Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved


Chapter 12 Policy Palette : Security Policy

Security Policy
Shared Configuration
The Security Policy shared configuration resource specifies a security policy that can be used for inbound or outbound SOAP messages. The security policy can include any combination of the following characteristics:
See TIBCO ActiveMatrix BusinessWorks Process Design for more information about using security policies for web services.
Configuration
The Configuration tab has the following fields.
See TIBCO ActiveMatrix BusinessWorks Process Design for more information about custom password lookup.
Authentication
The Authentication tab specifies the characteristics for authenticating to the SOAP message server. Inbound messages can be authenticated against a list of trusted certificates. Outbound messages can specify the identity to use to authenticate to the external SOAP server.
The Authentication tab has the following fields.
Note: If the check box is not selected, the password has to be the same for the keystore and the private keys stored inside it.
Integrity
The Integrity tab specifies the characteristics of the signatures attached to the messages. Signatures can be used to ensure that messages are not altered after creation. The integrity of inbound messages can be checked against the trusted root certificates and public certificates. Outbound messages can specify the certificate to be used to sign the outgoing message.
The Integrity tab has the following fields.
Note: The certificates in the trusted folder are only necessary when the authenticating user is the same as the user who signed the message. In this case, the message contains the public key, the receiver must verify against the trusted certificate. However, if the authenticating user is not the same as the user who signed the message, the user must define a subject key identity that holds the public key.
When you select X.509 Token in the Security Token field, this field specifies all the references to X.509 token types for signing.
Note: If the Key Identifier Type selected is of type Subject Key Identifier, ensure that the X509 Certificate used contains the Subject Key Identifier information.
Note: If the check box is not selected, the password has to be the same for the keystore and the private keys stored inside it.
Confidentiality
The Confidentiality tab specifies the encryption characteristics of messages. Inbound messages can be decrypted based on algorithms specified in the message security header and the defined private key. Outbound messages can be encrypted based on algorithms stored in a public key.
The Confidentiality tab has the following fields.
Note: To use Encryption Algorithm AES-256, refer to Installing Unlimited Jurisdiction Files
Note: If the check box is not selected, the password has to be the same for the keystore and the private keys stored inside it.
Note: To use Encryption Algorithm AES-256, refer to Installing Unlimited Jurisdiction Files
Identity resource containing the X.509 compliant public key file to use to encrypt the message. See TIBCO Designer Palette Reference for more information about Identity resources.
When you select the X.509 Token in the Security Token field, this field specifies all the references to X509 token types for encryption.You can select one of the following:
Note: If the Key Identifier Type selected is of type Subject Key Identifier, ensure that the X509 Certificate used contains the Subject Key Identifier information.
Installing Unlimited Jurisdiction Files
Java vendors ship a default set of policy files that do not permit unlimited strength cryptography. In countries exempt from these restrictions, you can download and install an unlimited strength set of the policy files.
The default set of policy files restricts usage of 256-bit AES.
Follow these steps to install the unlimited strength policy files:
1.
2.
3.
4.
Timeout
The Timeout tab specifies the characteristics of message timeout. Inbound messages can be rejected after the specified number of seconds. Outbound messages can be set to expire after the specified number of seconds.
The Timeout tab has the following fields.

Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved