Encryption information configuration settingsUse this page to configure the encryption and decryption parameters.
The specifications listed on this page for the signature method, digest method, and canonicalization method are located in the World Wide Web Consortium (W3C) document entitled, XML Encryption Syntax and Processing: W3C Recommendation 10 Dec 2002.
To view this administrative console page, complete the following steps:
Then, specify the configuration in the following fields:
To specify key locator references, click Servers > Application Servers > server_name. Under Additional Properties, click Web Services: Default bindings for Web Services Security > Key Locators.
The following algorithms are supported:
The following additional algorithms are supported:
By default the Java Cryptography Extension (JCE) is shipped with restricted or limited strength ciphers. To use 192-bit and 256- bit Advanced Encryption Standard (AES) encryption algorithms, you must apply unlimited jurisdiction policy files. Before downloading these policy files, back up the existing policy files (local_policy.jar and US_export_policy.jar in the jre/lib/security/ directory) prior to overwriting them in case you want to restore the original files later. To download the policy files, complete either of the following sets of steps:
For WebSphere Application Server platforms using IBM
Developer Kit, Java Technology Edition Version 1.4.2, including the AIX, Linux,
and Windows platforms, you can obtain unlimited jurisdiction policy files
by completing the following steps:The unrestrict.zip file is downloaded onto your machine.
For WebSphere Application Server platforms
using IBM Developer Kit, Java Technology Edition Version 1.4.1, including
the AIX, Linux, and Windows platforms, you can obtain unlimited jurisdiction
policy files by completing the following steps:The unrestrict.zip file is downloaded onto your machine.
Note:
The following algorithm is supported:
The following additional algorithms are supported:
By default the JCE is shipped with restricted or limited strength ciphers. To use 192-bit and 256- bit AES encryption algorithms, you must apply unlimited jurisdiction policy files.