Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved


Chapter 3 WebSphere MQ Palette : WebSphere MQ Connection Shared Resource

WebSphere MQ Connection Shared Resource
The connection resource contains all the parameters necessary to connect to a queue manager. It supports these modes:
Local  A local connection uses the C language libraries and JNI to locate and connect to queue managers on the local machine.
Remote  A remote connection uses TCP/IP to connect to the listening port on any queue manager on the network or the local machine.
Client Connection Table  This type of connection uses a Client Channel Definition Table (CCDT) exported by the queue manager upon saving a client channel definition. This is the only supported method to connect to a multi-instance queue manager.
See the IBM documentation for a description of CCDTs and how they are to be used.
Configuration Tab
Table 3 lists and describes the fields in the Configuration tab.
 
Default: WebSphere MQ Connection
Local, Remote, or Client Connection Table. See WebSphere MQ Connection Shared Resource for more information.
This file must be located in the queue manager home directory in the @ipcc/AMQCLCHL.TAB file. You can either reference this file from this location, or copy it to a location where it is accessible to the running BusinessWorks instance.
Default: localhost
Range: 1-65535
When selected, the TLS tab is enabled. This option enables the use of Transport Layer Security for the connection resource. Relevant parameters are configured in the TLS Tab. This option is only enabled for remote connections.
Note: This feature is not relevant and not used for locally bound connections.
Note: That this feature is not relevant and not used for locally bound connections.
Pooling Tab
Table 4 lists and describes the fields in the Pooling tab.
 
Note that as of version 7.6 of this plug-in, the pool no longer uses the WebSphere MQ MqSimpleConnectionManager. The pool now uses its own pool of hot standby connections. This improves latency for normally low latency activities, such as the Put activity.
 
TLS Tab
The TLS tab contains the parameters required to make a secure connection to the queue manager using the Transport Layer Security protocol. Before TLS can be used, the queue manager and server channel used by clients must be configured. For more information, see Creating Secure Connections to the Queue Manager.
Note that the TLS tab is enabled only if the Binding type is Remote or Client Connection Table, and the TLS Enabled check box is selected in the Configuration tab.
If the JRE running the BW application is the standard Oracle Java runtime, the number of cipher suites supported is quite limited. If none of the cipher suites available to the JRE can be used to connect to the queue manager, the configuration of the queue manager cannot be relaxed to accomodate the JRE. There are three options:
See IBM APAR IV66840 regarding improving cipher suite selection on non-IBM JREs. This is described in more detail in Creating Secure Connections to the Queue Manager.
The IBM JSSE implementation supports a more extensive cipher suite set than does the standard JRE.
Table 5 lists and describes the fields in the TLS tab.
 
Keystore  The TLS certificate and trusted signer certificates are expected to be in a Java keystore file.
Files  The TLS certificate is expected to be in a pkcs12 file and the trusted certificates are located in a directory by themselves.
If the Repository Type is Keystore, this field contains the name of a Java keystore file containing the client certificate and its signer certificate(s). If client authentication is enabled on the server-connection channel, then the CA which signed the queue manager's certificate must be imported here to create a trust relationship.
If the Repository Type is Files, this field that contains the name of a pkcs12-formatted certificate with the private key included. This file is secured with a password.
pkcs12-formatted certificates can be suffixed pkcs12 or p12.
If the Repository Type is Files, this field contains the directory where all the certificates necessary to trust the server's certificate are located. These certificates can be PEM- or DER-encoded.
If the Repository Type is Keystore, this field contains the password used to secure the Java keystore.
If the Repository Type is Files, this field contains the password used to secure the identity file.
Note: If all of the other required fields in this connection resource are correct but the cipher specification is unknown, the Test button probes for an acceptable cipher specification and reports it in the pop-up as well as printing it in the log.
Note: If a client connection table is in use for this connection, the cipher suite is encoded in the table and this value is ignored.
Note: If the parameters here are of the Files type and the Embed TLS Parameters check box is selected, an internally represented Java keystore will be created from the files and stored within the project's configuration data.

Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved