If such references exist, click the numeric link to view a list of the objects. The number of objects that this service key provider references. See Section 4.23, "View Change History Page." Click the date and time link to view the change history of this resource. The date and time that the user created this service key provider or imported it into the configuration. The user who created this service key provider or imported it into the configuration. Table 18-3 Service Key Provider Details Property To end the session and deploy the configuration to the run time, click Activate under Change Center. The service key provider is saved in the current session. #KEYSTORE EXPLORER 4.1.1 PASSWORD#(You set the password when you create the keystore.)Ĭlick Save. In the Select an alias for SSL Client Authentication Key window, enter the password that you use to secure access to the key store. The Select an alias for SSL Client Authentication Key window displays the key aliases from the key store that your realm's PKI credential mapper is using. Next to SSL Client Authentication Key, click Browse. (You set the password when you create the keystore.) In the Select an alias for Digital Signature Key window, enter the password that you use to secure access to the key store. The Select an alias for Digital Signature Key window displays the key aliases from the key store that your realm's PKI credential mapper is using. Next to Digital Signature Key, click Browse. The proxy service uses the private key in the PKI credential to decrypt the messages that the endpoint returns. The proxy service then uses this certificate to encrypt the messages that it sends to its endpoint. When you associate this service key provider with a proxy service, Oracle Service Bus embeds the X.509 certificate into the proxy service's WSDL. Select a key alias that maps to an X.509 certificate and that supports encryption. In the Select an alias for Encryption Key window, enter the password that you use to secure access to the key store. The Select an alias for Encryption Key window displays the key aliases from the key store that your realm's PKI credential mapper is using. Table 18-2 Authentication Options To Add a Key-Pair for. You can use the same service key provider for multiple proxy services. Proxy services use this key-pair to authenticate when acting as a client during an outbound TLS/SSL (Secure Sockets Layer) connection that is, when routing a message to an HTTPS business service or proxy service that requires client-certificate authentication. Proxy services use this key-pair when its endpoint is a Web Service and the Web Service requires clients to sign one or more parts of a SOAP envelope.Ī key-pair for SSL client authentication (two-way SSL) If you want the service key provider to support digital encryption, the key store that is associated with the PKI credential mapper must contain at least one X.509 certificate that supports encryption. Proxy services use this key-pair to decrypt inbound SOAP messages that have been encrypted to conform with a Web Services Policy statement. See "Configuring the WebLogic Security Framework: Main Steps" in the Oracle Fusion Middleware Developer's Guide for Oracle Service Bus.Ī single service key provider can contain all of the following PKI credentials: To use a service key provider, you must configure a PKI credential mapping provider.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |