Start database brokers for TLS connections
- Last Updated: February 11, 2026
- 2 minute read
- OpenEdge
- Version 13.0
- Documentation
OpenEdge supports Transport Layer Security (TLS) connections to the database server. TLS connections provide authentication and data privacy between the database server and clients according to Public Key Infrastructure (PKI) standards.
For a database server to start up with TLS, it must have access to:
- The private key that corresponds to the digital certificate the server uses to assert its identity to an TLS client
- A valid digital certificate that asserts the server's identity and contains the Public Key corresponding to the private key
You can use TLS to secure communications between source and target databases for OpenEdge Replication. For details, see Set Up OpenEdge Replication for TLS.
Note: TLS incurs heavy performance penalties, depending on the client, server, and network resources and load. For more information on TLS and the security features of OpenEdge, see Learn about Security and Auditing.
Use the following command to start a broker that spawns TLS servers and accepts connections from TLS clients:
|
- db-name
- Specifies the database you want to start. If the database is not in the current directory, you must specify the full pathname of the database.
- -S service-name
- Specifies the broker process service name.
- -H host-name
- Specifies the machine where the database server runs.
- -ssl
- Specifies that all database and SQL client connections will use TLS.
- -keyalias key-alias-name
- Specifies the alias name of the TLS private key/digital certificate
key-store entry to use. The default is
default_server. - -keyaliaspasswd password
- Specifies the TLS key alias password to use to access the server's
private key/digital certificate key-store entry. The default is the encrypted value of
password. If you use a value other than the default, it must be encrypted. You can use thegenpasswordutility, located in your installation'sbindirectory, to encrypt the password. - -nosessioncache
- Specifies that TLS session caching is disabled. Session caching allows a client to reuse a previously established session if it reconnects before the session cache time-out expires. Session caching is enabled by default.
- -sessiontimeout n
- Specifies in seconds the length of time an TLS session will be held in the session cache. The default is 180 seconds.