User guide

Security System Guide: Table of Contents
xviii
Chapter 16 How to Use Reliable Messaging Function for Web Services (SOAP)
PUSH Model (Receiving Messages by the Server System).........................................................16-2
Preparing a Key Pair and Public Key Used by the Receiver Server .......................................16-2
Deploying the Receiver Application .........................................................................................16-3
Preparing a Key Pair and Public Key Used by the Sender Client ...........................................16-6
Deploying the Sender Application............................................................................................16-6
PULL Model (Receiving Messages by the Client System) ...........................................................16-9
Preparing a Key Pair and Public Key Used by the Sender Server..........................................16-9
Deploying the Sender Application......................................................................................... 16-10
Preparing a Key Pair and Public Key Used by the Receiver Client...................................... 16-12
Deploying the Receiver Application ...................................................................................... 16-12
Chapter 17 How to use SSL with the ebXML Message Service
Chapter 18 How to use XML Digital Signature with ebXML Message Service
Appendix A Enhancing Security (Protecting Interstage Resources)
Protecting Interstage Resources.................................................................................................... A-2
Environment Setup for Interstage Resources Protection .............................................................. A-4
CORBA Service ........................................................................................................................ A-4
Component Transaction Service............................................................................................... A-9
Generating an Extended System....................................................................................... A-10
Generating an Interstage System Definition File............................................................... A-10
Registering the Interstage System Definition File.............................................................. A-10
Initializing Interstage ..........................................................................................................A-10
Executing the Security-Enhancing Environment Setup Command................................... A-10
Notes.................................................................................................................................. A-11
Database Linkage Service...................................................................................................... A-15
EJB Service............................................................................................................................. A-16
Environment Construction Just After Installation............................................................... A-16
Environment Construction After Constructing an Environment for EJB Service Job
Operation (Default System Only)....................................................................................... A-17
Environment Construction After Constructing an Environment for EJB Job Operation (Multi-
System).............................................................................................................................. A-17
EJB Service Operation ......................................................................................................A-18
Details of the ejbchangemode Command ......................................................................... A-19
Details of the Output Messages......................................................................................... A-21
Interstage JMS........................................................................................................................ A-25
Environment Construction ................................................................................................. A-25
Notes.................................................................................................................................. A-28
Interstage Operation Tool........................................................................................................A-28