About this task
ATS configuration does not impact applications connecting
from other, non-iOS, mobile operating systems. Other mobile operating
systems do not mandate that servers communicate on the ATS level of
security but can still communicate with ATS-configured servers.
Before
configuring your container image, have the generated certificates
ready. The following steps assume that the keystore file ssl_cert.p12 has
the personal certificate and ca.crt is the signing
certificate.
What to do next
The following specific ciphers require Java™ Cryptography Extension (JCE) policy settings
and an additional JVM option:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
If you use these ciphers and use an IBM® Java SDK, you can
download the policy files. There are two files:
US_export_policy.jar and
local_policy.jar.
Add both the files to the
mfpf-server/usr/security folder
and then add the following JVM option to the
mfpf-server/usr/env/jvm.options file:
Dcom.ibm.security.jurisdictionPolicyDir=/opt/ibm/wlp/usr/servers/worklight/resources/security/.
For
development-stage purposes only, you can disable ATS by adding following
property to the
info.plist file:
<key>NSAppTransportSecurity</key>
<dict>
<key>NSAllowsArbitraryLoads</key>
<true/>
</dict>
See also
ATS and Bitcode in iOS 9.