CA XCOM Gateway users can request secure communication with CA XCOM Gateway by using a modified internet address to access the CA XCOM Gateway web site. This address must commence with https, in place of http, and specify the appropriate https port number, as outlined in the chapter "Using CA XCOM Gateway through the Internet." In addition, components within the CA XCOM Gateway server that use web services to communicate with each other can also be configured to use secure https communication.
To enable the use of the https protocol for communication with the CA XCOM Gateway server
Internally, JBoss uses Apache Tomcat Server, which handles SSL communication through the https protocol. Enabling support for SSL by the Tomcat server requires the following:
Detailed information can be found on the http://tomcat.apache.org website and by searching the internet using the keywords “tomcat SSL configuration.”
After installation of CA XCOM Gateway, the https protocol can be configured by updating the Global Parameters offline, to change the GATEWAYURL attribute within the WEBSERVICES xml element, so that it specifies the https protocol with the appropriate port number.
Note: Replace the “<…>” in these examples with the actual values.
"%JAVA_HOME%\\bin\\keytool.exe" -list -keystore <jboss keystore file>
Example output:
Your keystore contains 1 entries
authoritycertificate, May 19, 2010, trustedCertEntry,
Certificate fingerprint (MD5): 5B:68:BE:49:4B:56:F5:74:84:EB:C2:C4:BD:D7:05:61
"%JAVA_HOME%\\bin\\keytool.exe" -export -alias authoritycertificate -file cert.cer -keystore <jboss keystore file>
"%JAVA_HOME%\\bin\\keytool.exe" -import -alias authoritycertificate -file cert.cer -keystore <gateway keystore file>
gatewayurl=http://localhost:8080/xcomgateway/services/XcomGatewayService
# Following are only used for https
keystorekey=
keystorepassword=
keystorepath=
Notes:
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |