Using Require Encryption Policy in Mediator
|
|
- Merilyn Dean
- 5 years ago
- Views:
Transcription
1 Using Require Encryption Policy in Mediator Contents Require Encryption in webmethods Mediator Usage of Require Encryption in webmethods Mediator Creating a New Require Encryption Policy Creating a New Virtual Service Deploying a Virtual Service to Mediator Invoking the Virtual Service Deployed in Mediator Creating a Client in SOAP UI Securing Configurations in SOAP UI Require Encryption in webmethods Mediator webmethods Mediator supports Require Encryption policy that enforces certain paths in the request should be encrypted. The scope of this document is to explain how to work with Require Encryption policy in Mediator. Require Encryption policy takes as input the XPath of the paths that are supposed to be encrypted in the request. Usage of Require Encryption in webmethods Mediator This section gives examples of how you can use the Require Encryption with webmethods Mediator. Prerequisite: Before you start, ensure that you have the integration server and mediator configured as described Overview of WS-Security policies in Mediator To configure and use the Require Encryption Policy in Mediator, you perform the following high-level steps: Create a Require Encryption policy in CentraSite. For procedures, see Creating a New Require Encryption Policy. Create a new virtual service in CentraSite. For procedures, see Creating a Virtual Service. 3. Deploy the new virtual service to Mediator. For procedures, see Deploying the Virtual Service to Mediator. 4. Invoke the virtual service deployed in Mediator. For procedures, see Invoking the Virtual Service Deployed in Mediator. Creating a New Require Encryption Policy Perform these steps to create a Require Encryption policy and save it to CentraSite. To create a Require Encryption policy 3. In CentraSite Control, go to Policies > Run-Time. Click Add Policy. In the Policy Informationpanel, specify the following fields: In this field... Name Specify... A name for the new policy. A policy name can contain any character (including spaces).
2 Description Version Optional. A description for the new policy. This description appears when a user displays a list of policies in the user interface. Optional. A version identifier for the new policy. 4. In the Scope panel, specify the following fields. Scoperefers to the set of properties that determine the target type, organization and asset type to which the policy applies. In this field... Target Type Organization Asset Types Specify... The target type to which the policy will be deployed. Choose webmethods Integration Server (i.e., the webmethods Mediator target type). The organization to which the policy applies. Choose Virtual Service Click Next. In the Available Actions dialog, choose the Require Encryption action to include in the policy. CentraSite requires the XPath of the element encrypted in the request. All namespaces in the XPath should be specified. It is mandatory that the XPath's should always start with "//". In this example, let us encrypt the sayhello content as //soapenv:envelope/soapenv:body/axis:sayhello Click Finish to save the new policy. Activate the policy when you are ready to put it into effect. Creating a New Virtual Service
3 Perform these steps to create a virtual service and save it to CentraSite. To create a virtual service 3. In CentraSite Control, go to Asset Catalog > Browse. Click the Add Asset button. In the Add Asset dialog, specify the following attributes: In this field... Do the following... Type Choose Virtual Service. Name Description Organization A name for the new virtual service. Optional. A description for the virtualized service. Specify the organization to which this virtualized service will be added. 4. Click OK to save the new virtual service. Deploying a Virtual Service to Mediator Perform these steps to deploy the new virtual service to Mediator: To deploy a virtual service In CentraSite Control, create a target webmethods Integration Server (i.e., the webmethods Mediator target type) for deploying to the Mediator if not already available. Choose the new virtual service (that you created in the previous step) and deploy to the Mediator. The following fragment shows the deployed VSD having the encryption. Request with Encryption
4 <policy id="wssecuritypolicy"> <wsp:policy xmlns:wsp=" xmlns:wsu=" ility-0.xsd" wsu:id="wssecuritypolicy"> <wsp:exactlyone> <wsp:all> <sp:asymmetricbinding xmlns:sp=" <sp:initiatortoken> <sp:x509token sp:includetoken=" etoken/alwaystorecipient"> <sp:wssx509v3token10 /> </sp:x509token> </sp:initiatortoken> <sp:recipienttoken> <sp:x509token sp:includetoken=" etoken/never"> <sp:wssx509v3token10 /> </sp:x509token> </sp:recipienttoken> <sp:algorithmsuite> <sp:tripledesrsa15 /> </sp:algorithmsuite> <sp:layout> <sp:strict /> </sp:layout> </sp:asymmetricbinding> <sp:wss10 xmlns:sp=" <sp:mustsupportrefkeyidentifier /> <sp:mustsupportrefissuerserial /> </sp:wss10> <sp:encryptedelements xmlns:sp=" <sp:xpath xmlns:axis=" xmlns:soapenv=" penv:body/axis:sayhello</sp:xpath> </sp:encryptedelements> </wsp:all> </wsp:exactlyone> </policy>
5 The significance of the policy structure is with the <sp:encryptedelements> tag which contains the element that is to be encrypted. In this example, it is the sayhello element in the request. Invoking the Virtual Service Deployed in Mediator For the sake of simplicity, SOAP UI will be used as a client to invoke the virtual service deployed on the Mediator. To invoke the virtual service deployed on the Mediator, you perform the following steps: Create a Client in SOAP UI Securing Configurations in SOAP UI Creating a Client in SOAP UI Perform these steps to create a client in SOAP UI: To create a client in SOAP UI On the Task bar in SOAPUI, navigate to *File? New Soap UI Project{*}. Enter the WSDL for the virtual service. The Virtual service WSDL can be found at Summary Tab in CentraSite Click OK. You will find a sample request named 'EncryptMyRequest' to the virtual service is created. Securing Configurations in SOAP UI Perform these steps to secure configurations in SOAP UI: To secure configurations in SOAP UI Click on the project 'EncryptMyRequest' that was created in the previous step and navigate to Security Configurations.
6 Import the keystore for SOAP UI (to encrypt). Remember this should be the same keystore file that is configured in the server.
7 Check to make sure that the keystore is imported successfully. Create an outgoing WS-Security configuration.
8 Apply the security configuration to the request. Right click on the request *Outgoing WSS?Apply "MySecurity"{*}.
9 The plain request before encryption for an Echo service: Request before Encryption <soapenv:envelope xmlns:soapenv=" xmlns:axis=" <soapenv:header/> <soapenv:body> <axis:sayhello> <axis:name>test</axis:name> </axis:sayhello> </soapenv:body> </soapenv:envelope> After applying the configuration the request would look similar to this:
10 Request after Encryption <soapenv:envelope xmlns:axis=" xmlns:soapenv=" xmlns:xenc=" <soapenv:header> <wsse:security xmlns:wsse=" cext-0.xsd"> <wsse:binarysecuritytoken EncodingType=" ge-security-0#base64binary" ValueType=" ofile-0#x509v3" wsu:id="718b5a188813ba " xmlns:wsu=" ility-0.xsd">... </wsse:binarysecuritytoken> <xenc:encryptedkey Id="EncKeyId-718B5A188813BA "> <xenc:encryptionmethod Algorithm=" <ds:keyinfo xmlns:ds=" <wsse:securitytokenreference> <wsse:reference URI="#718B5A188813BA " ValueType=" ofile-0#x509v3"/> </wsse:securitytokenreference> </ds:keyinfo> <xenc:cipherdata>... <xenc:ciphervalue> </xenc:ciphervalue> </xenc:cipherdata> <xenc:referencelist> <xenc:datareference URI="#EncDataId-198"/> </xenc:referencelist> </xenc:encryptedkey> </wsse:security> </soapenv:header> <soapenv:body> <xenc:encrypteddata Id="EncDataId-198" Type=" <xenc:encryptionmethod Algorithm=" <ds:keyinfo xmlns:ds=" <wsse:securitytokenreference xmlns:wsse=" ecext-0.xsd"> <wsse:reference URI="#EncKeyId-718B5A188813BA "/> </wsse:securitytokenreference> </ds:keyinfo> <xenc:cipherdata> <xenc:ciphervalue>... </xenc:ciphervalue> </xenc:cipherdata> </xenc:encrypteddata> </soapenv:body> </soapenv:envelope>
11 From the above request, you will note that: Only the <axis:sayhello> element (highlighted) is encrypted in the request. The key used to encrypt the data is included in EncyptedKey in the header. This encryption is done using the public key of the recipient. To decrypt the message, Mediator first decrypts the key using the private key and then uses this key for decryption of messages. The <wsse:binarysecuritytoken> element includes certificate that was used to encrypt the symmetric key. It is not mandatory to add this to the request unless a require X.509 token policy is enforced along with encryption or signing policy. It is not possible to encrypt the entire body as such. Only parts inside the body can be encrypted.
SOA-Tag Koblenz 28. September Dr.-Ing. Christian Geuer-Pollmann European Microsoft Innovation Center Aachen, Germany
SOA-Tag Koblenz 28. September 2007 Dr.-Ing. Christian Geuer-Pollmann European Microsoft Innovation Center Aachen, Germany WS-FooBar Buchstabensuppe WS-BusinessActivity MTOM XPath InfoSet XML WS-Management
More informationEncryption, Signing and Compression in Financial Web Services
Danske Bank Encryption, Signing and Compression in Financial Web Services Details of how to call the Danske Bank financial web service Version 2.4.8 Encryption, Signing and Compression in Financial Web
More informationUsage of Evaluate IPAddress Action with wm Mediator
Usage of Evaluate IPAddress Action with wm Mediator INTRODUCTION PRE-REQUISITE CONFIGURATIONS Create and configure a consumer application with IP Address Create a virtual alias in BusinessUI with Evaluate
More informationDRAFT For Discussion Purposes Only
DRAFT For Discussion Purposes Only Statements or comments made by the ministry or information provided in the draft technical specifications are not binding on the ministry. In particular, the ministry
More informationWeb Services Security SOAP Messages with Attachments (SwA) Profile 1.0 Interop 1 Scenarios
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Web Services Security SOAP Messages with Attachments (SwA) Profile 1.0 Interop 1 Scenarios Working Draft 04, 21 Oct 2004 Document identifier:
More informationMinistry of Health and Long-Term Care EBS HCV SOAP Specification Version 2.19
Technical Specification for Health Card Validation (HCV) Service via Electronic Business Services (EBS) Ministry of Health and Long-Term Care EBS HCV SOAP Specification Version 2.19 Table of Contents Chapter
More informationTable of Contents. 1 / 24 Author: Kuba Krzemień
Table of Contents Introduction: What is a Web Service?...2 Installing required tools...3 Web Tools Platform Installation...3 Apache Tomcat Setup...5 SoapUI Eclipse plug-in installation (optional)...6 Creating
More informationLookup Roles Application Programming Interface (API) Version Software User s Manual (SUM)
Lookup Roles Application Programming Interface (API) Version 5.11 Software User s Manual (SUM) Document Version 5.11 June 29, 2014 Prepared by: CACI 50 N Laura Street Jacksonville FL 32202 Prepared for:
More informationImplementing WS-Security on TPF
z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Autumn 2006 Implementing WS-Security on TPF Name: Bill Cousins Venue: Distributed
More informationDRAFT For Discussion Purposes Only
DRAFT For Discussion Purposes Only Statements or comments made by the ministry or information provided in the draft technical specifications are not binding on the ministry. In particular, the ministry
More informationIEEE Key Management Summit 2008
OASIS Enterprise Key Management Infrastructure (EKMI) Version 1.3 Arshad Noor StrongAuth, Inc. Background OASIS EKMI TC Technical Committee with 4 goals: 1. Standardize Symmetric Key Services Markup Language
More informationWeb Services and Services on the Web
Web Services and Services on the Web Paul Downey BT W3C Workshop on the Web of Services for Enterprise Computing 27-28th February 2007 80s telcoms ICT ` EoI federation mobile outsourcing open ubiquitous
More informationTechnical Specifications for Electronic Business Services (EBS)
Technical Specifications for Electronic Business Services (EBS) Ministry of Health and Long-Term Care EBS - Generic Security Specification Version 2.19 Table of Contents Chapter 1 Electronic Business Services
More informationManaging WCF Services with Policy Manager Guide
Managing WCF Services with Policy Manager Guide Copyright 2010, SOA Software, Inc. Managing WCF Services with Policy Manager i Trademarks SOA Software and the SOA Software logo are either trademarks or
More informationSecurity Aspects Analysis in Mobile Web Service Provisioning
Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik V Prof. Dr. Matthias Jarke Security Aspects Analysis in Mobile Web Service Provisioning Master Thesis Kiran Kumar Pendyala Matriculation
More informationWeb Services Security - Basics
Web Services Security - Basics Michael Pühlhöfer, Senior IT-Architect, IBM Software Group Member of IBM Technical Expert Council 1 Agenda 1. Security Requirements for Peer-to-Peer Applications 2. Web Services
More informationLab 3: Simple Integration Use Case
Exercise 1 : Create the web service...2 Exercise 2 : Deploy the web service...4 Exercise 3 : Test the service...8 1/16 In this exercise, you will learn how to activate a Maximo inbound web service. This
More informationWeb Services Security SOAP Messages with Attachments (SwA) Profile 1.1
1 2 3 4 Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1 OASIS Public Review Draft 01, 28 June 2005 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
More informationW3C WORKSHOP ON CONSTRAINTS AND CAPABILITIES FOR WEB SERVICES SAP Position Paper
W3C WORKSHOP ON CONSTRAINTS AND CAPABILITIES FOR WEB SERVICES SAP Position Paper 1 September 2004 Author: Claus von Riegen, SAP AG INTRODUCTION While the core Web services standards for message exchange
More informationWeb Services Security Policy Language (WS-SecurityPolicy)
Web Services Security Policy Language (WS-SecurityPolicy) July 2005 Version 1.1 Authors Giovanni Della-Libera, Microsoft Martin Gudgin, Microsoft Phillip Hallam-Baker, VeriSign Maryann Hondo, IBM Hans
More informationBare SOAP-UI for WS-Security
Draft Draft Bare SOAP-UI for WS-Security Paul Glezen, IBM Abstract This document is a member of the Bare Series of WAS topics distributed in both stand-alone and in collection form. The latest renderings
More informationSOAP-Based Security Interaction of Web Service in Heterogeneous Platforms *
Journal of Information Security, 2011, 2, 1-7 doi:10.4236/jis.2011.21001 Published Online January 2011 (http://www.scirp.org/journal/jis) SOAP-Based Security Interaction of Web Service in Heterogeneous
More informationWS-SecureConversation v1.0
WS-SecureConversation v1.0 Working Draft, 08 December 2005 Artifact Identifier: ws-sx-spec-draft-v1-r0-ws-secureconversation Location: Current: docs.oasis-open.org/ws-sx/200512/ws-secureconversation This
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 13
1 Roadmap Dave Bain PeopleSoft Product Management 2 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
More informationWeb Services Security X.509 Certificate Token Profile 1.1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Web Services Security X.509 Certificate Token Profile 1.1 OASIS Standard incorporating Approved Errata, 01
More informationUser Management Interfaces for Earth Observation Services
Open Geospatial Consortium Inc. Date: 2009-06-30 Reference number of this OGC project document: 07-118r1 Version: 0.0.4 Category: OGC Interoperability Program Report Editors: R.Smillie, A.Cucumel SPACEBEL
More informationWS-SecureConversation 1.3
WS-SecureConversation 1.3 Committee Specification 01, 29 November 2006 Artifact Identifier: ws-secureconversation-1.3-spec-cs-01 Location: Current: http://docs.oasis-open.org/ws-sx/ws-secureconversation/200512/
More informationmyinsight for Documentum myinsight Web Services User Guide
myinsight for Documentum myinsight Web Services User Guide Contents 1. Version History... 3 2. Product... 4 3. Webservice Introduction... 6 3.1. REST End Points... 6 3.2. SOAP End Points...6 4. Authorization...
More informationAffordable Care Act (ACA) Information Returns (AIR) AIR Submission Composition and Reference Guide
Affordable Care Act (ACA) Information Returns () Submission Composition and Reference Guide Version 2.0 July 2015 Composition & Reference Guide Table of Contents 1 Introduction... 1 1.1. Identification...
More informationWeb Services Security X.509 Certificate Token Profile 1.1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Web Services Security X.509 Certificate Token Profile 1.1 OASIS Public Review Draft 28 June 2005 OASIS
More informationWeb Services Security X.509 Certificate Token Profile
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Web Services Security X.509 Certificate Token Profile Monday, 15 March 2004 Document
More informationSecure Addressing Profile 1.0
GFD-R-P.131 Duane Merrill, UVa Open Grid Services Architecture (OGSA ) Working Group June 13, 2008 Secure Addressing Profile 1.0 Status of This Document This document provides a recommendation to the Grid
More informationDeveloping Extensible Applications for Oracle Web Services Manager 12c (12.2.1)
[1]Oracle Fusion Middleware Developing Extensible Applications for Oracle Web Services Manager 12c (12.2.1) E57781-01 October 2015 Documentation for software developers that describes how to develop custom
More informationSecured ecollege Web Services Working with Web Services Security
ECOLLEGE Secured ecollege Web Services Working with Web Services Security VERSION 1.0 Revision History... 3 Introduction... 4 Definition... 4 Overview... 4 Authenticating SOAP Requests... 5 Securing the
More informationWS-SecurityPolicy 1.3
WS-SecurityPolicy 1.3 OASIS Standard 2 February 2009 Specification URIs: This Version: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/v1.3/os/ws-securitypolicy-1.3-spec-os.doc (Authoritative) http://docs.oasis-open.org/ws-sx/ws-securitypolicy/v1.3/os/ws-securitypolicy-1.3-spec-os.pdf
More informationIUID Registry Application Programming Interface (API) Version Software User s Manual (SUM)
IUID Registry Application Programming Interface (API) Version 5.11 Software User s Manual (SUM) Document Version 5.11 January 04, 2016 Prepared by: CACI 50 N Laura Street Jacksonville FL 32202 Prepared
More informationWeb. Web. Java. Java. web. WebService. Apache Axis. Java web service. Applet Servlet JSP SOAP WebService XML J2EE. Web (browser)
Java Web Java web Applet Servlet JSP SOAP WebService XML J2EE WebService Web (browser) WSDL (Web Service Description Language) RPC) SOAP 80 () Apache Axis Apache AxisJavaSOAP (SOAPWeb XML.NET Java) tomcat
More informationOracle Web Service Manager Implementation Guide Oracle FLEXCUBE Universal Banking Release [April] [2014]
Oracle Web Service Manager Implementation Guide Oracle FLEXCUBE Universal Banking Release 12.0.3.0.0 [April] [2014] Table of Contents 1. INTRODUCTION... 1-1 2. PREREQUISITES... 2-1 3. INSTALLATION... 3-1
More informationOIO WS-Trust Profile. Version 1.0. IT- & Telestyrelsen October 2009
> OIO WS-Trust Profile Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 General Requirements 5 Usage 5 Processing Rules
More informationInForm Clinical Data API Guide
InForm Clinical Data API Guide Oracle Health Sciences InForm 6.1 Part Number: E51806-01 Copyright 2014, Oracle and/or its affiliates. All rights reserved. The Programs (which include both the software
More informationWeb Services Security: SAML Interop 1 Scenarios
1 2 3 4 Web Services Security: SAML Interop 1 Scenarios Working Draft 04, Jan 29, 2004 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Document identifier: Location: http://www.oasis-open.org/committees/wss/
More informationTestbed-12 OWS SOAP User Guide
Testbed-12 OWS SOAP User Guide Table of Contents 1. Introduction............................................................................. 3 1.1. SOAP Primer.........................................................................
More informationWeb Services Security: SOAP Message Security
1 2 3 4 Web Services Security: SOAP Message Security Working Draft 10, Sunday, 23 February 2003 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Document identifier: WSS: SOAP Message Security
More informationWeb Services Security: SOAP Message Security
1 2 3 4 Web Services Security: SOAP Message Security Working Draft 11, Monday, 03 March 2003 5 6 7 8 9 10 11 12 13 14 15 Document identifier: WSS: SOAP Message Security -11 Location: TBD Editors: Phillip
More informationAn introduction API testing with SoapUI
An introduction API testing with SoapUI Vincent Vonk 12-06-2018 CGI Group Inc. Agenda for the next 50 minutes What is SoapUI? What are Web APIs? Why test on API level? What can SoapUI do? Types of Web
More informationWeb Services Security: X.509 Certificate Token Profile
1 2 3 4 Web Services Security: X.509 Certificate Token Profile OASIS Standard 200401, March 2004 5 6 7 (Japanese Translation): XML (XML Consortium Security SIG) (Editors): MATSUNAGA, Yutaka NISHIMURA,
More informationUsage of "OAuth2" policy action in CentraSite and Mediator
Usage of "OAuth2" policy action in CentraSite and Mediator Introduction Prerequisite Configurations Mediator Configurations watt.server.auth.skipformediator The pg.oauth2 Parameters Asset Creation and
More informationUsing BMC SRM OOB Web Services
Using BMC SRM OOB Web Services The BMC Service Request Management application is shipped with a number of OOB Web Services that can be used to Create, Query and Modify requests (see Figure 1. at end of
More informationCAQH CORE X12 Document Submission Service Interface Specifications
Nationwide Health Information Network (NHIN) Service Interface CAQH CORE X12 Document Submission Service Interface s V 1.0 3/6/2012 Page 1 of 26 Contributors Name Organization Area Melanie Combs- esmd
More informationUsing WS-Policy in service monitoring
Using WS-Policy in service monitoring L. Baresi, S. Guinea, and P. Plebani Dipartimento di Elettronica ed Informazione Politecnico di ilano Piazza L. da Vinci, 32-20133 ilano (Italy) baresi guinea plebani@elet.polimi.it
More informationIBAN Complete Web Service Version SHA 2 Implementation Guide
Version 4.0.0 SHA 2 Implementation Guide 22 June 2016 2016 ACCUITY, INC. All Rights Reserved. No part of this manual may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
More informationDeveloping Extensible Applications for Oracle Web Services Manager 12c (12.1.3)
[1]Oracle Fusion Middleware Developing Extensible Applications for Oracle Web Services Manager 12c (12.1.3) E47703-02 February 2015 Documentation for software developers that describes how to develop custom
More informationCreate an account in Salesforce using the Web Services consumer functionality
Name of Solution: Mapping : Salesforce ACCOUNT using Web Services Business Requirement: Create an account in Salesforce using the Web Services consumer functionality Description: SalesForce provides a
More informationPolicy Support in Eclipse STP
Policy Support in Eclipse STP www.eclipse.org/stp By Jerry Preissler & David Bosschaert Agenda What is a policy? How can you work with the STP policy editor? Exercise 1 + 2 What can you do with policies?
More informationWeb Services Security
Web Services Security Strategies for Securing Your SOA Aaron Mulder CTO Chariot Solutions Agenda Define Web Services Security DIY Security HTTPS WS-Security WS-I Basic Security Profile Conclusion Q&A 2
More informationSecuring WebLogic Web Services for Oracle WebLogic Server 12c (12.2.1)
[1]Oracle Fusion Middleware Securing WebLogic Web Services for Oracle WebLogic Server 12c (12.2.1) E55198-01 October 2015 Documentation for security software developers that describes how to secure WebLogic
More informationHow To Add a Borrower Via Web Services API
How To Add a Borrower Via Web Services API Summary This document outlines the use of the Web Services API available in the version 5(v5) knowledge content and library management (KCLM) solution for adding,
More informationWS-Trust 1.3. OASIS Standard 19 March 2007
WS-Trust 1.3 OASIS Standard 19 March 2007 Artifact Identifier: ws-trust-1.3-spec-os Location: This Version: http://docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.doc http://docs.oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os.pdf
More informationMonitoring WAAS Using XML API
CHAPTER 4 This chapter describes how to use the WAAS API to monitor your WAAS devices and how to use soapui with the WAAS API interface. This chapter contains the following sections: Information About
More informationOracle Fusion Middleware
Oracle Fusion Middleware Securing WebLogic Web Services for Oracle WebLogic Server 11g Release 1 (10.3.1) E13713-01 May 2009 This document explains how to secure WebLogic Web services for Oracle WebLogic
More informationDocuSign Information Guide. Send On Behalf Of Functionality. Overview. Table of Contents
DocuSign Information Guide Send On Behalf Of Functionality Overview The DocuSign Send On Behalf Of functionality permits automated sending through the DocuSign API by an integrated sender on behalf of
More informationCA SiteMinder Web Services Security
CA SiteMinder Web Services Security Policy Configuration Guide 12.52 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationHP Operations Orchestration
HP Operations Orchestration for the Windows and Linux operating systems Software Version: OO 10.x Web Services Wizard Guide Document Release Date: February 2014 Software Release Date: February 2014 Legal
More informationThe BritNed Explicit Auction Management System. Kingdom Web Services Interfaces
The BritNed Explicit Auction Management System Kingdom Web Services Interfaces Version 5.2 February 2015 Page 2 of 141 Contents 1. PREFACE... 7 1.1. Purpose of the Document... 7 1.2. Document Organization...
More informationREVENUE ONLINE SERVICE
REVENUE ONLINE SERVICE Page 1 of 8 DOCUMENT CONTROL Document Holder Brian Jones Change History Version Date Change 1.0 13/11/01 Document Created 1.1 26/06/2012 Updated the following fields to allow them
More informationSafetyNet Web Services
SafetyNet Web Services Application Program Interface (API) Reference Document November 11, 2017 Copyright 2014-2017 Predictive Solutions, Inc. All rights reserved. Table of Contents Revision History...
More informationAdditional Connectivity Options
Additional Connectivity Options from the book SAP Cloud Platform Integration by Bilay, Gutsche, Krimmel, and Stiehl Your guide to mastering SAP Cloud Platform Integration! In this online appendix, we briefly
More information[MS-OXSHRMSG]: Sharing Message Attachment Schema. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-OXSHRMSG]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
More informationWeb Services Secure Conversation Language (WS-SecureConversation)
Web Services Secure Conversation Language (WS-SecureConversation) Version 1.1 May 2004 Authors Steve Anderson, OpenNetwork Jeff Bohren, OpenNetwork Toufic Boubez, Layer 7 Marc Chanliau, Netegrity Giovanni
More informationWeb Services Security Addendum
Web Services Security Addendum Version 1.0 August 18, 2002 Authors Giovanni Della-Libera, Microsoft Phillip Hallam-Baker, VeriSign Maryann Hondo, IBM Chris Kaler (Editor), Microsoft Hiroshi Maruyama, IBM
More informationIndustry Training Register. Guide to integration for ITOs
Industry Training Register Guide to integration for ITOs Version 5.0 Objective id A823307 Published 15 January 2013 Page 2 of 29 ITR guide to integration for ITOs Contents 1 INTRODUCTION... 4 1.1 About
More informationeidas-node and SAML Version 2.0
eidas-node and SAML Version 2.0 Document history Version Date Modification reason Modified by 1.0 06/10/2017 Origination DIGIT 2.0 11/04/2018 Editorial improvements DIGIT Disclaimer This document is for
More informationObjective: Review how to use access the Bulkvs.com Origination and 911 SOAP API using SOAP UI
Objective: Review how to use access the Bulkvs.com Origination and 911 SOAP API using SOAP UI Perquisites: 1. Have access to your bulkvs.com API ID 2. Have an MD5 equivalent of your bllkvs.com password
More informationONVIF Advanced Security Client Test Specification
ONVIF Advanced Security Client Test Specification Version 17.06 June 2017 www.onvif.org 2017 ONVIF, Inc. All rights reserved. Recipients of this document may copy, distribute, publish, or display this
More informationSetting up B2B and Frequently Asked Questions
Setting up B2B and Frequently Asked s 11-1-2017 16:45 Content 1 Steps to perform... 2 1.1 Step 1: Read the available documentation... 2 1.2 Step 2: Request a certificate... 2 1.3 Step 2: Get your IT ready...
More informationOracle Application Server
Oracle Application Server Web Services Security Guide 10g (10.1.3.1.0) B28976-01 September 2006 Oracle Application Server Web Services Security Guide 10g (10.1.3.1.0) B28976-01 Copyright 2006, Oracle.
More informationUser Management Interfaces for Earth Observation Services
Open Geospatial Consortium Inc. Date: 208-04-23 Reference number of this OGC project document: 07-118r1 Version: 0.0.2 Category: OGC Interoperability Program Report Editors: R.Smillie, A.Cucumel SPACEBEL
More informationPower IQ WS-API Programming Guide Release 2.0
Power IQ WS-API Programming Guide Release 2.0 Copyright 2010 Raritan, Inc. PIQAPI-0B-v2.0-E September 2010 255-80-6102-00 This document contains proprietary information that is protected by copyright.
More informationWeb Services Security: SOAP Message Security 1.0 (WS-Security 2004) Errata 1.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 2 Web Services Security: SOAP Message Security 1.0 (WS-Security 2004) Errata 1.0 OASIS Standard 200401, June 2004 Document identifier: {WSS: SOAP Message Security }-{1.0}
More informationNo Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.
[MS-MDE]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
More informationCRM On Demand. Oracle CRM On Demand CTI Developer s Guide
CRM On Demand Oracle CRM On Demand CTI Developer s Guide Release 37 August 2018 Copyright 2005, 2018 Oracle. All rights reserved. This software and related documentation are provided under a license agreement
More informationMtS-ISL-SUD-SDNS for ARM Transaction Reporting (Article 26 of MiFIR) Commodities Position Reporting (Article 58 of MiFID II)
MtS-ISL-SUD-SDNS for ARM Transaction Reporting (Article 26 of MiFIR) Commodities Position Reporting (Article 58 of MiFID II) This tutorial describes how to send Transaction or Commodities Reports in ISO
More informationExchange Address Book Order
Exchange Address Book Order From your Outlook Ribbon, locate the Address Book Click on Tools, Options 3 options are available, as shown below, select Custom to arrange the order of your address books.
More informationJBoss SOAP Web Services User Guide. Version: M5
JBoss SOAP Web Services User Guide Version: 3.3.0.M5 1. JBoss SOAP Web Services Runtime and Tools support Overview... 1 1.1. Key Features of JBossWS... 1 2. Creating a Simple Web Service... 3 2.1. Generation...
More informationSpring Web Services. 1. What is Spring WS? 2. Why Contract First? 3. Writing Contract First WS. 4. Shared Components. Components:
Spring Web Services 1. What is Spring WS? Components: spring-xml.jar: various XML support for Spring WS spring-ws-core.jar: central part of the Spring s WS functionality spring-ws-support.jar: contains
More informationTIBCO ActiveMatrix Policy Director Administration
TIBCO ActiveMatrix Policy Director Administration Software Release 2.0.0 November 2014 Document Updated: January 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
More informationReliable Messaging between SAP XI 3.0 and Microsoft BizTalk Server 2004 Using SOAP-Compliant Communication
Collaboration Technology Support Center Microsoft Collaboration Brief October 2005 Reliable Messaging between SAP XI 3.0 and Microsoft BizTalk Server 2004 Using SOAP-Compliant Communication André Fischer,
More informationWSRP Web Services for Remote Portlets
WSRP Web Services for Remote Portlets Dave Landers WebLogic Portal Architect BEA Systems, Inc. Session Goals Basic WSRP description Outline of protocol Why / when WSRP is useful Developer best practices
More informationWSG B2B Web Service Tutorial WSG Information Services
WSG B2B Web Service Tutorial WSG Information Services Issue date 29.10.2014 Replaces version 4 Valid until Classification Status recalled or replaced by new version Technical Support Documentation released
More informationSubject Key Attestations in KeyGen2
Subject Key Attestations in KeyGen2 For on-line (remote) provisioning of keys to Security Elements (SEs), like Smart Cards, there is a whish by issuers to be able to securely verify that the public key
More informationWSDL describes a service interface Not sufficient: many other aspects of a service needs to be modeled Policies generally define the other
WSDL describes a service interface Not sufficient: many other aspects of a service needs to be modeled Policies generally define the other requirements, constraints, and properties of a service
More informationA Platform-Independent Guide to Supporting InfoCard v1.0 within Web Applications and Browsers
A Platform-Independent Guide to Supporting InfoCard v1.0 within Web Applications and Browsers February 2006 Authors Michael B. Jones, Microsoft Corporation Copyright Notice (c) 2006 Microsoft Corporation.
More informationVALIDATION AND APPROVAL OF PN CIPHERED SUBNETS: SECURITY IN PN SHARING AND STORAGE USING PNML, XMLSECURITY AND XMLSIGNATURE
VALIDATION AND APPROVAL OF PN CIPHERED SUBNETS: SECURITY IN PN SHARING AND STORAGE USING PNML, XMLSECURITY AND XMLSIGNATURE Iñigo León Samaniego (a), Mercedes Perez-Parte (b), Juan-Ignacio Latorre-Biel
More informationPerceptive TransForm Web Services Autowrite
Perceptive TransForm Web Services Autowrite Getting Started Guide Version 8.10.x Overview The 8.10.0 release of TransForm provides the ability to transmit form data using a web service as the destination
More informationInforce Transactions TECHNICAL REFERENCE. DTCCSOLUTIONS September Copyright 2011 Depository Trust Clearing Corporation. All Rights Reserved.
TECHNICAL REFERENCE Inforce Transactions Page 1 Table of Contents 1 Overview... 3 2 Roles and Responsibilities... 3 2.1 Participants... 3 2.2 DTCC Server... 4 3 Communication Protocols... 5 3.1 SOAP Messages...
More information[MS-MDE]: Mobile Device Enrollment Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-MDE]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,
More informationService Enablement Installation and Configuration Guide for A9.3 Release A9.3
[1]JD Edwards World Service Enablement Installation and Configuration Guide for A9.3 Release A9.3 E21965-04 March 2018 JD Edwards World Service Enablement Installation and Configuration Guide for A9.3,
More informationDeveloper s Guide. Trimble SOAP Web Services
Developer s Guide Trimble SOAP Web Services SOAPWebSrvDG-Oct17-2.0 October 2017 www.trimble.com/fsm Copyright 2017, Trimble Inc. All rights reserved. Trimble and the Globe & Triangle logo are trademarks
More informationDigital Certificate Service (DCS) - User Guide
Digital Certificate Service (DCS) - User Guide Information Security Branch Contents Using this Guide... 3 User Requirements... 3 Secure E-mail Messaging... 4 Send a Secure E-mail Message... 4 Receive a
More informationWSG B2B Web Service Tutorial
WSG B2B Web Service Tutorial Issue date 08.02.2017 Replaces version 29 Valid until Classification Status recalled or replaced by new version Technical Support Documentation (BBCS and FA) Released - 1/98
More information