Before you begin
Prior to completing this task, you must complete the following steps:Why and when to perform this task
Complete the following steps to configure the encryption information for the server-side and client-side bindings using an assembly tool. The encryption information on the generator side is used for encrypting an outgoing Simple Object Access protocol (SOAP) message. The request generator is configured for the client and the response generator is configured for the server. In the following steps, you must configure either the client-side bindings in step 2 or the server-side bindings in step 3.
Steps for this task
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following Web site: http://www.ibm.com/developerworks/java/jdk/security/index.html.
To use this algorithm, you must download the unrestricted JCE policy file from the following Web site: http://www.ibm.com/developerworks/java/jdk/security/index.html.
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following Web site: http://www.ibm.com/developerworks/java/jdk/security/index.html.
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following Web site: http://www.ibm.com/developerworks/java/jdk/security/index.html.
Select the blank entry if the data encryption key, which is the key that is used for encrypting the message parts, is not encrypted. The key encryption algorithm for the generator and the consumer must match. For more information on configuring the encryption information for the generator, see Configuring encryption information for the generator binding with an assembly tool.
Result
After you complete this task for the consumer binding, you must configure the encryption information for consumer binding. For more information, see Configuring encryption information for the consumer binding with an assembly tool.Related tasks
Encrypting the message elements in generator security constraints with
keywords
Encrypting the message elements in generator security constraints with
an XPath expression
Configuring key information for the generator binding with an assembly
tool
Configuring encryption information for the consumer binding with an
assembly tool