This dialog box opens when you press the Security.. button on the Listener Information dialog. (To reach the Listener Information dialog, you select Listener from the main window's Advanced menu.) The server side of LANSA Communication Extensions will determine whether the communication line is to be a secure or a non-secure line.
Cryptographic Algorithm
Select the cryptographic algorithm you require from the drop down list.
Options are:
Compression
Select this option to enable and disable compression during connection.
The use of encryption and/or compression algorithms cause more CPU cycles to be consumed during communication sessions.
This option is not used when SSL is used. SSL has data compression integrated into the protocol.
Secure Sockets
Select this option to use the SSL/TLS protocols to authenticate and encrypt your data transmission between your client and server. SSL/TLS is designed to facilitate privacy and data security for communications over a network.
Use self-signed certificate from default location
Select this option to use the default self-signed certificate that is installed by the Visual LANSA install.
Use the certificate present at below location
Select this option to use a certificate that you have obtained/generated. If you select this option, then specify the location of the certificate (in pfx or p12 format) in the field below. Use the “…” button to browse for the file.
Password
When generating a self-signed certificate or obtaining a Certificate Authority (CA) issued certificate in .pfx or .p12 format, the private key, certificate bundle/chain and the certificate in .crt format may be wrapped or bundled using a password. The password may be blank. The password is required to parse the .pfx or .p12 package when communication is being established. The password must match exactly the password given during .pfx/.p12 generation otherwise the communication attempt will fail.
SSL Version
Select the TLS version to use. Only the version that is currently supported by the operating system is listed. At the time of writing TLS 1.3 is only supported on Windows 11 and Windows Server 2022 and higher. Ensure that all clients that will be connecting to the server are able to support the selected version.
How to generate a self-signed certificate
The following commands is used to generate a self-signed certificate:
openssl req -newkey rsa:2048 -nodes -keyout <keyFileName.pem> -x509 -days <xxx> -out <certificateFileName.pem>
OpenSSL will generate a new RSA private key, create a self-signed X.509 certificate using that key, and save both the key and certificate in the respective files (<keyFileName.pem> and <certificateFileName.pem>)
openssl pkcs12 -inkey <keyFileName.pem> -in <certificateFileName.pem> -export -out <certificate.p12>
How to use a custom certificate from both a self-signed and CA issued perspective
A certificate in a .pfx/.p12 format is a common way to store a digital certificate and its associated private key in a single file.
Different certificate formats:
|
Create a .pfx/.p12 file from multiple certificate files and private key file
If you receive multiple .crt files and .key file from the CA authority, you should bundle those into a single file (.pfx/.p12) file. Use the following commands to bundle all files into a single file.
The generated .pfx/.p12 file can then be used.
Export the .pfx/p12 certificate from certificate manager