+

Search Tips   |   Advanced Search

Common Secure Interoperability V2 transport inbound settings

Use this page to specify which listener ports to open and which SSL settings to use. These specifications determine which transport a client or upstream server uses to communicate with this server for incoming requests. To view this console page, complete the following steps:

  1. Click Security > Secure administration, applications, and infrastructure.

  2. Under Authentication, click RMI/IIOP security > CSIv2 inbound transport.

 

Configuration tab

Transport

Specify whether client processes connect to the server using one of its connected transports.

You can choose to use either SSL, TCP/IP or both as the inbound transport that a server supports. If you specify TCP/IP, the server only supports TCP/IP and cannot accept SSL connections. If you specify SSL-supported, this server can support either TCP/IP or SSL connections. If you specify SSL-required, then any server communicating with this one must use SSL.

If you specify SSL-supported or SSL-required, decide which set of SSL configuration settings you want to use for the inbound configuration. This decision determines which key file and trust file are used for inbound connections to this server.

TCP/IP

If you select TCP/IP, then the server opens a TCP/IP listener port only and all inbound requests do not have SSL protection.

SSL-required

If you select SSL-required, then the server opens an SSL listener port only and all inbound requests are received using SSL.

[This information applies to V6.0.x and previous servers only that are federated in a V6.1 cell.]

If you set the active authentication protocol to CSI and SAS, then the server opens a TCP/IP listener port for the Secure Authentication Service (SAS) protocol regardless of this setting. Only an SSL listener port is opened, and all requests come through SSL connections. If you choose SSL-required, also choose CSI as the active authentication protocol. If you choose CSI and SAS, SAS requires an open TCP/IP socket for some special requests.

SAS is supported only between V6.0.x and previous version servers federated in a V6.1 cell.

SSL-supported

If you select SSL-supported, then the server opens both a TCP/IP and an SSL listener port and most inbound requests are received using SSL.

[This information applies to V6.0.x and previous servers only that are federated in a V6.1 cell.] By default, SSL ports for Common Secure Interoperability V2 (CSIv2) and Security Authentication Service (SAS) are dynamically generated. In cases where fix the SSL ports on appservers, click Servers > Application Servers > server. Under Additional properties, click Endpoint listeners. Provide a fixed port number for the following ports. A zero port number indicates that a dynamic assignment is made at runtime.

CSIV2_SSL_MUTUALAUTH_LISTENER_ADDRESS
CSIV2_SSL_SERVERAUTH_LISTENER_ADDRESS
SAS_SSL_SERVERAUTH_LISTENER_ADDRESS

Default: SSL-Supported
Range: TCP/IP, SSL Required, SSL-Supported

SSL settings

Specify a list of predefined SSL settings to choose from for inbound connections.

[This information applies to V6.0.x and previous servers only that are federated in a V6.1 cell.]

This option is available for non-z/OS platform servers when there is a version 6.0.x server in your environment. However, if your environment contains only V6.1 servers, this option does not apply. These settings are configured at the SSL Repertoire panel. To access the SSL Repertoire panel...

  1. Clicking Security > SSL certificate and key management.

  2. Under configuration settings, click Manage endpoint security configurations and trust zones.

  3. Expand Inbound and click inbound_configuration.

  4. Under Related items, click SSL configurations.

Data type: String
Default: DefaultSSLSettings
DefaultIIOPSSL
Range: Any SSL settings configured in the SSL Configuration Repertoire

Centrally managed

Specify that the selection of an SSL configuration is based upon the outbound topology view for the Java Naming and Directory Interface (JNDI) platform.

Centrally managed configurations support one location to maintain SSL configurations rather than spreading them across the configuration documents.

Default: Enabled

Use specific SSL alias

Specify the SSL configuration alias to use for LDAP outbound SSL communications.

This option overrides the centrally managed configuration for the JNDI platform.

z/OS SSL settings

[This information applies to V6.0.x and previous servers only that are federated in a V6.1 cell.]

Specify a list of predefined SSL settings for inbound connections. Configure these settings on the SSL panel by clicking Secure communications on the console.




 

Related tasks


Configure inbound transports

 

Reference topic