This topic describes the possible entries for outgoing WS-Security messages.
Encryption Entries
You use encryption entries to encrypt a message content before request sending.
| Option | Description | 
|---|---|
| Keystore | 
 The keystore to use when encrypting the message. Must be specified on the keystore tab.  | 
| Alias | 
 The alias to use when encrypting the message.  | 
| Password | 
 The password used along with this alias.  | 
| Key Identifier Type | 
 The type of the key to use.  | 
| Embedded Key Name | 
 The name of the Embedded KeyInfo key identifier.  | 
| Embedded Key Password | 
 The password of the Embedded KeyInfo key identifier.  | 
| Symmetric Encryption Algorithms / Key Encryption Algorithm | 
 The encryption algorithm to use.  | 
| Create Encrypted Key | 
 If selected, the message will contain an encrypted key.  | 
| Parts | 
 A table containing the parts of the message to encrypt. You can specify an element by its ID, name, or namespace.  | 
SAML (Form) Entries
You use SAML (Form) entries to configure the Security Assertion Markup Language in an outgoing request.
| Option | Description | 
|---|---|
| SAML version | 
 The SAML version.  | 
| Signed | 
 If selected, the assertion will be signed by using a keystore.  | 
| Assertion type | 
 The type of the assertion.  | 
| Keystore | 
 The keystore used to sign the assertion.  | 
| Password | 
 The password used by the keystore.  | 
| Issuer | 
 The name of the assertion issuer.  | 
| Subject name | 
 The subject tested by the assertion.  | 
| Subject Qualifier | 
 The conditions checked by the assertion.  | 
| Digest Algorithm / Signature Algorithm | 
 The algorithms used to verify the conditions.  | 
| Attribute name | 
 The name of the attribute to be checked by the assertion. Available only for Attribute assertions.  | 
| Attribute values | 
 A list of values that should belong to the attribute specified above.  | 
SAML (XML) Entries
You can use a SAML (XML) entry to add a SAML assertion that you cannot generate by using a SAML (Form) entry or to enter an assertion yourself. You enter a SAML assertion directly. The assertion will be validated, and then applied to the WSS header. You can enter both SAML 1 and SAML 2 assertions.
Signature Entries
You use signature entries to sign requests.
| Option | Description | 
|---|---|
| Keystore | 
 The keystore to use when signing the message.  | 
| Alias | 
 The alias to use when signing the message.  | 
| Password | 
 The password used along with the alias.  | 
| Key Identifier Type | 
 The type of the key to use.  | 
| Signature Algorithm | 
 The XML message signature algorithm.  | 
| Signature Canonicalization | 
 The set of rules to use for XML signature formatting.  | 
| Digest Algorithm | 
 The set of rules used to create a message hash code. This code can be used to verify message integrity.  | 
| Use Single Certificate | 
 If selected, the signature will use a single certificate.  | 
| Parts | 
 A table containing the parts of the message to encrypt. You can specify an element by its ID, name, or namespace.  | 
Username Entries
You use username entries to add a UsernameToken item to a message. This token is most commonly used to pass the caller credentials.
| Option | Description | 
|---|---|
| Username | 
 The user’s login.  | 
| Password | 
 The user’s password used along with the specified login.  | 
| Add Nonce | 
 If selected, the message includes a random value to prevent an attacker from replaying the request.  | 
| Add Created | 
 If selected, a timestamp is added to the message.  | 
| Password Type | 
 Specifies how the password should be serialized.  | 
Timestamp Entries
You use timestamp entries to add the Timestamp header to the message. This header specifies the time frame during which the message is valid.
| Option | Description | 
|---|---|
| Time to Live | 
 Indicates how long the message is valid, in seconds.  | 
| Millisecond Precision | 
 Select to specify the Time to Live value in milliseconds.  | 






