Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved


Chapter 12 Policy Palette : Security Policy Association

Security Policy Association
Shared Configuration
The Security Policy Association shared configuration resource associates a Security Policy with a particular Service operation or SOAP resource in your project. This allows you to specify security policies for inbound or outbound SOAP messages on a per-operation or per-activity basis.
When a security policy is attached to a resource that receives SOAP messages (for example, SOAP Event Source, or the reply message of a SOAP Request Reply activity), the associated security policy is used for the incoming message. For example, if authentication is specified in the security policy, then the identity of the sender of incoming messages is checked against a list of trusted identities.
When a security policy is attached to a resource that sends SOAP messages (for example, SOAP Request Reply, SOAP Send Fault, or SOAP Send Reply), the security the associated security policy is used for the outgoing message. For example, if encryption is specified in the security policy, the outgoing message is encrypted before it is sent.
Configuration
The Configuration tab has the following fields.
The SOAP resources or Service operations to which you want to apply a Security Policy. Use the Select button to choose the desired SOAP resources or Service operations.
A Security Policy resource that specifies the security characteristics you want to apply to inbound messages.
A Security Policy resource that specifies the security characteristics you want to apply to outbound messages.
A Security Policy resource that specifies the security characteristics you want to apply to inbound fault messages.
A Security Policy resource that specifies the security characteristics you want to apply to outbound fault messages.
Inbound
The Inbound tab has the following fields.
Outbound
The Outbound tab has the following fields.
Support for Unqualified Elements
To use unqualified elements, complete one of the following tasks:

Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved