Configuring a secure connection to the DB2 for z/OS database server
You can configure a secure connection to encrypt transactions between the IBM® Sterling Control Center Monitor engine and DB2 for z/OS database instances. This configuration can be completed in either a high availability or non-high availability environment.
- Before you configure IBM Sterling Control Center Monitor to enable secure connections to the databases, install DB2 for z/OS SSL. Consult the IBM DB2 10 for z/OS: Configuring SSL for Secure Client-Server Communications Redbook for information on installing DB2 for z/OS SSL.
- Create and configure the keystore and truststore files in IBM Sterling Control Center Monitor.
In a high availability environment, every event processor's keystore certificate must be trusted by your other event processors in the cluster. In every event processor's truststore, you must include the certificate. You can use the same keystore and truststore files for every event processor in your high availability environment. You might receive a browser security warning when you access the web console on an event processor where the common name does not match the host name that you are connecting to.