Use this page to configure protection tokens. Protection tokens sign messages to protect integrity or encrypt messages to provide confidentiality.
You can add protection token settings for message parts when you are editing a default cell or server binding. You can also configure custom bindings for tokens and message parts that are required by the policy set.
Specifies the token generator or consumer name. Enter a name in this field when you create a new token.
Specifies the type of token. When using custom bindings, the token type is determined from the policy and cannot be edited.
Specifies the local name of the custom token generator or consumer. The Local name field is populated based on the token type displayed. Use this field to edit custom token types only.
Specifies the uniform resource identifier (URI) of the custom token generator or consumer. The URI field is populated based on the token type displayed. Use this field to edit custom token types only.
Specifies the Java Authentication and Authorization Service (JAAS) application login information. Click New to add a new JAAS application login or JAAS system login entry.
Specifies the name of the custom property. Custom properties are not initially displayed in this column until they are added.
Select one of the following actions for custom properties:
Button | Resulting Action |
---|---|
New | Creates a new custom property entry. To add a custom property, enter the name and value. |
Edit | Specifies that you can edit the selected custom property. Select this action to provide input fields and create the listing of cell values for editing. The Edit button is not available until at least one custom property has been added. |
Delete | Removes the selected custom property. |
Specifies the value of the custom property. With the Value field, you can enter, edit, or delete the value for a custom property.
After all other configurations on the protection token page are applied or saved, this section appears and links to the configuration settings for the callback handler. Click this link to specify callback handler settings that determine how security tokens are acquired from message headers.
Links marked (online) require access to the Internet.