Use this page to specify the binding configuration for the request generator.
The security constraints or bindings are defined using the application assembly process before the application is installed.
This product provides assembly tools to assemble your application.
An assembly tool is not available on the z/OS® platform.
If the security constraints are defined in the application, you must either define the corresponding binding information or select the Use defaults option on this panel and use the default binding information for the cell or server level. The default binding provided by this product is a sample. Do not use this sample in a production environment without modifying the configuration. The security constraints define what is signed or encrypted in the Web services security message. The bindings define how to enforce the requirements.
The following table shows the required and optional binding information when the digital signature security constraint (integrity) is defined in the deployment descriptor.
Information type | Required or optional |
---|---|
Signing information | Required |
Key information | Required |
Key locators | Optional |
Collection certificate store | Optional |
Token generator | Optional |
Properties | Optional |
You can use the key locators and the collection certificate store that are defined at either the cell or the server-level.
Information type | Required or optional |
---|---|
Encryption information | Required |
Key information | Required |
Key locators | Optional |
Collection certificate store | Optional |
Token generator | Optional |
Properties | Optional |
Information type | Required or optional |
---|---|
Token generator | Required |
Collection certificate store | Optional |
Properties | Optional |
You can use the collection certificate store that is defined at either the cell-level or the server-level.
標示(線上)的鏈結表示需要存取網際網路。