Enabling TLS server connections
- Last Updated: January 17, 2024
- 1 minute read
- OpenEdge
- Version 12.8
- Documentation
When you enable TLS connections on an ABL server socket object, the socket accepts connections only from TLS clients that can authenticate to your ABL application as an TLS server.
Note: Be very sure you need TLS before using this option. TLS incurs
more or less heavy performance penalties, depending on resources and load.
To enable TLS connections on an ABL server socket object, include the TLS
parameters shown in the following table as part of the connection parameters string that you
pass to the server socket object ENABLE-CONNECTIONS() method.
For additional information, see Implementing an ABL socket server.
| Connection parameter | Description |
|---|---|
|
Specifies the all connections to this server socket must use TLS. |
|
Sets the alias name within the keystore of
the private key and digital certificate entry to use to authenticate
all connections to this server socket. If not specified, the server
socket uses the default_server server certificate
alias. |
|
Sets the password to use for accessing the private
key and digital certificate. You must specify a password when you
specify the -keyalias option and the password must
be encrypted. You must specify the password as an encrypted value
that you can obtain using the genpassword utility
located in the bin directory of your OpenEdge installation.If
you use the default_server server certificate,
it also has a default password that you do not need to specify. |
|
If specified, caching for the TLS client session is disabled. |
|
Specifies, in seconds, the length of time that an TLS client session is held in the session cache, during which an TLS client can resume its session. The default is 180 seconds. |
For more information on OpenEdge TLS support, key and certificate stores, the genpassword utility, and enabling connections to TLS servers, see Introduction to Security and Auditing.