Configure the caller in consumer security constraints
Configure the caller in consumer security constraints
Prior to completing this task, import your application into an assembly tool. For information on how to import your application, see Importing enterprise applications.
The caller is used to identify the token. The run time for Web services security uses this token identity to create the security credential and principal for WebSphere Application Server. The token identity must be in the configured user registry so that the Application Server can use the token identity in Java 2 Platform, Enterprise Edition (J2EE) authorization checks.
Complete the following steps to specify the caller part when you configure the consumer security constraints for either the response consumer or the request consumer. The response consumer is configured for the client and the request consumer is configured for the server. In the following steps,
configure either the client-side extensions in step 2 or the server-side extensions in step 3.
Start the assembly tool and click Window > Open Perspective > J2EE .
Optional: Locate the client-side extensions using the Project Explorer window. The Client Deployment Descriptor window is displayed. This Web service contains the extensions that you need to configure.
Complete the following steps to locate the client-side extensions:
Expand the Web Services > Client section and double-click the name of the Web service.
Click the WS Extension tab and expand the Response Consumer Configuration section.
Optional: Locate the server-side extensions using the Project Explorer window. The Web Services Editor window is displayed.
This Web service contains the extensions that you need to configure. Complete the following steps to locate the server-side extensions:
Expand the Web Services > Services section and double-click the name of the Web service.
Click the Extensions tab and expand the Request Consumer Service Configuration Details section.
Expand the Caller Part section.
Click Add to specify the caller part. The Caller Part Dialog window is displayed. Complete the following steps to configure the caller part:
Specify the name of the caller in the Name field.
Optional: Specify the name of an integrity or confidentiality part in the Required Integrity or Required Confidentiality part field if you want to select the token that used for either digital signature or encryption as the caller token. For more information on these configurations,
see the following tasks:
Important: Either complete this step or specify a token type in the Token type field in the next step.
Optional: Specify a token type in the Token type field if you want to select a stand-alone security token as the caller token.
If a stand-alone security token is used for authentication, then the Uniform Resource Identifier (URI) and local name attributes must define the type of security token that is used for authentication. You can select standard or custom security tokens by URI and local name.
If you specify a token type in the Token type field, complete the following steps:
Specify the namespace URI of the security token that is used for authentication in the URI field.
Specify the local name of the security token that is used for authentication in the Local name field. The following table shows the URI and local name combinations that are supported: