Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Current »

Web Services can be secured by using various combinations of security configurations:

  • Transport Level Security with the option of enabling a Timestamp

  • Transport Level Security with Web Service Security standard with the option of enabling a Timestamp

  • Transport Level Security with Username Token and/or Addressing with the option of enabling a Timestamp

  • Transport Level Security with Web Service Security standard combined with Username Token and/or Addressing with the option of enabling a Timestamp

  • Web Service Security standard with the option of enabling a Timestamp

  • Web Service Security standard with Username Token and/or Addressing with the option of enabling a Timestamp

  • Username Token and/or Addressing with the option of enabling a Timestamp

To apply Transport Level Security (TLS v1.2), select the Enable Transport Security check box. The Web Service agents provide Web Service security by supporting XML-signature and encryption. A TimeStamp records the time of messages. Username Token uses authentication tokens and Addressing provides unique message IDs. 

The Web Service Profile - Security tab

Setting

Description

Enable Transport Security

Select this check box if you want to communicate the web service using the transfer protocol HTTPS. If you want to use the the transfer protocol HTTP, leave the check box empty.

Security Profile

Click Browse to select a security profile with certificate and configuration to use, if you prefer to use a secure connection. Refer to Security Profile for more information.

Web Service Security Settings

Applicable whether you select Enable Transport Security or not.

Enable Web Service Security For This Profile

When selected, Web Service security is used, and the other text boxes in the dialog are highlighted. The Web Service Security Settings and Username Token and Addressing check boxes are also enabled for you to configure your security settings. If you do not select any other check boxes on this tab, no Web Service Security is enabled.

Enable Encryption

When selected, messages will be encrypted. If you select this option, you must complete the text boxes in the Web Service Security Settings dialog.

Enable Binary Security Token

When selected, messages will be signed and the public certificate will be sent in the Binary Security Token element in the header of the message.

Use request signing certificate

When selected, the public certificate sent in the Binary Security Token element will be used to encrypt the message back to the client. This option will be ignored in case of a Web Service client agent.

Enable Signing

When selected, messages will be signed. If you select this option, you must complete the text boxes in the Web Service Security Settings dialog.

Security Profile

Click Browse to select a security profile with certificate and configuration to use, if you prefer to use a secure connection. Refer to Security Profile for more information.

Enable TimeStamp

When selected, messages will be recorded with the date and time.

Enable Username Token and Addressing

When selected, Username Token authentication is used, and the other text boxes in the dialog are highlighted and must be completed.

Note!

When selected, this option is applicable to both Web Service Provider agent and Web Service Request agent.

Enable WS Addressing

When selected, messages will be sent with a unique ID.

Disable Underscore Binding Mode

Use this checkbox to determine whether you want to enable or disable underscore binding mode.

Generate Keystore for Web Service Security

There are multiple ways to setup a server and client keystores, in general, both client and the server needs the public certificate to sign the messages. If the server host multiple clients it is not needed to import all clients' certificates in server keystore but then a Certificate Authority (CA) is needed. So in a multiple client scenario, the server imports the CA certificate and get its own certificate signed by the CA. All clients get their certificates signed by CA and import server public certificate in keystore. Normally this type of certificate is signed by a trusted CA.

To generate server and client keystores, you need to follow the steps in the mentioned sequence:

  1. Setup a CA as mentioned in Setting Up a Certificate Authority

  2. Generate the server keystore and certificate as mentioned in Creating Server Keystore and Certificate 

  3. Generate the client keystore and certificate as mentioned in Creating Client Keystore and Certificate.

The Web Service Profile for client and server need to select the Binary Security Token option. For the server, you also need to select the checkbox Use request signing certificate.

After following the examples of setting up the keystores, the profile settings for the client should look like this:

Profile settings for the client

And the server settings should look like this:
Profile settings for the server


  • No labels