+

Search Tips   |   Advanced Search

Example 4: Set TCP/IP transport using a virtual private network


This scenario illustrates the ability to choose TCP/IP as the transport when it is appropriate. In some cases, when two servers are on the same virtual private network (VPN), it can be appropriate to select TCP/IP as the transport for performance reasons because the VPN already encrypts the message.

 

  1. Set client C for message layer authentication with an SSL transport.

    1. Point the client to sas.client.props.

      Use the com.ibm.CORBA.ConfigURL=file:/C:/was/properties/sas.client.props property. All further configuration involves setting properties within this file.

    2. Enable SSL.

      In this case, SSL is supported but not required.com.ibm.CSI.performTransportAssocSSLTLSSupported=true, com.ibm.CSI.performTransportAssocSSLTLSRequired=false

    3. Enable client authentication at the message layer.

      In this case, client authentication is supported but not required. com.ibm.CSI.performClientAuthenticationRequired=false, com.ibm.CSI.performClientAuthenticationSupported=true

    4. Use the remaining defaults in sas.client.props.

  2. Set the S1 server. In the admin console, the S1 server is configured for incoming requests to support message-layer client authentication and incoming connections to support SSL without client certificate authentication. The S1 server is configured for outgoing requests to support identity assertion.

    It is possible to enable SSL for inbound connections and disable SSL for outbound connections. The same is true in reverse.

    1. Set S1 for incoming connections.

      1. Disable identity assertion.

      2. Enable user ID and password authentication.

      3. Enable SSL.

      4. Disable SSL client certificate authentication.

    2. Set S1 for outgoing connections.

      1. Disable identity assertion.

      2. Enable user ID and password authentication.

      3. Disable SSL.

  3. Set the S2 server.

    In the admin console, the S2 server is configured for incoming requests to support identity assertion and to accept SSL connections. Configuration for outgoing requests and connections are not relevant for this scenario.

    1. Disable identity assertion.

    2. Enable user ID and password authentication.

    3. Disable SSL.

 

Related tasks


Set CSIV2 inbound and outbound communication settings
Example 1: Set basic authentication and identity assertion
Example 2: Set basic authentication, identity assertion, and client certificates
Example 3: Set client certificate authentication and RunAs system