The WebSphere® MQ Java™ Client supports SSL-encrypted connections over the server-connection (SVRCONN) channel between an application and the queue manager. To configure SSL-encrypted connections you must first create key stores and certificates.
Each WebSphere MQ queue manager has a key repository for certificates. When an application attempts to connect to a secure queue manager, the application's certificate must be validated against the contents of the queue manager's key repository. One option for configuring SSL for the queue manager is to use a self-signed certificate.
Two certificates must be signed and created. One must be created for the server queue manager, and a second created for the client, for example the IBM Integration Explorer.
C:\Program Files\IBM\gsk7\bin\gsk7cmd
/opt/mqm/ssl/jre/bin/gsk7cmd
You must now copy the files from the Label_CMS directory to your queue manager's SSL directory. For example, /var/mqm/qmgrs/QM1/ssl or C:\Program Files\IBM\WebSphere MQ\Qmgrs\QM1\ssl. The keystore.jksfile in the LABEL_JKS directory must be on the same machine as the IBM Integration Explorer. You might also require the AMQCLCHL.TAB file to be copied to the same system as the IBM Integration Explorer. This file can be found in the queue manager's @ipcc directory, for example, /var/mqm/qmgrs/QM1/@ipcc or C:\Program Files\IBM\WebSphere MQ\qmgrs\QM1\@ipcc.
When you configure the SSL settings in the IBM Integration Explorer you must specify the full path to the keystore.jksfile.