Optional Content Checking Setup

Publish the WSDL of the checker service. Publish the WSDL located at http:host_name:http_portuddidocwsdlapproval_checker.wsdl to a new or already existing business entity. You should reuse the existing WSDL portType tModels name: CheckerApi, tModels key: uddi:systinet.com:uddi:service:porttype:approvalchecker. a. b. Specify the checker in the access point of a new binding template. • If you have put your implementation of the CheckerApi into the registry classpath, then the value of access point must start with the class: prefix and continue with the fully qualified class name. For example class:com.systinet.uddi.approval.v3.approver.CheckerApiImpl . • If you have deployed your checker as a SOAP Web service , then the access point is the endpoint URL of the service. For example http:localhost:6060ContentChecker. See Developers Guide, Section 3.6, Writing a Content Checker to see the implementation example.

8. PStore Tool

The PStoreTool provides Oracle Service Registry Protected Store management. It provides functionality to: • Import and export trusted certificates locally to or from a file. • Create new security identities in the Oracle Service Registry configuration file. • Copy identities between protected stores. Note Remote protected store management via SOAP is not supported with Oracle Service Registry. The general usage is: PStoreTool [command [options]] You can perform operations from the command line or start up a GUI interface.

8.1. Commands Description

The PStore tool has the following commands: • new - Creates a new security identity in the local protected store. The configuration file of the protected store can be specified using the -config parameter. • newServer - Creates a new security identity on Oracle Service Registry. The location of the server is specified with the -url parameter. • copy - Copies the existing security identity from one protected source to another or to the Oracle Service Registry protected store. • add - Adds a trusted X.509 certificate to the local protected store. The X.509 certificate can be supplied as a local file. Page 377

8.1. Commands Description

This command can also add mapping between the security identity alias and the X.509 certificate to the user store part of the protected store. The certificate is needed only for the server-side protected store. This can be requested by using -user with the -alias option. • addServer - Adds a trusted certificate to Oracle Service Registry. This command also adds the mapping between the security identity alias and its X.509 certificate to the user store part of the Oracle Service Registry protected store. The certificate can be given in the local file or can be fetched from the local protected store. The configuration file can be specified using the -config option. • remove - Removes the given alias from the local protected store. This command can also remove an alias from the user store part of the protected store using the -user option. When removing a mapping from the user store, the X.509 certificates mapped to the given alias are also removed from the key store. • removeServer - Removes a given alias from the protected store. The alias is removed from the user store part of the protected store if it is not found in the key store. When removing mapping from the user store part, the X.509 certificates mapped to the given alias are also removed from the key store. • lsTrusted - Displays a list of the trusted certificates Subject-distinguished names from the local protected store. • lsTrustedServer - Displays a list of the trusted certificates Subject distinguished names from the server. • list - Displays all aliases contained in the key store part of the local protected store. • listServer - Displays all aliases contained in the key store part of the Oracle Service Registry protected store. • export - Exports the X.509 certificate chain stored in the key store or in the user store of the local protected store with the given alias. • exportServer - Exports the X.509 certificate chain stored in the key store or in the user store of the protected store with the given alias. • gui - Launches the graphical version of this tool. The PStore tool has the following options: • -alias alias - Alias to be used for the command. • -keyPassword password - Password for encryptingdecrypting the security identity private key. • -subject subjectDN - Subject-distinguished name to be used in the generated X.509 certificate. • -config configPath - File and path to the configuration file to be used during command execution for the source of the local protected store. • -username username - Username for authentication process. Not required if the Oracle Service Registry server is unsecured. • -password password - Password for authentication process. Not required if the server is unsecured. • -secprovider provider - Authentication mechanism used during the authentication process. Not required if the server is unsecured. • -certFile certPath - File and path to the X.509 certificate stored in a local file. • -user - Indicates that a command should be executed only with the contents of the user store of the protected store. Page 378

8.1. Commands Description