Export (0) Print
Expand All

<message> of <wsHttpBinding>

Defines settings for message-level security of the <wsHttpBinding>.

<system.serviceModel>

  <bindings>

    <wsHttpBinding>

      <binding>

        <security> of <wsHttpBinding>

          <message> of <wsHttpBinding>


									
									<wsHttpBinding>
								
									
									 <binding >
								
									
									  <security>
								
									
									   <message clientCredentialType =
								
									
										    
									
									    "None/Windows/UserName/Certificate/IssuedToken"
								
									
										    
									
									    establishSecurityContext="Boolean"
								
									
										    
									
									    negotiateServiceCredential="Boolean"
								
									
									    algorithmSuite= Enumeration. See algorithmSuite Attribute below.
								
									
									    defaultProtectionLevel="None/Sign/EncryptionAndSign" />
								
									
									  </security>
								
									
									 </binding>
								
									
									</wsHttpBinding>
								

NonDualMessageSecurityOverHttp

The following sections describe attributes, child elements, and parent elements

Attributes

Attribute Description

algorithmSuite

Sets the message encryption and key-wrap algorithms. The algorithms and the key sizes are determined by the SecurityAlgorithmSuite class. These algorithms map to those specified in the Security Policy Language (WS-SecurityPolicy) specification.

The default value is Basic256.

clientCredentialType

Optional. Specifies the type of credential to be used when performing client authentication using the security mode is Message or TransportWithMessageCredentials. See the enumeration values below. The default is Windows.

This attribute is of type MessageCredentialType.

establishSecurityContext

A Boolean value that determines whether the security channel establishes a secure session. A secure session establishes a Security Context Token (SCT) before exchanging the application messages. When the SCT is established, the security channel offers a ISession interface to the upper channels. For more information about using secure sessions, see How To: Create a Secure Session.

The default value is true.

negotiateServiceCredential

Optional. A Boolean value that specifies whether the service credential is provisioned at the client out of band, or is obtained from the service to the client through a process of negotiation. Such a negotiation is a precursor to the usual message exchange.

If the clientCredentialType attribute equals to None, Username, or Certificate, setting this attribute to false implies that the service certificate is available at the client out of band and that the client needs to specify the service certificate (using the <serviceCertificate> of <serviceCredentials>) in the <serviceCredentials> Element service behavior. This mode is interoperable with SOAP stacks which implement WS-Trust and WS-SecureConversation.

If the ClientCredentialType attribute is set to Windows, setting this attribute to false specifies Kerberos based authentication. This means that the client and service must be part of the same Kerberos domain. This mode is interoperable with SOAP stacks which implement the Kerberos token profile (as defined at OASIS WSS TC) as well as WS-Trust and WS-SecureConversation.

When this attribute is true, it causes a .NET SOAP negotiation that tunnels SPNego exchange over SOAP messages.

The default is true.

algorithmSuite Attribute

Value Description

Basic128

Use Aes128 encryption, Sha1 for message digest, and Rsa-oaep-mgf1p for key wrap.

Basic192

Use Aes192 encryption, Sha1 for message digest, Rsa-oaep-mgf1p for key wrap.

Basic256

Use Aes256 encryption, Sha1 for message digest, Rsa-oaep-mgf1p for key wrap.

Basic256Rsa15

Use Aes256 for message encryption, Sha1 for message digest and Rsa15 for key wrap.

Basic192Rsa15

Use Aes192 for message encryption, Sha1 for message digest and Rsa15 for key wrap.

TripleDes

Use TripleDes encryption, , Sha1 for message digest, Rsa-oaep-mgf1p for key wrap.

Basic128Rsa15

Use Aes128 for message encryption, Sha1 for message digest and Rsa15 for key wrap.

TripleDesRsa15

Use TripleDes encryption, Sha1 for message digest and Rsa15 for key wrap.

Basic128Sha256

Use Aes256 for message encryption, Sha256 for message digest and Rsa-oaep-mgf1p for key wrap.

Basic192Sha256

Use Aes192 for message encryption, Sha256 for message digest and Rsa-oaep-mgf1p for key wrap.

Basic256Sha256

Use Aes256 for message encryption, Sha256 for message digest and Rsa-oaep-mgf1p for key wrap.

TripleDesSha256

Use TripleDes for message encryption, Sha256 for message digest and Rsa-oaep-mgf1p for key wrap.

Basic128Sha256Rsa15

Use Aes128 for message encryption, Sha256 for message digest and Rsa15 for key wrap.

Basic192Sha256Rsa15

Use Aes192 for message encryption, Sha256 for message digest and Rsa15 for key wrap.

Basic256Sha256Rsa15

Use Aes256 for message encryption, Sha256 for message digest and Rsa15 for key wrap.

TripleDesSha256Rsa15

Use TripleDes for message encryption, Sha256 for message digest and Rsa15 for key wrap.

clientCredentialType Attribute

Value Description

None

This allows the service to interact with anonymous clients. On the service side, this indicates that the service does not require any client credential. On the client, this indicates that the client does not provide any client credential.

Certificate

Allows the service to require that the client be authenticated using a certificate. If message security mode is used and the negotiateServiceCredential attribute is set to false, the client needs to be provisioned with the service certificate.

IssuedToken

Specifies a custom token, usually issued by a Security Token Service.

UserName

Allows the service to require that the client be authenticated using a UserName credential. WCF does not support sending a password digest or deriving keys using password and using such keys for message security. As such, WCF enforces that the transport is secured when using UserName credentials. This credential mode results in either an interoperable exchange or a non-interoperable negotiation based on the negotiateServiceCredential attribute.

Windows

Allows the SOAP exchanges to be under the authenticated context of a Windows credential. If the negotiateServiceCredential attribute is set to true, this either performs an SSPI Negotiation or Kerberos (an interoperable standard).

Child Elements

None

Parent Elements

Element Description

<security> of <wsHttpBinding>

Defines the security settings for a <wsHttpBinding>.

Footer image

Send comments about this topic to Microsoft.
© Microsoft Corporation. All rights reserved.

Community Additions

ADD
Show:
© 2014 Microsoft