TIBCO Host Instance Configuration: Notification Server

When you create a standalone TIBCO Host instance, you can specify an associated notification server. This notification server can be the same server as that used by the Administrator, or you can define a different notification server.

The Notification Server is an Enterprise Message Service server that performs two essential system functions within the TIBCO ActiveMatrix platform. It delivers status messages sent by hosts and nodes to the Administrator server.

If you intend to enable SSL communications, see Securing Communication Channels.

Field/Button Description
Machine Name Port List A comma-separated list of machinename:port addresses for a TIBCO Enterprise Message Service server.

Default: protocol://machinename:7222, where:

  • protocol is tcp or, if the Enterprise Message Service server is SSL enabled, ssl.
  • machinename is the machine on which TIBCO Configuration Tool is being executed
Username A username for the TIBCO Enterprise Message Service server. The user must have administrator privileges in the TIBCO Enterprise Message Service server. If the user does not have administrator privileges, see Configuring TIBCO Enterprise Message Service Servers.

Default: admin

Password A password for the TIBCO Enterprise Message Service user.

Default: None

TIBCO Enterprise Message Service Server is SSL Enabled Indicate that the TIBCO Enterprise Message Service server is enabled for SSL. When selected, the SSL Keystore Configuration fields are enabled.
Note: The TIBCO Enterprise Message Service server usually listens on port 7243 when SSL-enabled and you must update the Machine Name Port List value before proceeding with SSL configuration.
Test Connection Verifies that TIBCO Configuration Tool can connect to the server using the information supplied on this page.
SSL Keystore Configuration:
Create a Trust Store Invokes a wizard to obtain certificates from the specified server and create the trust store:
  1. Click Create a Trust Store.
  2. Specify a password to protect the keystore and click Next. The SSL setup wizard displays the certificates imported from the server.
  3. In the Trusted Certificates area, select the certificates to trust and click Finish. The wizard fills in the Keystore Location, Keystore Type and Keystore Password fields.

    If you do not click Create a Trust Store, you must specify the details of an existing trust store that can be used to establish the trust relationship with the server.

Keystore Location Either:
  • the location in which the created trust store will be stored, or
  • the location of the trust store to be uploaded to ActiveMatrix Administrator. (You can either type this directly or click Browse to find it.)
Keystore Type The type of the created or uploaded trust store: JKS or JCEKS.

Default: JKS

Keystore Password Either:
  • the password specified in the Create a Trust Store wizard, or
  • the password required to access the trust store that is to be uploaded.