Before you begin
Complete this task to specify which parts of the request message must be decrypted by the server. You must know which parts of the request message the client encrypts because the server must decrypt the same message parts.
Prior to completing these steps, read either of the following topics to become familiar with the WS Extensions tab and the WS Binding configurations tab:These two tabs are used to configure the Web services security extensions and Web services security bindings, respectively.
Why and when to perform this task
Complete the following steps to configure the request receiver extensions:Steps for this task
What to do next
After you specify which parts of the request message to decrypt, you must specify the method to use decrypt the message. See Configuring the server for request decryption: choosing the decryption method for more information.Related concepts
XML encryption
Related tasks
Configuring the server for request decryption: choosing the decryption
method
Configuring key locators using an assembly tool
Configuring key locators using the administrative console
Configuring the server security bindings using an assembly tool
Configuring the server security bindings using the administrative console