Configure an ESQL/C, ODBC, DB-Access, dbexport, dbimport, dbschema,
or dbload connection by adding connection information
to the sqlhosts file, setting SSL configuration
parameters, and configuring the keystore and the digital certificates
it stores.
The client
and the server must be enabled with a mutual TLS version. Set the
TLS version on the server with the TLS_VERSION configuration parameter.
Note: Transport
Layer Security (TLS) is the successor to SSL. In this documentation,
the same information applies to TLS as to SSL.
- Update connection information in the sqlhosts file by
using the onsocssl protocol for SSL SQLI client
connections.
The following table shows an example
of an sqlhosts file configured for these client
connections.
Table 1. Example of sqlhosts file
configured for SSL SQLI client connectionsServer Name |
Protocol |
Host Name |
Server Name |
sf_on |
onsoctcp |
sanfrancisco |
sf_serv |
oak_on |
onsocssl |
oakland |
oak_serv |
- Using a text editor, create a conssl.cfg file
in the $INFORMIXDIR/etc directory. The file must
contain the following information:
- SSL_KEYSTORE_FILE information that specifies
the fully qualified file name of the keystore that stores the root
CA certificates of all of the servers to which the client connects
- SSL_KEYSTORE_STH information that specifies
the fully qualified file name of the stash file containing the encrypted
keystore password.
The format of the conssl.cfg file is: Parameter Value # Comment
For
example, the
conssl.cfg file might contain this
information:
SSL_KEYSTORE_FILE /work/keystores/ssl_client.kdb # Keystore file
SSL_KEYSTORE_STH /work/keystores/ssl_client.sth # Keystore stash file
- Use the GSKCapiCmd command-line interface, which is a part of the Java
runtime environment, to set up a keystore and its password stash
file and digital certificate.
When you create the password,
be sure that:
- You use the command associated with the installed version of GSKit
(for example, gsk7capicmd or gsk8capicmd).
- The name and location of the keystore and its stash file are as
specified in the conssl.cfg file.
- Permissions on the keystore and its stash file are set to 666,
even though the permissions are not enforced.
If the certificate created for server is self-signed,
you must extract the certificate from the server and use FTP to move
the extracted certificate to the client, for the client keystore to
use. If use the default certificates that are provided, you must create
the client keystore.
For example:
- Add the digital certificate of the Certificate Authority
that issued the server digital certificate to the keystore.