TEC Workbook - IBM
TEC Workbook - IBM
TEC Workbook - IBM
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>IBM</strong> Software<br />
__9. You can verify that soapUI accepted the digital signature by looking at the soapUI log. At the<br />
bottom of the soapUI window is a button to show the soapUI log.<br />
If soapUI could not verify the signature created by DataPower, the log would contain an error message.<br />
3.3 WS-Security Encryption & Decryption<br />
Similarly to digital signatures, encryption use PKI keys and certificates for encryption and decryption.<br />
When encrypting a message, the recipient's public key is used; only the private key can decrypt the<br />
message.<br />
3.3.1 Decrypting the request and encrypting the response<br />
In the following steps, you’ll add the necessary actions to decrypt the request (from soapUI) and then<br />
encrypt the response (going back to soapUI).<br />
__1. Reopen the policy editor by clicking the ellipsis in the Multi-Protocol Gateway page.<br />
__2. Drag a decrypt action in front of the verify signature action.<br />
__3. Double click the decrypt action to provide additional details for its configuration.<br />
__4. In the Decrypt Key dropdown, select ProductServiceCryptoKey.<br />
__5. Click Done.<br />
Page 64 WebSphere Lab Jam