JBoss Community Archive (Read Only)

Teiid 8.2

Configuring SSL

The Teiid's configuration file(s)

contain transports defined for access into Teiid, and transport contains the properties to configure SSL for socket.

There are two types of transports, each with it's own SSL configuration:

Example Configuration
<ssl mode="login" authentication-mode="1-way" ssl-protocol="SSLv3" keymanagement-algorithm="algo"
         enabled-cipher-suites="SSL_RSA_WITH_RC4_128_MD5,SSL_RSA_WITH_RC4_128_SHA">
            <keystore name="cert.keystore" password="passwd" type="JKS" key-alias="alias"/>
            <truststore name="cert.truststore" password="passwd"/>
</ssl>

Properties

You can also use CLI to modify the transport configuration.

If you do not like to leave clear text passwords in the configuration file, then you can use JBoss AS vault mechanism for storing the keystore and truststore passwords. Use the directions defined here https://community.jboss.org/docs/DOC-17248

SSL Authentication Modes

SSL supports multiple authentication modes. In most secure intranet environments, anonymous is suitable to just bulk encrypt traffic without the need to setup SSL certificates.

  • anonymous- no certificates are exchanged, settings are not needed for the keystore and truststore properties. Client must have org.teiid.ssl.allowAnon set to true (the default) to connect to an anonymous server.

  • 1-way- the server will present a certificate, which is obtained from the keystore related properties. The client should have a truststore configured to accept the server certificate.

  • 2-way- the server will present a certificate, which is obtained from the keystore related properties. The client should have a truststore configured to accept the server certificate. The client is also expected to present a certificate, which is obtained from its keystore. The client certificate should be accepted by the trust store configured by the truststore related properties.

Encryption Strength

Both anonymous SSL and login only encryption are configured to use 128 bit AES encryption by default. By default, 1-way and 2-way SSL allow for cipher suite negotiation based upon the default cipher suites supported by the respective Java platforms of the client and server. User can restrict the cipher suites used for encryption by specifying the enabledCipherSuites property above in ssl configuration.

JBoss.org Content Archive (Read Only), exported from JBoss Community Documentation Editor at 2020-03-13 12:34:00 UTC, last content change 2012-11-19 19:23:41 UTC.