Skip to main content
Skip table of contents

Using Credential Files

Some Web services may require clients to authenticate themselves before allowing access to the service. The authentication process uses credentials. There are two types of credentials supported by SOAPam:

  • a userid and password used for HTTP authentication
  • a pass phrase associated with a PKCS12 certificate used for SSL client authentication

The type of authentication required, if any, is dependent on the Web service. If authentication is required, you must supply your credentials to the SOAPam Client Process to use on your behalf .

SOAPam provides a mechanism for storing your credentials in an encrypted format. Rather then specifying your credentials in clear text as a command line parameter whenever starting SOAPAMCP, you can specify the name of an encrypted credentials file. The encrypted credential information can then be used by the SOAP/CM Client Process for authentication to servers when necessary.

SOAPam credentials files are created using the MAKECF utility. Refer to Using the MAKECF Utility for more information. You can create as many SOAPam credentials files as necessary, since different Web services may require different credentials.

This example stores the userid 'myuserid' and password 'mypassword' in the encrypted credentials file "mylogin", then supplies the credentials filename with the -httpauth command line parameter when starting SOAPAMCP.

CODE
tacl> run MAKECF mylogin myuserid:mypassword
tacl> run SOAPAMCP / name $WSCP / -httpauth mylogin @otheropts

The second example stores the pass phrase in the encrypted credentials file "certpass". (Since the pass phrase was not supplied on the command line, MAKECF prompts for the information, but does not echo it.)

CODE
tacl> run MAKECF certpass
tacl> run SOAPAMCP / name $WSCP / -sslclientcert mypkcs certpass @otheropts

Note that the credentials file is location dependent, i.e., if the file is moved or renamed, the credentials cannot be decrypted. This feature is designed to disable the credentials in case the file is stolen or otherwise used inappropriately. Even though credentials become invalid when moved, system administrators should still use Guardian security to prevent unauthorized access to the contents of the file.

This example verifies the contents of the credentials file and that it is located in the correct subvolume

CODE
tacl> run MAKECF certpass -verify

Refer to Using HTTP Authentication for more information about HTTP authentication. Refer to Using Client Certificates for more information about SSL client authentication.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.