Enable TLS for the unmanaged .NET client
TLS is supported only for client connections. To enable TLS, we must specify the CipherSpec to use when communicating with the queue manager, and this must match the CipherSpec set on the target channel.
To enable TLS, specify the CipherSpec using the SSLCipherSpec static member variable of MQEnvironment. The following example attaches to a SVRCONN channel named SECURE.SVRCONN.CHANNEL, which has been set up to require TLS with a CipherSpec of TLS_RSA_WITH_AES_128_CBC_SHA:MQEnvironment.Hostname = "your_hostname"; MQEnvironment.Channel = "SECURE.SVRCONN.CHANNEL"; MQEnvironment.SSLCipherSpec = "TLS_RSA_WITH_AES_128_CBC_SHA256"; MQEnvironment.SSLKeyRepository = "C:\mqm\key"; MQQueueManager qmgr = new MQQueueManager("your_Q_manager");
See Specify CipherSpecs for a list of CipherSpecs.
The SSLCipherSpec property can also be set using the MQC.SSL_CIPHER_SPEC_PROPERTY in the hash table of connection properties.
To successfully connect using TLS, the client keystore must be set up with Certificate Authority root certificates chain from which the certificate presented by the queue manager can be authenticated. Similarly, if SSLClientAuth on the SVRCONN channel has been set to MQSSL_CLIENT_AUTH_REQUIRED, the client keystore must contain an identifying personal certificate that is trusted by the queue manager.
Parent topic: TLS support for the unmanaged .NET client