All Downloads are FREE. Search and download functionalities are using the official Maven repository.

en.help.task-jmxconnectorssledit.html Maven / Gradle / Ivy

There is a newer version: 3.2-b03
Show newest version



To Edit SSL Settings for the JMX Connector

Before You Begin

This task is meaningful only if security is enabled for the JMX connector.

  1. In the navigation tree, expand the Configuration node.
  2. Under the Configuration node, select the Admin Service node.

    The Edit JMX Connector page opens.

  3. Select the Security Enabled checkbox to cause JMX communication to be encrypted.

    This option is disabled by default.

  4. Click the SSL tab.

    The SSL page opens.

  5. On the SSL page, select the SSL3 Enabled checkbox to enable SSL3.

    This option is enabled by default.

  6. Select the TLS Enabled checkbox to enable Transport Layer Security (TLS).

    This option is enabled by default.

  7. Select the Client Authentication Enabled checkbox to require clients to identify themselves to the server on every request.

    This option is disabled by default.

  8. In the Certificate Nickname field, type the nickname of the server certificate in the certificate database or the PKCS#11 token.

    In the certificate, the name format is tokenname:nickname. Including the tokenname: part of the name in this attribute is optional.

  9. In the Key Store field, type the name of the keystore file (for example, keystore.jks).
  10. In the Trust Algorithm field, type the name of the trust management algorithm (for example, PKIX) to use for certification path validation.
  11. In the Max Certificate Length field, type the maximum number of non-self-issued intermediate certificates that can exist in a certification path.

    This field is used only if the Trust Algorithm field is set to PKIX. A value of 0 implies that the path can only contain a single certificate. A value of -1 implies that the path length is unconstrained (there is no maximum). Setting a value less than -1 causes an exception to be thrown.

  12. In the Trust Store field, type the name of the truststore file (for example, cacerts.jks).
  13. In the Cipher Suites area, specify the cipher suites to be used.

    If you do not add any cipher suites, all cipher suites will be used.

  14. Click OK.
See Also




© 2015 - 2024 Weber Informatics LLC | Privacy Policy