Use this page to specify which listener ports to open and which Secure Sockets Layer (SSL) settings to use. These specifications determine which transport a client or upstream server uses to communicate with this server for incoming requests.
To view this administrative console page, click Security > Authentication Protocol > CSI Inbound Transport.
Configuration tab
You can choose to use either Secure Sockets Layer (SSL), TCP/IP or both as the inbound transport that a server supports. If you specify TCP/IP, the server only supports TCP/IP and cannot accept SSL connections. If you specify SSL Supported, this server can support either TCP/IP or SSL connections. If you specify SSL-Required, then any server communicating with this one must use SSL.
If you specify SSL-Supported or SSL-Required, decide which set of SSL configuration settings you want to use for the inbound configuration. This decision determines which key file and trust file are used for inbound connections to this server.
By default, SSL ports for Common Secure Interoperability Version 2 (CSIv2) and Security Authentication Service (SAS) are dynamically generated. In cases where you need to fix the SSL ports on application servers, click Servers > Application Servers > server_name > End Points. Provide a fixed port number for the following port or ports. A zero port number indicates that a dynamic assignment is made at run time.
CSIV2_SSL_MUTUALAUTH_LISTENER_ADDRESS CSIV2_SSL_SERVERAUTH_LISTENER_ADDRESS SAS_SSL_SERVERAUTH_LISTENER_ADDRESS
ORB_SSL_LISTENER_ADDRESS
Default: | SSL-Supported |
Range: | TCP/IP, SSL Required, SSL-Supported |
Data type: | String |
Default: | DefaultSSLSettings |
Range: | Any SSL settings configured in the SSL Configuration Repertoire |