application server instance. Now, you can attach or detach policy sets and manage the associated bindings.

New feature: When you configure the policy set attachments for a service reference, you can override the policy set attachments that are inherited from the service client . We can attach a policy set and binding for a service reference that is different from the policy set attachment for the service client. We can also specify to not attach a policy set to a service reference, even if a policy set is attached to the service client. New feature:

The default behavior is that a service reference, and its endpoints and operations, inherits the policy set attachment of the corresponding resources of the service. Service references are only valid for service clients.

Use the administrative console, you can configure the service reference to either inherit policy set and bindings configuration from the service client or to specify individual settings for the service reference by attaching policy sets and bindings that are different from the policy sets and bindings attached to the service client.

The policy set information is displayed in the Attached Policy Set column. If a policy set is directly attached, then the policy set name is displayed; for example, WS-I RSP. If there is no policy set attached, and a policy set is attached at a higher level or to the service client, then the word inherited in parentheses is appended to the policy set name: WS-I RSP (inherited). If there is no policy set attached directly or at a higher level, then None is displayed.

Every attachment of a policy set to a service artifact has an assigned binding. The binding information is displayed in the Binding column. The Binding column can contain the following values:

There are two types of bindings, application specific bindings and general bindings.

Application specific binding

We can create application specific bindings only at a policy set attachment point. These bindings are specific to and constrained to the characteristics of the defined policy. Application specific bindings are capable of providing configuration for advanced policy requirements, such as multiple signatures; however, these bindings are only reusable within an application. Furthermore, application specific bindings have very limited reuse across policy sets.

When you create an application specific binding for a policy set attachment, the binding begins in a completely unconfigured state. We must add each policy, such as WS-Security or HTTP transport, that you want to override the default binding and fully configure the bindings for each policy that we have added. For WS-Security policy, some high-level configuration attributes such as TokenConsumer, TokenGenerator, SigningInfo, or EncryptionInfo might be obtained from the default bindings if they are not configured in the application specific bindings.

For service clients, you can only create application specific bindings by selecting Assign Binding > New Application Specific Binding for service client resources that have an attached policy set. See service clients policy sets and bindings collection. Similarly, for service clients, you can only create application specific bindings by selecting Assign Binding > New Application Specific Binding for service client resources that have an attached policy set. See service client.policy set and bindings collection.

General bindings

General bindings can be configured to be used across a range of policy sets and can be reused across applications and for trust service attachments. Though general bindings are highly reusable, they are however not able to provide configuration for advanced policy requirements, such as multiple signatures. There are two types of general bindings:

We can create general client.policy set bindings by accessing Services > Policy sets > General provider policy set bindings > New in the general provider policy sets panel or by accessing Services > Policy sets > General client policy set bindings > New in the general client policy set and bindings panel. See defining and managing service client or provider bindings.

Depending on your assigned security role when security is enabled, you might not have access to text entry fields or buttons to create or edit configuration data. Review the administrative roles documentation to learn more about the valid roles for the application server.

Mixed-version environment: In a mixed cell environment, the following limitations apply to service reference attachments or resource attachments specified in name-value pair format:

mixv


Procedure

  1. Open the administrative console.

  2. In the navigation pane, click Applications > Application Types > WebSphere enterprise applications >Service_client_application_instance > Service clients.

  3. Select a service references and view the associated service reference, endpoints, and operations.
  4. We can perform any of the following actions:

    • Click Inherit, to clear existing policy set and binding settings for the service reference and to use policy set attachments that are defined by the service client. By default, a service reference, and its endpoints and operations, inherits the policy set attachment of the corresponding resources of the service.

    • Click Override, to override existing policy set and binding settings for the service client and to either define separate policy sets and bindings for the service reference or to specify that a policy set is not attached to the service reference.

    • Click Attach Client Policy Set, to attach a policy set to a selected service reference, endpoint, or operation. This button is active only after we have clicked the Override button.

    • Click, Detach Client Policy Set, to detach a policy set from a list of attached policy sets for a service reference, endpoint, or operation. The service name is the service client reference in the application. This button is active only after we have clicked the Override button.

  5. Click Assign Binding to select from a list of available bindings for the selected policy set attachment. This button is active only after we have clicked the Override button. All the bindings are listed along with the following options:

    Binding descriptions. Use the descriptions of the default bindings to determine which binding to apply to service references.

    Bindings Description
    Default Default binding for the selected service reference, endpoint, or operation. We can specify client and provider default bindings to be used at the cell level or global security domain level, for a particular server, or for a security domain. The default bindings are used when an application-specific binding has not been assigned to the attachment. When you attach a policy set to a service resource, the binding is initially set to the default. If you do not specifically assign a binding to the attachment point using this Assign Binding action, the default specified at the nearest scope is used.

    For any policy set attachment, the run time checks to see if the attachment includes a binding. If so, it uses that binding. If not, the run time checks in the following order and uses the first available default binding:

    1. Default general bindings for the server
    2. Default general bindings for the domain in which the server resides
    3. Default general bindings for the global security domain

    New Application Specific Binding Select this option to create a new application-specific binding for the policy set attachments. The new binding you create is used for the selected resources. If you select more than one resource, ensure that all selected resources have the same policy set attached.
    Client sample Select this option to use the Client sample binding.
    Client sample V2 Select this option to use the Client sample V2 binding when you are using either the Kerberos V5 WSSecurity default or the TrustServiceKerberosDefault policy sets.
    Saml Bearer Client sample Select this option to use the Saml Bearer Client sample. The Saml Bearer Client sample extends the Client sample binding to support SAML Bearer token usage scenarios. We can use this sample with any of the SAML bearer token default policy sets.
    Saml HoK Symmetric Client sample Select this option to use the Saml HoK Symmetric Client sample. The Saml HoK Symmetric Client sample extends the Client sample binding to support SAML holder-of-key (HoK) symmetric key token usage scenarios. We can use this sample with one of the SAML HoK Symmetric key default policy sets: either SAML11 HoK Symmetric WSSecurity default or SAML20 HoK Symmetric WSSecurity default.

  6. To close the drop-down list for the assign binding action, click Assign Binding.
  7. (optional) Display inherit policy set attachments confirmation. Selecting this check box enables the inherit policy set attachments confirmation panel. We must expand the Preferences section to select this check box.


Results

When you finish this task, we have specified policy sets and bindings for a service reference.


Example

Suppose that we have configured a service client reference, EchoService12 in the application instance, WSSampleClientSei. You want to attach the WSSecurity default policy to the EchoService12Port endpoint of the EchoService12 service client reference. We must override the current service client.policy set and bindings. Complete the following steps:

  1. Locate EchoService12 in the Applications > Application Types > WebSphere enterprise applications >WSSampleClientSei > Service clients collection. Alternatively, you can locate EchoService12 in the Services > Service clients collection.

  2. Click Override, to override the service client attachments.

  3. Select the check box for the EchoService12Port resource, and click Attach Client Policy Set.

  4. Select the WSSecurity default policy from the list.

  5. Click Save to save changes to the master configuration.

Suppose later, you want your service reference, EchoService12 to not use the WSSecurity default policy. Instead, to use the policy sets and attachments from the service client, WSSampleClientSei. Complete the following steps:

  1. Locate EchoService12 in the Applications > Application Types > WebSphere enterprise applications >WSSampleClientSei > Service clients collection. Alternatively, you can locate EchoService12 in the Services > Service clients collection.

  2. Click Inherit, to clear the existing policy set and binding settings for the service reference and to use policy set attachments that are defined by the service client.

  3. Click OK on the Inherit policy sets page to confirm to inherit the policy set attachments that are defined by the service client. We can optionally select the check box to not show the inherit confirmation page in the future.

  4. Click Save to save changes to the master configuration.


What to do next

We can now proceed to manage other service references for the service client or to manage policy sets and bindings for service clients at the application level .
View service providers at the cell level
View service providers at the application level
Implement web services applications with JAX-WS
Implement web services applications from existing WSDL files with JAX-WS


Related


Service reference settings
Service provider policy sets and bindings collection
Administrative roles

+

Search Tips   |   Advanced Search