Repertoire settings

 

Repertoire settings

Use this page to configure Secure Sockets Layer (SSL) or Java Secure Sockets Extension (JSSE) settings for the server. To configure SSL, you need to define an SSL configuration repertoire. A repertoire contains the details necessary for building an SSL connection, such as the location of the key files, their type and the available ciphers. WebSphere Application Server provides a default repertoire called DefaultSSLSettings.

To view this administrative console page, click Security > SSL > alias_name.

Configuration tab

Alias

The name of the specific SSL setting

Data type: String

Note: If you create a new SSL alias using the administrative console, the alias name is automatically created in the node/alias_name format. However, if you create a new SSL alias using wsadmin, create the SSL alias and specify both the node name and alias name in the node/alias_name format.

Key file name

The fully qualified path to the SSL key file that contains public keys and might contain private keys.

You can create an SSL key file with the key management utility, or this file can correspond to a hardware device if one is available. In either case, this option indicates the source for personal certificates and for signer certificates unless a trust file is specified. The default SSL key files, DummyClientKeyFile.jks and DummyServerKeyFile.jks, contains a self-signed personal test certificate expiring on March 17, 2005. The test certificate is only intended for use in a test environment. The default SSL key files should never be used in a production environment because the private keys are the same on all the WebSphere Application Server installations. Refer to the Managing certificates article for information about creating and managing digital certificates for your WebSphere Application Server domain.

Data type: String

Client authentication

Whether to request a certificate from the client for authentication purposes when making a connection.

This attribute is only valid when it is used by the Web container HTTP transport.

When performing client authentication with the Internet InterORB Protocol (IIOP) for EJB requests, click Security > Global security. Under Authentication, click Authentication protocol > CSIv2 inbound authentication or Authentication protocol > CSIv2 outbound authentication. Select the appropriate option under Client certificate authentication.

Default: Disabled
Range: Enabled or Disabled

Security level

Whether the server selects from a pre-configured set of security levels.

Data type: Valid values include Low, Medium or High.

  • Low specifies digital signing ciphers only without encryption.

  • Medium specifies 40-bit ciphers only including digital signing.

  • High specifies 128-bit ciphers only including digital signing.

To specify all ciphers or any particular range, you can set the

com.ibm.ssl.enabledCipherSuites property.

See the SSL documentation for more information.

Default: High
Range: Low, Medium, or High

Cipher suites

Specifies a list of supported cipher suites that can be selected during the SSL handshake. If you select cipher suites individually here, you override the cipher suites set in the Security Level field.

Provider

Refers to a package that implements a subset of the Java security application programming interface (API) cryptography aspects.

If you select Predefined JSSE provider, select a provider from the menu.

WebSphere Application Server has the IBMJSSE, IBMJSSE2, and the IBMJSSEFIPS predefined providers. When you select the Use Federal Information Processing Standard (FIPS) option on the Global security panel, IBMJSSE2 uses the IBMJCEFIPS provider that is Federal Information Processing Standard (FIPS) certified. If you select Custom JSSE provider, enter a custom provider. For a custom provider, you first must enter the cipher suites through Custom properties under Additional Properties. Cipher suites and protocol values depend upon the provider.

The name for the Cipher suite property is

com.ibm.ssl.enabledCiphersuites . The name for the protocol property is

com.ibm.ssl.protocol .

Note: You can only specify the IBMJSSE2 provider for transports using the channel framework, including HTTP and JMS. Any other provider specified causes the server to fail initialization.

Protocol

Which SSL protocol to use.

If you are using a FIPS-approved custom JSSE provider, select a TLS protocol. However, because the FIPS-approved JSSE providers are not backwards-compatible, a server that uses the TLS protocol cannot communicate with a client that uses an SSL protocol.

Default SSLv3
Range SSL, SSLv2, SSLv3, TLS, TLSv1

Key file password

The password for accessing the SSL key file.

Data type: String

Key file format

The format of the SSL key file.

You can choose from the following key file formats: JKS, JCEK, PKCS12, JCERACFKS (z/OS only). The JKS format does not store a shared key. For more secure key files, use the JCEK format. PKCS12 is the standard file format.

[Version 6.0.2] You can choose from the following key file formats: JKS, JCEK, PKCS12, JCERACFKS (z/OS only) and JCE4758RACFKS (z/OS only). The JKS format does not store a shared key. For more secure key files, use the JCEK format. PKCS12 is the standard file format.

[Version 6.0.2]

Data type: String
Default: JKS
Range: JKS, JCEK, PKCS12, JCERACFKS (z/OS only), and JCE4758RACFKS (z/OS only)

Data type: String
Default: JKS
Range: JKS, JCEK, PKCS12, JCERACFKS (z/OS only)

Trust file name

The fully qualified path to a trust file containing the public keys.

You can create a trust file with the key management utility included in the WebSphere bin directory. Using the key management utility from Global Security Kit (GSKit), another SSL implementation, does not work with the Java Secure Socket Extension (JSSE) implementation. Unlike the SSL key file, no personal certificates are referenced; only signer certificates are retrieved. The default SSL trust files, DummyClientTrustFile.jks and DummyServerTrustFile.jks, contain multiple test public keys as signer certificates that can expire. The following public keys expire on October 13, 2021:

  • WebSphere Application Server Version 4.x test certificates

  • WebSphere Application Server Version 5.x test certificates

  • WebSphere Application Server CORBA C++ client

  • WebSphere Application Server Version 6.0.x test certificates

The test certificates are only intended for use in a test environment.

If a trust file is not specified but the SSL key file is specified, then the SSL key file is used for retrieval of signer certificates as well as personal certificates.

Data type: String

Trust file password

The password for accessing the SSL trust file.

Data type: String

Trust file format

The format of the SSL trust file.

You can choose from the following trust file formats: JKS, JCEK, PKCS12, JCERACFKS (z/OS only). The JKS format does not store a shared key. For more secure key files, use the JCEK format. PKCS12 is the standard file format.

[Version 6.0.2] You can choose from the following trust file formats: JKS, JCEK, PKCS12, JCERACFKS (z/OS only) and JCE4758RACFKS (z/OS only). The JKS format does not store a shared key. For more secure key files, use the JCEK format. PKCS12 is the standard file format.

Data type: String
Default: JKS
Range: JKS, JCEK, PKCS12, JCERACFKS (z/OS only)

[Version 6.0.2]

Data type: String
Default: JKS
Range: JKS, JCEK, PKCS12, JCERACFKS (z/OS only) and JCE4758RACFKS (z/OS only)





 

Related tasks


Configuring Federal Information Processing Standard Java Secure Socket Extension files

Defining Secure Sockets Layer connections

Related reference
Secure Sockets Layer settings for custom properties

Related information

Cryptographic Module Validation Program FIPS 140-1 and FIPS 140-2 Pre-validation List