Configuring Secure Connections to a Sterling External Authentication Server
In addition to defining which external authentication server to use for secure connections, you must also configure the secure connection in both IBM® Sterling Control Center Monitor and Sterling External Authentication Server.
About this task
To secure your connection between IBM Sterling Control Center Monitor and Sterling External Authentication Server, you must define a keystore and truststore in IBM Control Center. You can configure only one keystore and truststore for IBM Sterling Control Center Monitor. You use the same keystore and truststore that you configured for both secure client connections and for secure connections to monitored servers. The truststore must contain either the self-signed certificate or the CA trusted certificate for SEAS. You also need to configure the Secure Listener, and the keystore and truststore information in Sterling External Authentication Server System Settings.
To secure connections to a Sterling External Authentication Server: