Table of Contents

Search

  1. Preface
  2. Introduction
  3. Pre-Installation Notes
  4. Installation and Configuration
  5. Initial Configuration
  6. Enable Transport Layer Security version 1.3
  7. Customizing Installation Settings
  8. Product Administration
  9. Upgrade Overview
  10. Active-Passive: Backups and Replication
  11. Active-Active: Clustering and Automatic Failover
  12. Uninstalling Managed File Transfer

Informatica Managed File Transfer Installation Guide

Informatica Managed File Transfer Installation Guide

Enable Transport Layer Security version 1.3

Enable Transport Layer Security version 1.3

Transfer Layer Security (TLS) version 1.3 provides several improvements over the earlier versions such as, simpler and faster TLS handshake, more secure cipher suites, and so on. Perform the following steps to enable TLSv1.3 on the
Managed File Transfer
server:
  1. Download the latest available ZULU JDK version 1.8 and deploy it on the machine where the
    Managed File Transfer
    server was deployed.
  2. Replace the value of JAVA_HOME variable value with the JDK home path where the latest java was deployed (in
    setenv.sh/setenv.bat
    in
    <MFT_HOME>/server/tomcat/bin
    ). For example,
    JAVA_HOME="/root/jdk_1.8_u302/zulu8.56.0.21-ca-jdk8.0.302-linux_x64"
  3. Remove the comments to update the
    JAVA_OPTS
    variable value in
    setenv.sh/setenv.bat
    present in
    <MFT_HOME>/server/tomcat/bin
    .
    Uncomment the following line:
    #rem uncomment below lines to use OpenJSSE instead of SunJSSE for TLSv1.3 JAVA_OPTS="-XX:+UseOpenJSSE"
  4. Modify the
    server.xml
    file present in
    <MFT_HOME>/server/tomcat/conf
    location:
    1. Update sslEnabledProtocols value to TLSv1.3 in the Connector tag section for secure port.
    2. Ensure that the keystoreType value is "PKCS12".
    3. Update the keystoreProvider value from "SUNJSSE" to "OpenJSSE".
    For example:
    <Connector name="secured" port="8002" protocol="HTTP/1.1" SSLEnabled="true" enableLookups="false" disableUploadTimeout="true" scheme="https" secure="true" clientAuth="false" sslProtocol="TLS" sslEnabledProtocols="TLSv1.3" algorithm="SunX509" keystoreFile="/root/DXMFT_1050/MFT/server/userdata/keys/x509/sample-keystore.p12" keystorePass="default" keystoreType="PKCS12" keyAlias="sample-key" keystoreProvider="OpenJSSE" truststoreFile="/root/DXMFT_1050/MFT/server/userdata/keys/x509/trustedCertificates.jks" truststorePass="default" truststoreType="JKS" truststoreProvider="SUN"/>
  5. To start the HTTPS service with TLSv1.3, update the
    https.xml
    file present in
    <MFT_HOME>/config
    location, with the following values:
    1. Update sslEnabledProtocols value to TLSv1.3.
    2. Update the keystoreProvider value from "SUNJSSE" to "OpenJSSE".

0 COMMENTS

We’d like to hear from you!