Before you begin
Prior to completing this task, you must import your application into an assembly tool. For information on how to import your application, see Importing enterprise applications.Why and when to perform this task
The caller is used to identify the token. The run time for Web services security uses this token identity to create the security credential and principal for WebSphere Application Server. The token identity must be in the configured user registry so that the Application Server can use the token identity in Java 2 Platform, Enterprise Edition (J2EE) authorization checks.
Complete the following steps to specify the caller part when you configure the consumer security constraints for either the response consumer or the request consumer. The response consumer is configured for the client and the request consumer is configured for the server. In the following steps, you must configure either the client-side extensions in step 2 or the server-side extensions in step 3.
Steps for this task
If a stand-alone security token is used for authentication, then the Uniform Resource Identifier (URI) and local name attributes must define the type of security token that is used for authentication. You can select standard or custom security tokens by URI and local name.
URI | Local name |
---|---|
X.509 certificate token | http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3 |
X.509 certificates in a PKIPath | http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509PKIPathv1 |
A list of X509 certificates and CRLs in a PKCS#7 | http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#PKCS7 |
http://www.ibm.com/websphere/appserver/tokentype/5.0.2 | LTPA |
The Custom token requires that you specify both the URI and the Local name.
Related tasks
Signing message elements in consumer security constraints with keywords
Signing message elements in consumer security constraints with an XPath
expression
Encrypting message elements in consumer security constraints with keywords
Encrypting message elements in consumer security constraints with an
XPath expression
Configuring identity assertion