This page was last edited on June 19, 2020, at 14:27.
Comments or questions about this documentation? Contact us for support!
This section provides an example of enabling SSL with the OpenMQ provider.
In general, configuration of an SSL connection consists of the following major steps:
This example assumes that an instance of Open MQ is configured and operating with a JMS Capture Point, without SSL.
The first several steps involve configuring the OpenMQ broker.
<OpenMQ installation dir>\mq\bin>imqkeytool
The broker will prompt the user for a keystore password.
The next steps involve configuring Interaction Server.
keytool -export -alias imq -keystore keystore -file openmqbroker.cer
keytool -import -keystore truststore.jks -file openmqbroker.cer -alias openmqbroker
-Djavax.net.ssl.trustStore= {Path to the local trust store}/truststore.jks
-Djavax.net.ssl.trustStorePassword={your local trust store password}
-Djavax.net.ssl.trustStoreType=jks
For debugging purposes, you can also add the following option, which prints debug information to the console:
-Djavax.net.debug=ssl:handshake,data,trustmanager,record
java.naming.security.protocol=ssl java.naming.security.authentication=simple
It should be noted that in this example, the JNDI naming service used has all of the relevant context stored in a .bindings file and does not have any mechanism of authorization and authentication. With other JNDI services, the user accessing JNDI may have to provide a username and a password, which can be different from the JMS connection credentials. If this is the case, the JMS Connection credentials must be specified in the JMS Capture Point settings section as username and password, while the JNDI username and password must be specified in the jms-additional-context-attributes section as java.naming.security.principal and java.naming.security.credentials, respectively.