Configuring secure connections

You can configure secure connections for IBM® Control Center. These connections can be configured in either a high availability environment or a non-high availability environment.

The following graphic shows the secure connections that can be configured for interacting with IBM Control Center and the connections that cannot be secured:

The following secure connections can be configured for use with IBM Control Center in either a high availability or non-high availability environment:

Tip: Use the information that is recorded on the HTTPS worksheet to complete the configuration procedures.

The IBM Control Center engine uses the same keystore and truststore files for all of these secure connections. The Cognos Business Intelligence server generates its own keystore for securing connections with the IBM Control Center engine and with browsers when displaying reports. This secure connection uses SSL or TLS.

In a high availability environment, every event processor's keystore certificate must be trusted by your other event processors in the cluster. In every event processor's truststore, you must include the certificate. You can use the same keystore and truststore files for every event processor in your high availability environment. You might receive a browser security warning when you access the web console on an event processor where the common name does not match the host name that you are connecting to.

Attention: If you need secure web client access, the non-secure HTTP port cannot be disabled. However, it can be limited to accept connections from localhost only.