Configure Certificate Authentication for Client API Connections

The API connection certificate authentication feature allows clients to connect to a Connect:Direct server by using only an SSL Certificate with the Common Name (CN) specified as a user name.

If the intended client usage does not include submitting processes, then the user name does not have to be a real UNIX system user name and only needs to be defined in the Connect:Direct UNIX user authorization file. If process submission is intended, then the user specified in the CN must be a real UNIX system user. You can configure this feature in the user authorization information file of a Connect:Direct node. The API certificate authentication requires no user password to be presented.

This feature improves password management in large deployments of Connect:Direct®, as it removes the extra administrative steps that result from password usage.
Note:

This feature is specific only to API connections. These connections must also be AIJ-based. When you use the authentication feature, ensure that the version of the AIJ is at least 1.1.00 Fix 000025. This version of the AIJ contains updates that allow blank passwords to be used. This version contains the updates that allow blank passwords the system uses the AIJ. These AIJ version requirements also apply if you use the authentication feature in IBM® Control Center. API connection certificate authentication is not supported for the Direct.exe CLI, Connect:Direct Requester, or the Connect:Direct native C/C++/C# non Java APIs.

Configuring API certificate authentication

Client Authentication must be enabled on the Connect:Direct Secure Plus. Client record. Client authentication is not enabled by default in Connect:Direct Secure Plus. During an API connection, a peer certificate is required from Control Center or the AIJ client. That certificate must contain a common name field of an SSL certificate whose contents match a Connect:Direct local user record in the Connect:Direct node. You also must use a blank password in order for Connect:Direct to trigger the API certificate authentication process.

A new functional authorities configuration parameter is added to Connect:Direct for UNIX. The parameter specifies whether a specific user can log in as a client via API certificate authentication, and it must be set to Yes when you configure API certificate authentication.