Configuring TLS channels with MQSC
To configure TLS channels, use the runmqsc and the ALTER CHANNEL commands. You can optionally configure a channel to accept only certificates with attributes in the distinguished name of the owner that match given values. You can also optionally configure a queue manager channel so that the queue manager refuses the connection if the initiating party does not send its own personal certificate.
About this task
To configure channels in IBM® MQ Explorer, see Configuring TLS channels with IBM MQ Explorer.
To configure channels using runmqsc, complete the following steps.
Procedure
What to do next
Setting message security
- Encryption ensures that if the message is intercepted, it is unreadable.
- Hash functions ensure that if the message is altered, this is detected.
The combination of these methods is called the cipher specification, or CipherSpec. Compatible CipherSpecs must be set for both ends of a channel, otherwise TLS-enabled messaging fails. For more information, see Enabling CipherSpecs.
To alter an IBM MQ channel enable TLS, specify a value in the SSLCIPH attribute. This attribute must be set to a valid CipherSpec for the queue platform of the queue manager from the list Enabling CipherSpecs.
ALTER CHANNEL('MQ.TEST') CHLTYPE(SDR) SSLCIPH(' ')Filtering certificates on their owner's name
Certificates contain the distinguished name of the owner of the certificate. You can optionally configure the channel to accept only certificates with attributes in the distinguished name of the owner that match given values.
| Attribute names | Meaning |
|---|---|
| SERIALNUMBER | Certificate serial number |
| Email address | |
E |
Email address (Deprecated in preference to MAIL) |
| UID or USERID | User identifier |
| CN | Common Name |
| T | Title |
| OU | Organizational Unit name |
| DC | Domain component |
| O | Organization name |
| STREET | Street / First line of address |
| L | Locality name |
| ST (or SP or S) | State or Province name |
| PC | Postal code / zip code |
| C | Country |
| UNSTRUCTUREDNAME | Host name |
| UNSTRUCTUREDADDRESS | IP address |
| DNQ | Distinguished name qualifier |
CN=*Smith, O=IBM, C=GB
For
example:ALTER CHANNEL(‘MQ.TEST’) CHLTYPE(SDR) SSLPEER(‘CN=*Smith, O=IBM, C=GB’)Authenticating parties initiating connections to a queue manager
When another party initiates a TLS-enabled connection to a queue manager, the queue manager must send its personal certificate to the initiating party as proof of identity. You can also optionally configure the queue manager channel so that the queue manager refuses the connection if the initiating party does not send its own personal certificate.
- OPTIONAL authenticates the certificate of a connecting client if one is provided but does not require a client to send one. A client is rejected if it sends a certificate that is not valid.
- REQUIRED rejects any connecting clients that do not provide a valid TLS certificate
ALTER CHANNEL(‘MQ.TEST’) CHLTYPE(RCVR) SSLCAUTH(REQUIRED)
E