No Host Verify (-nohostverify) (for STS capability)
- Last Updated: March 30, 2020
- 1 minute read
- OpenEdge
- Version 12.2
- Documentation
No Host Verify (-nohostverify) (for STS capability)
Use No Host Verify (-nohostverify) to turn
off host verification for a Transport Layer Security (TLS) connection to a database server
or to the OpenEdge Authentication Gateway server.
| Operating system and syntax | UNIX / Windows |
-nohostverify
|
||
|---|---|---|---|---|
| Use with | Maximum value | Minimum value | Single-user default | Multi-user default |
| Client Connection, Authentication Gateway server | — | — | — | — |
Without this parameter specified, the client compares the host name specified in the connection with the Common Name specified in the server certificate, and raises an error if they do not match. With this parameter specified, the client never raises the error.
While your database connection may or may not be running with TLS enabled for communication to its remote clients, the communication to the OpenEdge Authentication Gateway server is always run with TLS enabled.
If the database is running with TLS enabled, No Host Verify (-nohostverify) is set the same for both the OpenEdge Server TLS
communication as well as for the OpenEdge Authentication Gateway server communication.
For more information, see OpenEdge Getting Started: Core Business Services - Security and Auditing.