Configure Client Authentication with Digital Certificates on Apache HTTP Server

You must configure client authentication on Apache HTTP server for mutual SSL communications.

The Apache HTTP server and clients can communicate over an encrypted connection using the SSL communication. This reduces the risk of exposing sensitive content in plain text. The secured communication using an encrypted connection ensures that the server always identifies itself to its clients. This guarantees that the server is the uniquely correct end point for the communication. However, if you want to authorize the service requests in TIBCO API Exchange Gateway, the clients must authenticate themselves to the Apache HTTP server using its own client certificates.

The client authentication can be configured on the Apache HTTP server by setting the following Apache directives in the virtual host configuration for the SSL virtual server instance:

Note: Configuring the SSLCACertificateFile directive is easy. As the number of trusted certificate authorities increases, it can be difficult or error prone to add, replace, or remove CA certificates in this file. When the number of trusted certificate authorities is large, use the SSLCACertificatePath directive for best results.

See Configuring Client Authentication with Digital Certificates on Apache HTTP Server for configuration steps.