Before you begin
Prior to completing this task, you must complete the following steps:Why and when to perform this task
Complete the following steps to configure the encryption information for the server-side and client-side bindings using an assembly tool. The encryption information on the consumer side is used for decrypting the encrypted message parts in the incoming Simple Object Access Protocol (SOAP) message. The response consumer is configured for the client and the request consumer is configured for the server. In the following steps, you must configure either the client-side bindings in step 2 or the server-side bindings in step 3.
Steps for this task
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following Web site: http://www.ibm.com/developerworks/java/jdk/security/index.html.
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following Web site: http://www.ibm.com/developerworks/java/jdk/security/index.html.
This algorithm must match the data encryption algorithm that is configured for the generator. For more information on configuring the encryption information for the generator, see Configuring encryption information for the generator binding with an assembly tool.
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following Web site: http://www.ibm.com/developerworks/java/jdk/security/index.html.
To use this algorithm, you must download the unrestricted Java Cryptography Extension (JCE) policy file from the following Web site: http://www.ibm.com/developerworks/java/jdk/security/index.html.
Select the blank entry if the data encryption key, which is the (key used for encrypting the message parts, is not encrypted. This key encryption algorithm for the consumer must match the key encryption algorithm for the generator. For more information on configuring the encryption information for the generator, see Configuring encryption information for the generator binding with an assembly tool.
Result
After you complete this task for the consumer binding, you must configure the encryption information for generator binding if this task was not previously completed. For more information, see Configuring encryption information for the generator binding with an assembly tool.Related tasks
Encrypting message elements in consumer security constraints with keywords
Encrypting message elements in consumer security constraints with an
XPath expression
Configuring encryption information for the generator binding with an
assembly tool
Configuring key information for the consumer binding with an assembly
tool