Go to primary content
Agile Product Lifecycle Management Security Guide
Release 9.3.5
E52156-05
  Go To Table Of Contents
Contents

Previous
Previous
 
Next
Next
 

D WS Security Configurations for Developers

This appendix provides information regarding Web Service Security configurations for developers.

D.1 Configuring WSS for Web Service Client

The following sections provide some examples of using the sample code.

For more information about Agile web services, see Agile Web Services User Guide.

D.1.1 Using Username Token Over SSL Policy

You need to configure the SSL certificate. Get the certificate, for example, sslclient.crt, and use the following command to generate a keystore sslclient.jks and import the certificate.

keytool -import -keystore sslclient.jks -storepass password -alias sslclientkey -file sslclient.crt

Configure the sample code as below and change all the required binding properties according to your environment. Make sure that the required jar file, com.oracle.webservices.wls.jaxws-wlswss-client.jar, which is under Weblogic_HOME\wlserver\modules\clients, is added.

Surrounding text describes token_example.gif.

In the example, the settings were as follows:

SSL_KEY_STORE_NAME = sslclient.jks

SSL_KEY_PASSWORD = password

D.1.2 Using SAML Token Bearer Policy

In order to use the SAML token bearer policy on the client side, you need to configure a signed key pair and SSL certificate. Complete the following steps to do the configuration.

D.1.2.1 Generate a SAML Signature Key

  1. Generate a signed key and import it into the server OPSS keystore in the server. The following command generates a signed key pair to be stored in JseSignKeyStore.jks:

    keytool -genkeypair -alias JseSignKey -keystore JseSignKeyStore.jks -keyalg RSA -sigalg SHA1withRSA -validity 3650 -dname cn=Test,ou=Agile,O=Oracle,L=Test,ST=Test,C=Test -storepass password -keypass password

  2. Use the -list option to check if the key is successfully generated. The alias name is jsesignkey

    keytool -list -keystore JseSignKeyStore.jks -storepass password

  3. Export the public key.

    keytool -exportcert -keystore JseSignKeyStore.jks -alias jsesignkey -storepass password -rfc

  4. Import the public key into Agile server keystore, similarly to Steps 5-7 mentioned in "Import File Manager SAML Signature Certificate into Agile Server Keystore", but using the different alias name of "jsesignkey"

    If all is successful, there should be a certificate under owsm/keystore named JseSignKey.

D.1.2.2 Configure SSL Certificate

Get the certificate, for example, sslclient.crt, and use the following command to import it to the keystore JseSignKeyStore.jks generated in step 1 in "Generate a SAML Signature Key" or generate a new jks.

keytool -import -keystore JseSignKeyStore.jks -storepass password -alias sslclientkey -file sslclient.crt

D.1.2.3 Configure Sample Code

Change all of the required binding properties according to your environment. Make sure the required jar com.oracle.webservices.fmw.client_12.1.3.jar, which is under Weblogic_HOME\oracle_common\modules\clients\, is added.

Surrounding text describes configure_sample_code.gif.

In this example, the settings were as follows:

SIGN_KEY_ALIAS = JseSignKey

SIGN_KEY_PASSWORD = password

SIGN_KEY_STORE_NAME = JseSignKeyStore.jks

Execute the sample. If everything is configured properly, the sample should work with the web service secured with SAML token bearer policy.