NextGen Knowledge Center

Apply Source Connector SSL Settings

  1. On the Channels page, double-click a channel in the Channel list.
  2. Select the Source tab.
  3. In the Connector Type field, select the connector type that supports the SSL Manager (for example, HTTP Listener, Web Service Listener, File Reader in FTP mode).
  4. In the SSL Settings section - Enable field, select Yes.
    Enabling SSL Settings

  5. Select the wrench icon to open the SSL Settings window:
Items on the SSL Settings Window

ItemNameDefault ValueDescription
AMy Server CertificateNoneSelect the local certificate used to identify this listener connector. For additional information, see My Server Certificate
BClient AuthenticationDisabledDisabled: No client authentication is requested.

Request: Client certificate is requested but not required. If the client presents a certificate it will be used for extra security.

Require: Client certificate is required. If the client does not present a certificate, the handshake will fail.

CClient Certificate ValidationEnabledIf enabled, only the certificates configured in the below Trusted Client Certificates section will be trusted.

If disabled, all certificates are automatically trusted.

DTrusted Client CertificatesJava Truststore onlySelect the wrench icon here to select which certificates to trust. This applies not only to certificates presented by clients for mutual authentication, but also to those trusted for CRL / OCSP revocation checking. For additional information, see Trusted Client Certificates
EPresent Issuer DNsEnabledIf enabled, during the SSL handshake the server will respond with a list of accepted client issuer distinguished names (DNs). Disabling this can provide extra security as potential attackers are given less information about the correct security parameters.
FSubject DN ValidationNoIf enabled, only client certificates with subject distinguished names (DNs) matching the given list will be allowed. If a client certificate not matching any of the trusted DNs is presented, the SSL connection / handshake will fail.

For additional information, see Subject DN Validation

GAllow Expired CertificatesNoIf disabled, both local and remote certificates will be checked during the SSL handshake to ensure that none of the certificates in the accessible chain have expired.
HOCSP EnabledNoSelect Yes to enable Online Certificate Server Protocol (OCSP) checking for all local and remote certificates. The issuer of the response certificate must be trusted as well in order to verify signatures.

For additional information, see OCSP Revocation Checking

ICRL EnabledNoSelect Yes to enable Certificate Revocation List (CRL) checking for all local and remote certificates. The issuer of the CRL must be included in your trusted certificates as well in order to verify signatures.

For additional information, see CRL Revocation Checking

JEnabled ProtocolsServer defaultsThe TLS/SSL protocols to enable for this listener connector.

For additional information, see Enabled TLS/SSL Protocols

KEnabled Cipher SuitesServer defaultsThe TLS/SSL cipher suites to enable for this listener connector.

For additional information, see Enabled TLS/SSL Cipher Suites