B2B Integration 10.4 | Administering and Monitoring B2B Transactions | Managing File Transfers with ActiveTransfer | Managing Virtual Folders in a Virtual File System | Configuring ActiveTransfer Server for SSL Communication with Remote Servers
 
Configuring ActiveTransfer Server for SSL Communication with Remote Servers
By default, ActiveTransfer Server accepts SSL certificates from any remote server. You can configure ActiveTransfer Server to accept certificates only from trusted remote servers. For this configuration to work, the remote server's certificate should be listed as a trusted root in the ActiveTransfer Server's truststore. ActiveTransfer Server validates the certificate received from the remote server against the ones listed in its truststore.
* To configure ActiveTransfer Server to allow SSL communication only with trusted remote servers
1. Browse to the Integration Server_directory \instances\instance_name\packages\WmMFT\config directory on ActiveTransfer Server.
2. Open the properties configuration file (properties.cnf).
3. Set the mft.ssl.client.acceptAnyCert property to false. For details of mft.ssl.client.acceptAnyCert, see mft.ssl.client and save the file.
Note: When you set this property to false, ActiveTransfer Server validates the certificate presented by the remote server against the certificates in its truststore. You must store the truststore file with all the trusted certificates in the same location as the keystore file. The trustore file should have the name keystoreName_trust. For example, if the keystore file name is remoteserver_ks.jks, the truststore name should be remoteserver_ks.jks_trust.

Copyright © 2016- 2019 | Software AG, Darmstadt, Germany and/or Software AG USA, Inc., Reston, VA, USA, and/or its subsidiaries and/or its affiliates and/or their licensors.
Innovation Release