23.02.2013 Views

TEC Workbook - IBM

TEC Workbook - IBM

TEC Workbook - IBM

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>IBM</strong> Software<br />

__9. You can verify that soapUI accepted the digital signature by looking at the soapUI log. At the<br />

bottom of the soapUI window is a button to show the soapUI log.<br />

If soapUI could not verify the signature created by DataPower, the log would contain an error message.<br />

3.3 WS-Security Encryption & Decryption<br />

Similarly to digital signatures, encryption use PKI keys and certificates for encryption and decryption.<br />

When encrypting a message, the recipient's public key is used; only the private key can decrypt the<br />

message.<br />

3.3.1 Decrypting the request and encrypting the response<br />

In the following steps, you’ll add the necessary actions to decrypt the request (from soapUI) and then<br />

encrypt the response (going back to soapUI).<br />

__1. Reopen the policy editor by clicking the ellipsis in the Multi-Protocol Gateway page.<br />

__2. Drag a decrypt action in front of the verify signature action.<br />

__3. Double click the decrypt action to provide additional details for its configuration.<br />

__4. In the Decrypt Key dropdown, select ProductServiceCryptoKey.<br />

__5. Click Done.<br />

Page 64 WebSphere Lab Jam

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!