TEC Workbook - IBM
TEC Workbook - IBM
TEC Workbook - IBM
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>IBM</strong> Software<br />
3.4 Summary<br />
In this lab, you saw a variety of ways in which WebSphere DataPower appliances can help secure data<br />
using its cryptographic capabilities. You learned:<br />
● How crypto certificates and crypto keys are used to dereference key and certificate files<br />
for maximum flexibility and ease of maintainability.<br />
● Crypto keys and certificates are used when creating and verifying digital signatures, as<br />
well as during encryption and decryption.<br />
● You can add a digital signature to an XML message simply by dragging a sign action onto<br />
the processing rule and identifying which key to use.<br />
● Field level, as well as message level encryption and decryption can be performed without<br />
sacrificing performance as a result of hardware encryption technology.<br />
● The transaction probe is a powerful tool that allows you to visually inspect every aspect of<br />
a transaction, helping to identify configuration or communication problems.<br />
Page 68 WebSphere Lab Jam