Table of Contents

How to create SOAP connectors that use WSS username tokens and timestamps

Summary

 

If your Process Commander application is to call a Web service that requires the WS-Security protocol, special configuration steps are required. You must configure the connector rule to include the necessary credentials in the SOAP request envelope header.

 

(The WS-Security standard, managed by WWWOASIS, is also called WSS and includes support for International Telecommunication Union's ITU X.509 public key certificates.)

Depending on the service, the connector can be configured to include any combination of the following:

  • Encryption — An encrypted token which matches the configuration of the web service.
  • Signature — A digital signature based on one of several common algorithms
  • Timestamp — A limit on the amount of time the SOAP request is valid for.
  • Username — A username/password combination.

This example demonstrates how to secure a SOAP connector with UsernameToken Authentication

 

Suggested Approach

To create a secure SOAP connector:

  1. Assuming you've already created a connector using the Connector and Metadata Accelerator, navigate to the Advanced tab of the Connect-SOAP rule.
  2. Click the Open icon next to the Security Profile field.
    In the New Instance of a Rule dialog, complete the Security Profile Name field and click Create.
  3. On the WS-Security Profile form, click the Add a Row button addrowto add a configuration.
    Select the Username Configuration Type.
  4. Complete the Username Configuration Type form. Click OK.
    username
  5. Add a Timestamp to the Configuration type. The Timestamp will be used to verify the response returned from the server.

Note: Settings defined on the WS-Security form must match the configuration of the service you are trying to connect to.

  1. Navigate to the In Flow tab. The In Flow Configuration Type is used for response messages from the SOAP service. In order to configure properly, you must know what value the server is configured to return. In this example, the server returns a Timestamp.
    in flow

Note: If you are using the Encryption or Signature Configuration type in your WS-Security profile, specify an existing Keystore or a create a new Keystore data instance. A keystore is a binary file (with either a .jks or .pfx file extension) that is used to mathematically transform plain text into an unreadable format for secure transfer.

  1. Save both the WS-Security Profile data instance and the Connect SOAP rule.

With a properly functioning Connect rule and SOAP service, the request envelope header contains the following information:

<wsse:Security soapenv:mustUnderstand="1">
<wsu:Timestamp wsu:Id="Timestamp-12468716">
<wsu:Created>2008-06-23T13:17:13.841Z</wsu:Created>
<wsu:Expires>2008-06-23T13:22:13.841Z</wsu:Expires>
</wsu:Timestamp>
<wsse:UsernameToken wsu:Id="UsernameToken-31571602">
<wsse:Username>Hal.Sturgeon</wsse:Username>
<wsse:Password Type= "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText"> password</wsse:Password> </wsse:UsernameToken>
</wsse:Security>


Related Topics

OASIS standards including WSS WWWhttp://www.oasis-open.org/specs/index.php#wssv1.1

 

 


100% found this useful

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.