Manage TLS server identity
- Last Updated: March 30, 2020
- 2 minute read
- OpenEdge
- Version 12.2
- Documentation
Before you can enable an TLS connection of any kind, you must ensure that TLS servers and clients have access to the required keys and digital certificates to properly authenticate a connection and exchange encrypted communications over it. Each TLS server asserts its identity using a private key and server public-key certificate (keystore entry) accessed from the servers keystore. Each TLS client must successfully validate the servers identity using a corresponding root public-key certificate (root certificate store entry) accessed from the client's certificate store. The client and server also use their corresponding TLS key and certificate store entries to initiate encrypted communications between them.
OpenEdge provides a common keystore for all OpenEdge-managed TLS servers and a common certificate store for all OpenEdge-managed TLS clients. This allows you to use a common set of TLS management tools to support your OpenEdge TLS infrastructure.
You use these OpenEdge key and certificate stores to support both Internet and intranet TLS communications between TLS servers and TLS clients.
For more information on the tools for managing the common OpenEdge key and certificate stores, see Manage OpenEdge Keys and Certificates.