Secure Proxy Sterling External Authentication Server Configuration - Security
Use this screen to define secure connection requirements for a Sterling External Authentication Server definition. Refer to the field definitions in the following table.
Field Name |
Description |
|---|---|
Use Secure Connection |
Enable Use Secure Connection to turn on the use of SSL/TLS to provide secure communications with transport protocols and to ensure that data is secured as it is transmitted across a single socket. |
Security Setting |
Security protocol allowed for connections
to the Sterling External Authentication Server. Options include:
|
Trust Store |
Location where the system and CA certificates are stored. System and CA certificates are used during a secure connection to verify that a certificate received from a server is signed by a trusted source. |
CA /Trusted Certificates |
The trusted certificate to use to authenticate the certificate presented by Sterling External Authentication Server. You select a CA certificate or trusted root from the list of certificates stored in the trust store you selected in the Trust Store field. When Sterling External Authentication Server presents a certificate to establish a secure connection, the trusted root certificate, located at the Secure Proxy server, must match or be the entity who signed the certificate presented by Sterling External Authentication Server during the SSL handshake. |
Key Store |
Location where the keys and system certificates you want to use are stored. |
Key/System Certificate |
Certificate presented by Secure Proxy to the node to authenticate itself during the SSL handshake. Select the certificate to use for the node from the list that contains the certificates stored in the key store you selected in the Key Store field. |
Cipher Suites |
List of ciphers that can be enabled to encrypt data transmitted during a secure SSL or TLS connection between Secure Proxy and a Sterling External Authentication Server. Enable at least one cipher. |