webMethods and Intelligent Business Operations 10.2 | Integrate Software AG Products Using Digital Event Services | MashZone NextGen Help | Appendix | Administration | MashZone NextGen Server Configuration | Configure MashZone NextGen for SSL and Digital Certificates | Update SSL Configuration for Java
 
Update SSL Configuration for Java
With the EMML <directinvoke> statement, certificates for secure endpoints are validated against the default trust store for Java (the JRE). One-way SSL for mashable information sources may also use the default trust store for Java.
Note: See http://download.oracle.com/javase/6/docs/technotes/guides/security/jsse/JSSERefGuide.html#CustomizingStores for more information on the default JRE trust store.
Initially, this may not be the trust store you have configured for the MashZone NextGen Server in the application server and/or the Admin Console. This can cause security errors for <directinvoke> statements or mashable information sources.
To avoid these errors, you can configure the JRE to use the trust store for the MashZone NextGen Server:
1. Open the application server configuration file MashZoneNG-install/apache-tomcat/conf/wrapper.conf in a text editor of your choice.
2. Add the following Java system properties:
wrapper.java.additional.<n+1>=-Djavax.net.ssl.trustStore=/path/to/mashup-server/truststore
This is the absolute path to the trust store for the MashZone NextGen Server.
wrapper.java.additional.<n+2>=-Djavax.net.ssl.trustStorePassword=truststore-password
This is only required if the MashZone NextGen Server’s trust store uses a password.
Where n is the number of last additional Java parameter.
3. Save your changes to the script and restart the MashZone NextGen Server. See Start and Stop the MashZone NextGen Server for instructions.

Copyright © 2018 | Software AG, Darmstadt, Germany and/or Software AG USA, Inc., Reston, VA, USA, and/or its subsidiaries and/or its affiliates and/or their licensors.
Innovation Release