Description:
Within r12.0 SP2, the SSLD functionality is now fully integrated into the DSA itself. This means that there is no external SSLD binary. As there is no SSLD binary, the process for configuring the SSL functionality is now via a DXC configuration file. The utility to create new DSAs "dxnewdsa" has been updated to reflect this change in configuration. This technical document demonstrates how to create a new DSA using dxnewdsa and illustrates how the SSL configuration has changed.
Solution:
When running dxnewdsa, you will see that the process of configuring the SSL functionality within the DSA has changed. This technical document illustrates how the SSL configuration has changed.
# access controlsclear access;source "../access/default.dxc";# sslsource "../ssld/default.dxc";# replication agreements (rarely used)# source "../replication/";
# CA Directory - DXserver/config/ssld # This is a read-only default configuration file. If you need to make changes, # copy this file and reference the new file from servers/.dxi# # default CA Directory ssl configuration# - 'dxcertgen certs' can be used to create a basic set of certificates set ssl = { # folder containing DSA personality certs cert-dir = "config/ssld/personalities" # trusted root CA that signed DSA certificates ca-file = "config/ssld/trusted.pem" # SSL options# cipher = "ALL:!EXPORT40:!ADH" # supported ciphers - syntax on OpenSSL website# protocol = tls # enable TLS only (default of fips set)# fips = true # enables FIPS 140-2 compliant encryption # HSM options# lib = "<str>" # path to PKCS11 library supplied by HSM vendor# pin = "<str>" # HSM pin# slot = # slot to use for HSM based encryption};
As you can see when you use dxnewdsa, the SSL functionality is enabled by default. In order to fully utilize the SSL functionality, you will need to: