WSDL security editor overview

With the WSDL security editor you can create the SOAP security stacks that are associated with a web service operation.

Algorithm stacks contain digital certificate information and the security algorithms that are applied to messages to perform secure communication with a web service.

After an algorithm stack has been created, you associate it with an operation that is specified in the Web Services Description Language (WSDL) file of the web service. Algorithm stacks remain available in the workspace and can be reused with other WSDL files. You can also edit a test to make the same web service call several times with different security configurations.

You use the WSDL security editor to create and edit security configurations. The WSDL security editor contains two pages that correspond to the steps of setting up a security configuration:

Algorithm stacks

Algorithm stacks are composed of one or several algorithms that are arranged in a sequence of steps. Each algorithm applies a modification or transformation to the message content. Algorithms include adding timestamps, adding tokens, encrypting, or signing.

Use the Algorithm stacks page of the WSDL security editor to create stacks for service requests and responses. When the message is sent or received, each algorithm in the stack is executed in the specified order. For example, you can define a request stack that can be applied to outgoing requests to add a timestamp, sign, and then encrypt the message content, and you can define a response stack that will decrypt incoming responses.

Algorithm stack elements can be edited and moved up and down in the stack. Encryption and signature stack elements can use keystores for digital certificates.

You can create as many algorithms as required by your application.

Raw transaction data view

When a stack has been associated with a service request or response, viewing the results of each transformation step that is applied to the XML message content can be useful. You can use the Raw transaction data view to look at the message content before and after each algorithm in the stack.

Digital certificate keystores

You can add digital certificate keystores to a security stack for use with encryption or signature algorithms. Keystores must be declared with their associated passwords before the algorithms that use them. Digital certificates are contained in Java keystore (KS, JKS, and JCEKS) files that must be located in your workspace.

Associating stacks to WSDL Operations

Use the Algorithms by WSDL operations page of the WSDL security editor to associate a security algorithm stack with each web service call and message return in the WSDL file.


Feedback