Set up TLS for OpenEdge Command Center and MongoDB communication
- Last Updated: September 5, 2025
- 2 minute read
- OpenEdge Command Center
- Version 2.0
- Documentation
You can enable TLS for secure communication between the OpenEdge Command Center server and MongoDB. You can configure the following types of authentication:
- Server authentication
- Mutual authentication
Server authentication
When using server authentication, the MongoDB server sends a certificate to the OpenEdge Command Center server to authenticate itself and ensure secure communication. To configure TLS server authentication:
- In MongoDB installation, open the
bin/mongod.cfgfile in an editor.Note: If the MongoDB installation is on the Linux platform, open theetc/mongod.conffile. - In the
network interfacesection of the file, add thetlsnode. - In the
tlsnode, add the following fields and enter the required values:Field Description modeSet value to requireTLSorpreferTLS.certificateKeyFilePath of the public certificate of the MongoDB server that is signed by the Certificate Authority (CA). - Save your changes to the
bin/mongod.cfgoretc/mongod.conffile and restart the MongoDB server. - In the OpenEdge Command Center server installation, open the
data/conf/db-config.jsonfile in an editor. - Add the
tlsfield and set its value totrue. - In
connectionOptions, add thesslCAfield. - For
sslCA, enter the path of the public certificate of the CA that is used to validate the certificates presented by the OpenEdge Command Center server. - Save your changes to the
data/conf/db-config.jsonfile and restart the OpenEdge Command Center server.
After the OpenEdge Command Center server is started, the TLS handshake with the MongoDB server occurs and a secure channel is established.
Mutual authentication
When using mutual authentication, the OpenEdge Command Center server and the MongoDB server authenticate with each other before creating a secure communication channel. To configure TLS mutual authentication:
- In MongoDB installation, open the
bin/mongod.cfgfile in an editor.Note: If the MongoDB installation is on the Linux platform, open theetc/mongod.conffile. - In the
network interfacesection of the file, add thetlsnode. - In the
tlsnode, add the following fields and enter the required values:Field Description modeSet value to requireTLSorpreferTLS.certificateKeyFilePath of the public certificate of the MongoDB server that is signed by the CA. CAFilePath of the file that contains the certificate chain for verifying the OpenEdge Command Center server’s certificates. - Save your changes to the
bin/mongod.cfgoretc/mongod.conffile and restart the MongoDB server. - In the OpenEdge Command Center server installation, open the
data/conf/db-config.jsonfile in an editor. - Add the
tlsfield and set its value totrue. - In
connectionOptions, add the following fields and enter the required values:Field Description sslCAPath of the public certificate of the CA that is used to validate the certificates presented by the MongoDB server. sslKeyThe private key used for encryption. sslCertPath of the public certificate of the OpenEdge Command Center server that is signed by the CA. - Save your changes to the
data/conf/db-config.jsonfile and restart the OpenEdge Command Center server.
After the OpenEdge Command Center server is started, the TLS handshake with the MongoDB server occurs and a secure channel is established.