Use TLS in PAS for OpenEdge
- Last Updated: August 18, 2021
- 2 minute read
- OpenEdge
- Version 12.2
- Documentation
TLS evolved from and superseded SSL. TLS is considered to be more efficient and secure than the older SSL. Even though TLS and SSL are separate and distinct protocols, the PAS for OpenEdge configuration process is the same for both.
In PAS for OpenEdge and in Tomcat, HTTPS port support is provided by the Transport Layer Security (TLS) implementation of the Java Secure Socket Extension (JSSE).
TLS is a standard protocol used to implement the encryption required for HTTPS communication.
PAS for OpenEdge allows you to specify an HTTPS port when you create an instance. The PASMAN utility supports specifying HTTPS ports with the
-P
option of the
create
action. For example, the following instance is created with an HTTP port of
8501
and an HTTPS port of
8601
:
|
The following is an overview of TLS configuration in PAS for OpenEdge:
On a production instance, you must replace the default TLS Server Certificate shipped with PAS for OpenEdge with a fully qualified certificate from a Certificate Authority (CA).
Instance access via HTTPS is dependent on having an TLS Server Certificate. To support initial configuration and testing, Progress includes a self-signed server certificate in a Java keystore. (A key store is a file that contains the encrypted keys required for encoding and decoding information.) The Progress Software keystore is formatted according to the PKCS12 format and is maintained using the Java Keytool utility.
However, the default server certificate should only be used on a non-production instance, or as a temporary certificate for setting up TLS on a production instance. Using the default certificate on a fully functional and deployed production instance, is a serious security risk.