SOAP Over HTTP Binding Details (Consumer)
The following table describes the binding details that are displayed for the selected SOAP over HTTP binding, where the shared resource is acting as a consumer.
Property | Description |
---|---|
HTTP Client Instance | Logical name to identify the HTTP Client resource instance in the BPM runtime that will be used to call the web service.
The default value is the name of the system participant. You can bind this logical name to the appropriate HTTP Client resource instance using either of the following methods:
|
Security Configuration: | This section defines the security configuration to be applied to the binding. You should obtain the required information for the following fields from the web service provider and/or the administrator of your BPM runtime. See Configuring Security on an Outgoing Service Call for more information. |
Policy Type | Defines the type of security policy required to invoke the service - one of the following values:
|
Governance App. Name | Defines the name of the identity provider application from which the BPM runtime will obtain the authentication information needed to contact the service.
The BPM runtime will use this information to construct the WSS token (of the specified type) that will be used to authenticate the outgoing SOAP request. This field must be completed (and is only displayed) if Policy Type is set to Username Token, X509 Token or SAML Token. |
Custom Policy Set | Defines the name of an
external policy set that the BPM runtime will apply to the outgoing SOAP request (and, if appropriate, to the incoming SOAP response).
This field must be completed (and is only displayed if) Policy Type is set to Custom Policy. The external policy set:
Note: TIBCO Business Studio does not validate whether the external policy set is applicable to and correct for the target service. Using an incorrect policy type or a wrongly configured policy will result in an error, either during DAA configuration or at runtime. The BPM runtime supports a wide range of policies and policy sets that can be used to address different security requirements and scenarios. For more information about external policy sets and how to create them, see the following topics:
|