SSLDOC - Cloudfront.net

advertisement
Creating Certificate and Identity file for SSL Connection
Step 1: Creating Certificate and Public key.
We will learn to create our own Certificates and Identity file with “keytool” which we can use in our SSL Tibco
projects. With the help of which we can generate .jks file ,public key and private key for SSL connection.
To create the certificate you can use tool called 'keytool' which is shipped with jdk/jre.
It is a command line utility.
Command For Generating JKS File
Below is the command to create a .jks file which will have both public key and private key.
keytool -genkey -alias server-alias -keyalg RSA -keypass yourpassword -storepass
yourpassword -keystore keystore.jks
Short summary:
-alias is used to give a name to your key. should be unique for its purpose.
-keyalg is encryption algorithm type.
-keypass password affiliated to key
-storepass is affiliated to keystore.jks
keystore.jks is name of the file which acts as repository keys.
After typing in this command, you will be asked details for the JKS file, give specifications accordingly.
At the end your key called server-alias will be stored in repo keystore.jks.
This entry in keystore.jks will have public as well as private key.
You now need to publish the public key to the world.
use following command to extract public key from entry which you have created earlier.
keytool -export -alias server-alias -storepass yourpassword -file server.cer -keystore
keystore.jks
The public key aka certificate will be stored in file named server.cer.
This file should be used by the person who wants to connect to your server.
1.2 Creating Identity file.
1.2.1 Identity
You have your public/private key pair with you.
Create an Identity in your BW project.
Choose type Identity file. Provide URL as path to your_keystore.jks.
Give the file type 'JKS' and password.
Save the identity.
1.2.2 HTTP Connection.
Create an HTTP Connection and use SSL.
Configure SSL with the identity and certificate folder you have created in 1.2.1.
This step does not include instructions to enable client authentication.
This is enough for server side.
Step 2: Importing the certificate to be used at client side.
2.1 Import the key
Get the server.cer from the server authority which is publicly available.
Import the public key into you trust store (Certificate folder in the Tibco Designer).
Certificate in PEM format
In the BW project import the public certificate by
Tools>Trusted Certificates>Import into PEM format.
It is always advisable to keep the certificates in a separate folder to skip unnecessary processing.
2.2 Install in tibco BW
We can use the same Identity file that we have used in the HTTP Connection at the Soap Request Reply SSL
Configuration.
TIBCO TRIVIA
About tibco Messaging Appliance P-7500:
TIBCO Messaging Appliance P-7500 is out-of-the-box RV appliance. A single appliance is
able to replace ten or more existing servers running TIBCO Rendezvous daemons and
support up to 6,000 client connections on heterogeneous networks. It does this by
communicating directly with the TIBCO Rendezvous clients via TCP/IP and bypassing
any multicast transmission issues.
Download