Network Deployment (Distributed operating systems), v8.0 > Reference > Sets


View web services server deployment descriptor

Use this page to view your server deployment descriptor settings.

This admin console page applies only to JAX-RPC applications.

Before you begin this task, the web services application must be installed.

By completing this task, you can gather information that enables you to maintain or configure binding information. After the web services application is installed, you can view the web services deployment descriptors.

To view this admin console page...

  1. Click Applications > Application Types > WebSphere enterprise applications > application_name.

  2. Under Modules, click Manage modules > URI_name.

  3. Under Web Services Properties, click View web services server deployment descriptor.

WAS ND has three levels of bindings: application-level, server-level, and cell-level. The information in the following implementation descriptions indicate how to configure the application-level bindings.

To configure the server-level bindings, which are the defaults...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

To configure the cell-level bindings, click Security > JAX-WS and JAX-RPC security runtime.



Request digital signature verification

If the integrity constraints, which require a signature, are defined, verify that you configured the signing information in the binding files.

To configure the signing parameters...

  1. Click Applications > Application Types > WebSphere enterprise applications > application_name.

  2. Under Modules, click Manage modules > URI_name.

  3. Under Web Services Properties, click Web services: Server security bindings.

  4. Under Request receiver binding, click Edit > Signing information.

To configure the trust anchor...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

  3. Under Additional properties, click Trust anchors.

To configure the collection certificate store...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

  3. Under Additional properties, click Collection certificate store.

To configure the key locators...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

  3. Under Additional properties, click Key locators.


Request decryption

If the confidentiality constraints (encryption) are specified, verify that the encryption information is defined.

To configure the encryption information parameters...

  1. Click Applications > Application Types > WebSphere enterprise applications > application_name.

  2. Under Modules, click Manage modules > URI_name.

  3. Under Web Services Security properties, click Web services: Server security bindings.

  4. Under Request receiver binding, click Edit > Encryption information.

To configure the key locators...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

  3. Under Additional properties, click Key locators.


Basic authentication

If BasicAuth authentication is configured as the required security token, specify the callback handler in the binding file to collect the basic authentication data. The following list contains callback support implementations:

com.ibm.wsspi.wssecurity.auth.callback.GuiPromptCallbackHandler

The implementation prompts for BasicAuth information (user name and password) in an interface panel.

com.ibm.wsspi.wssecurity.auth.callback.NonPromptCallbackHandler

This implementation reads the BasicAuth information from the binding file.

com.ibm.wsspi.wssecurity.auth.callback.StdPromptCallbackHandler

This implementation prompts for a user name and password using the standard in (stdin) prompt.

To configure the login mapping information...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

  3. Under Additional properties, click Login mappings.


Identity (ID) assertion authentication with the BasicAuth TrustMode

Configure a login binding in the bindings file with a com.ibm.wsspi.wssecurity.auth.callback.NonPromptCallbackHandler implementation. Specify a user name and password for basic authentication that a TrustedIDEvaluator on a downstream server trusts.

To configure the login mapping information...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

  3. Under Additional properties, click Login mappings.


Identity (ID) assertion authentication with the signature TrustMode

Configure the signing information in the bindings file with a signing key that points to a key locator. The key locator contains the X.509 certificate that is trusted by the downstream server.

To configure the login mapping information...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

  3. Under Additional properties, click Login mappings.

The JAAS uses WSLogin as the name of the login configuration.

To configure JAAS...

  1. Click Security > Global security .

  2. Under Authentication, click JAAS > Application logins .

The value of the <TrustedIDEvaluatorRef> tag in the binding must match the value of the <TrustedIDEvaluator> name.

To configure the trusted ID evaluators...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

  3. Under Additional properties, click Trusted ID evaluators.


Response signing

If the integrity constraints (digital signature) are defined, verify that we have the signing information configured in the binding files.

To specify the signing information, complete the following steps:

  1. Click Applications > Application Types > WebSphere enterprise applications > application_name.

  2. Under Modules, click Manage modules > URI_name.

  3. Under Web Services Security properties, click Web services: Server security bindings.

  4. In the Request receiver binding column, click Edit > Signing information.

To configure the key locators...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

  3. Under Additional properties, click Key locators.


Response encryption

If the confidentiality constraints (encryption) are specified, verify that the encryption information is defined.

To specify the encryption information...

  1. Click Applications > Application Types > WebSphere enterprise applications > application_name.

  2. Under Modules, click Manage modules > URI_name.

  3. Under Web Services Security properties, click Web services: Server security bindings.

  4. Under Request receiver binding, click Edit > Encryption information.

To configure the key locators...

  1. Click Servers > Server Types > WebSphere application servers > server_name

  2. Under Security, click JAX-WS and JAX-RPC security runtime.

    Mixed-version environment: In a mixed node cell with a server using WAS version 6.1 or earlier, click Web services: Default bindings for Web Services Security.mixv

  3. Under Additional properties, click Key locators.


Migrate JAX-RPC Web Services Security applications to v8.0 applications


Related


View web services client deployment descriptor

+

Search Tips   |   Advanced Search