23.02.2013 Views

TEC Workbook - IBM

TEC Workbook - IBM

TEC Workbook - IBM

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IBM</strong> Software<br />

3.4 Summary<br />

In this lab, you saw a variety of ways in which WebSphere DataPower appliances can help secure data<br />

using its cryptographic capabilities. You learned:<br />

● How crypto certificates and crypto keys are used to dereference key and certificate files<br />

for maximum flexibility and ease of maintainability.<br />

● Crypto keys and certificates are used when creating and verifying digital signatures, as<br />

well as during encryption and decryption.<br />

● You can add a digital signature to an XML message simply by dragging a sign action onto<br />

the processing rule and identifying which key to use.<br />

● Field level, as well as message level encryption and decryption can be performed without<br />

sacrificing performance as a result of hardware encryption technology.<br />

● The transaction probe is a powerful tool that allows you to visually inspect every aspect of<br />

a transaction, helping to identify configuration or communication problems.<br />

Page 68 WebSphere Lab Jam

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!