|
| Copyright © Cloud Software Group, Inc. All Rights Reserved |
The Security Policy shared configuration resource specifies a security policy that can be used for inbound or outbound SOAP messages. The security policy can include any combination of the following characteristics:
See TIBCO ActiveMatrix BusinessWorks Process Design for more information about using security policies for web services.
•
• See TIBCO ActiveMatrix BusinessWorks Process Design for more information about custom password lookup.
•
•
When X.509 Token is selected in the Security Token field, this field specifies the Identity resource containing the X.509 compliant identity file. See TIBCO Designer Palette Reference for more information about Identity resources. When UsernamePassword Token is selected in the Security Token field, this specifies the Identity resource that contains the username and password. See TIBCO Designer Palette Reference for more information about Identity resources. Note: If the check box is not selected, the password has to be the same for the keystore and the private keys stored inside it.
•
•
•
• Note: The certificates in the trusted folder are only necessary when the authenticating user is the same as the user who signed the message. In this case, the message contains the public key, the receiver must verify against the trusted certificate. However, if the authenticating user is not the same as the user who signed the message, the user must define a subject key identity that holds the public key.
•
•
•
• When UsernameToken is selected in the Security Token field, this shows the Identity resource that contains the username and password. See TIBCO Designer Palette Reference for more information about Identity resources. When you select X.509 Token in the Security Token field, this field indicates the Identity resource containing the X.509 compliant identity file. See TIBCO Designer Palette Reference for more information about Identity resources. When you select X.509 Token in the Security Token field, this field specifies all the references to X.509 token types for signing.Note: If the Key Identifier Type selected is of type Subject Key Identifier, ensure that the X509 Certificate used contains the Subject Key Identifier information. Note: If the check box is not selected, the password has to be the same for the keystore and the private keys stored inside it.
•
•
• Note: To use Encryption Algorithm AES-256, refer to Installing Unlimited Jurisdiction Files When X.509 Token is selected in the Private Key Identifier Type field, this field specifies the Identity resource containing the X.509 compliant private key file to use to decrypt the message. See TIBCO Designer Palette Reference for more information about Identity resources. Note: If the check box is not selected, the password has to be the same for the keystore and the private keys stored inside it.
•
•
• Note: To use Encryption Algorithm AES-256, refer to Installing Unlimited Jurisdiction Files Identity resource containing the X.509 compliant public key file to use to encrypt the message. See TIBCO Designer Palette Reference for more information about Identity resources. When you select the X.509 Token in the Security Token field, this field specifies all the references to X509 token types for encryption.You can select one of the following:Note: If the Key Identifier Type selected is of type Subject Key Identifier, ensure that the X509 Certificate used contains the Subject Key Identifier information.
|
| Copyright © Cloud Software Group, Inc. All Rights Reserved |