|
| Copyright © Cloud Software Group, Inc. All Rights Reserved |
• Local A local connection uses the C language libraries and JNI to locate and connect to queue managers on the local machine.
• Remote A remote connection uses TCP/IP to connect to the listening port on any queue manager on the network or the local machine.
• Client Connection Table This type of connection uses a Client Channel Definition Table (CCDT) exported by the queue manager upon saving a client channel definition. This is the only supported method to connect to a multi-instance queue manager.Table 3 lists and describes the fields in the Configuration tab.
Local, Remote, or Client Connection Table. See WebSphere MQ Connection Shared Resource for more information. This file must be located in the queue manager home directory in the @ipcc/AMQCLCHL.TAB file. You can either reference this file from this location, or copy it to a location where it is accessible to the running BusinessWorks instance. Default: localhost Default: 1414Range: 1-65535 When selected, the TLS tab is enabled. This option enables the use of Transport Layer Security for the connection resource. Relevant parameters are configured in the TLS Tab. This option is only enabled for remote connections. Note: This feature is not relevant and not used for locally bound connections. Note: That this feature is not relevant and not used for locally bound connections.Table 4 lists and describes the fields in the Pooling tab.
Note that as of version 7.6 of this plug-in, the pool no longer uses the WebSphere MQ MqSimpleConnectionManager. The pool now uses its own pool of hot standby connections. This improves latency for normally low latency activities, such as the Put activity. The TLS tab contains the parameters required to make a secure connection to the queue manager using the Transport Layer Security protocol. Before TLS can be used, the queue manager and server channel used by clients must be configured. For more information, see Creating Secure Connections to the Queue Manager.Note that the TLS tab is enabled only if the Binding type is Remote or Client Connection Table, and the TLS Enabled check box is selected in the Configuration tab.
• See IBM APAR IV66840 regarding improving cipher suite selection on non-IBM JREs. This is described in more detail in Creating Secure Connections to the Queue Manager.Table 5 lists and describes the fields in the TLS tab.
• Keystore The TLS certificate and trusted signer certificates are expected to be in a Java keystore file.
• Files The TLS certificate is expected to be in a pkcs12 file and the trusted certificates are located in a directory by themselves. If the Repository Type is Keystore, this field contains the name of a Java keystore file containing the client certificate and its signer certificate(s). If client authentication is enabled on the server-connection channel, then the CA which signed the queue manager's certificate must be imported here to create a trust relationship. If the Repository Type is Files, this field that contains the name of a pkcs12-formatted certificate with the private key included. This file is secured with a password. If the Repository Type is Files, this field contains the directory where all the certificates necessary to trust the server's certificate are located. These certificates can be PEM- or DER-encoded. If the Repository Type is Keystore, this field contains the password used to secure the Java keystore. Note: If all of the other required fields in this connection resource are correct but the cipher specification is unknown, the Test button probes for an acceptable cipher specification and reports it in the pop-up as well as printing it in the log.Note: If a client connection table is in use for this connection, the cipher suite is encoded in the table and this value is ignored. Note: If the parameters here are of the Files type and the Embed TLS Parameters check box is selected, an internally represented Java keystore will be created from the files and stored within the project's configuration data.
|
| Copyright © Cloud Software Group, Inc. All Rights Reserved |