Configure source and target for TLS with different keys and certificates on different hosts
- Last Updated: January 27, 2026
- 1 minute read
- OpenEdge
- Version 12.8
- Documentation
To protect network data using Transport Layer Security, you need access to private keys and digital certificates to negotiate TLS connections. OpenEdge provides utilities for installing and managing certificates.
Note: Make sure that your certificate is current. When your certificate expires, OpenEdge Replication stops working.
This example assumes that you have a private key and a digital (public-key) certificate.
If you need to install keys or certificates, see Manage OpenEdge Keys and Certificates.
Consider the case where your source and target databases for OpenEdge Replication have keys and certificates stored in different /keys and /certs directories on different hosts. The [SSL] section and [control-agent] section on each host is distinct.
For example, let's assume the host name sourcehost on the source and targethost on the target. The keys are stored in two different directories, DiffHost-DiffKeysCerts1 and DiffHost-DiffKeysCerts2.