Implementing TLS Security in a PowerExchange Network

Implementing TLS Security in a PowerExchange Network

Introduction

Introduction

You can configure Transport Layer Security (TLS) protocol communication in a PowerExchange network to ensure secure communication between a PowerExchange server and its clients. TLS communication is based on the Secure Socket Layer (SSL) protocol. This article assumes that you have a basic understanding of the TLS protocol.
To configure TLS communication, establish certificates and keys that authorize the secure connection between systems and enable encryption and decryption of data. Each server or client machine has a TLS private key and a TLS certificate. To enable a secured connection, you must perform some configuration tasks in PowerExchange, and you must create and install valid security keys and certificates using a third-party tool such as OpenSSL.
The security configuration for your organization, and therefore the tasks in this article, are the responsibility of your security administrator. Security administration requires specific knowledge of and permissions on the participating systems. For information about obtaining and distributing certificates on your network, refer to your organization's security administrator or internal documentation. Informatica Global Customer Support has limited ability to support the creation or distribution of security certificates within your organization and cannot change your organization's security policies.
After configuration, the TLS handshake sets up the secure connection. The individual data messages are encrypted by using the session key that is encoded and exchanged during the handshake. PowerExchange supports TLS communication for the following operating systems:
  • Linux
  • UNIX
  • Windows
  • z/OS
In March 2018, TLS 1.3 was approved by the Internet Engineering Task Force (IETF). This article refers to TLS instead of SSL except when SSL is part of a product or component name.

0 COMMENTS

We’d like to hear from you!