Enabling TLS server connections
- Last Updated: August 23, 2021
- 1 minute read
- OpenEdge
- Version 12.2
- Documentation
When you enable TLS connections on an ABL server socket object, the socket accepts connections only from TLS clients that can authenticate to your ABL application as an TLS server.
Note: Be very sure you need TLS
before using this option. TLS incurs more or less heavy performance penalties, depending
on resources and load.
To enable TLS connections on an ABL server socket object, include the TLS
parameters shown in the following table as part of the connection parameters string that
you pass to the server socket object ENABLE-CONNECTIONS() method. For additional information, see Implementing an ABL socket server.
| Connection parameter | Description |
|---|---|
|
Specifies the all connections to this server socket must use TLS. |
|
Sets the alias name within the keystore
of the private key and digital certificate entry to use to authenticate
all connections to this server socket. If not specified, the server
socket uses the default_server server
certificate alias. |
|
Sets the password to use for accessing
the private key and digital certificate. You must specify a password
when you specify the -keyalias option
and the password must be encrypted. You must specify the password as an
encrypted value that you can obtain using the genpassword utility located in the bin directory of your
OpenEdge installation.If you use the default_server server certificate, it also has a default
password that you do not need to specify. |
|
If specified, caching for the TLS client session is disabled. |
|
Specifies, in seconds, the length of time that an TLS client session is held in the session cache, during which an TLS client can resume its session. The default is 180 seconds. |
For more information on OpenEdge TLS support, key and certificate stores, the genpassword utility, and enabling connections to TLS servers, see Introduction to Security and Auditing.