Release 10.1A: OpenEdge Application Server:
Administration
Secure Sockets Layer (SSL)
SSL has been widely accepted on the Internet as the preferred, secure protocol to authenticate and encrypt communication between clients and servers. Where HTTPS only secures individual messages, SSL secures the points of origin and destination for any amount of data that can be transmitted between a client and server. This protocol further complements and extends the security measures available to protect the confidentiality of your communications.
The SSL protocol resides above the network protocol, as defined by Transmission Control Protocol/Internet Protocol (TCP/IP), and directly below the application protocols, such as HTTP, HTTPS, or IMAP. It uses TCP/IP on behalf of the application protocols and, in the process, enables the following activities to occur:
OpenEdge supports SSL communications between the WebSpeed Messenger and the WebSpeed Transaction Server, as described in the next section.
SSL-enabled WebSpeed Transaction Server operation
You have the option of configuring any WebSpeed Transaction Server instance to require Secure Sockets Layer (SSL) client connections. You can maintain both SSL-enabled and non-SSL Transaction Server instances, but a given instance supports only one type of connection, either secure or non-secure.
Security derives from the client authentication of the server's identity via a Public Key Infrastructure (PKI) and a symmetric data encryption system. To configure a Transaction Server instance for SSL operation, you must:
- Obtain and install a server private key and a public key certificate. OpenEdge provides built-in keys and certificates that are suitable for use on development or demonstration servers; for production machines, you should obtain server certificates from an internal or public Certificate Authority (CA).
- Specify an alias and password for access to the private key/digital certificate.
- Disable session caching, or enable it with a specified timeout.
To connect to an SSL-enabled WebSpeed Transaction Server, a WebSpeed Messenger must have access to a digital (public key) certificate (often called a CA Root Certificate) that can authenticate with the digital certificate used by the server, and the Messenger must be configured to send SSL requests.
To perform these configuration tasks, you can use the Progress Explorer (in Windows only) or manually edit the
ubroker.propertiesfile, as explained in the next section.SSL configuration for WebSpeed components
To enable SSL communications, you must configure both the WebSpeed Messenger and the WebSpeed Transaction Server.
Configure the Messenger as follows:
- The Messenger must be SSL-enabled, meaning that it sends SSL data to the Transaction Server that is to process the client requests. To configure the Messenger to send SSL requests, you set the property
sslEnable=1. You set this property by checking the Enable SSL AppServer connections box in the SSL properties category in the Progress Explorer, or by manually editing theubroker.propertiesfile. In addition, you must obtain and install public key certificates for the Messenger host machine.- Determine whether you want the Messenger to verify the host name for the WebSpeed Transaction Server by comparing it with the Common Name specified in the server digital certificate, and raise an error if they do not match (the default behavior). You can disable this verification by setting the property
noHostVerify=1. To do so, check the Disable Client Verification of SSL Host Name box in the Progress Explorer, or manually edit theubroker.propertiesfile.- Determine whether you want the Messenger to request reuse of the session ID for successive connections to the same Transaction Server (the default behavior). If not, set the property
noSessionReuse=1, either by checking the Disable SSL Session Reuse box in the Progress Explorer or by editing theubroker.propertiesfile. (The default behavior does not guarantee that session IDs can be reused, because the server might disallow session reuse.)Configure the Transaction Server as follows:
- The Transaction Server must be SSL-enabled, meaning that it accepts SSL requests from the Messenger. You set the property
sslEnable=1by checking the Enable SSL Client Connections box in the SSL General properties category in the Progress Explorer, or by manually editing theubroker.propertiesfile. You must also obtain and install a server private key and public key certificate, unless you are using the defaults provided with OpenEdge.- In the SSL General properties category in the Progress Explorer, select the alias for the private key/digital certificate entry (in the OpenEdge keystore) that you want to secure connections for this Transaction Server. Also enter and confirm the password for this private key and digital certificate. You need not enter a password if you choose to use the default_server certificate and its default password. (Note: The password is encrypted in the
ubroker.propertiesfile; if manually editing the file, you must use thegenpasswordutility to encrypt the password. The properties appear in the file askeyAlias=andkeyAliasPasswd=.)- In the SSL Advanced Features properties category in the Progress Explorer, you can enter a timeout value that specifies the length of time (in seconds) that a disconnected session is held in the cache. During this specified interval, a connected client can resume its session. To disable session caching, check the box, or edit the
ubroker.propertiesfile and set the propertynoSessionCache=0. The timeout value appears in the file assessionTimeout=n.For more information on setting properties for WebSpeed Messengers and Transaction Servers and other Unified Broker products, see the Progress Explorer help or the
OpenEdge-Install-Directory\properties\ubroker.properties.README file.
|
Copyright © 2005 Progress Software Corporation www.progress.com Voice: (781) 280-4000 Fax: (781) 280-4095 |