TIBCO Enterprise Messaging System Connection

Contents

Overview

TIBCO Enterprise Messaging System (EMS) provides a distributed message bus with support for JMS (Java Messaging Service) and TIBCO Rendezvous, along with other protocols.

In general, TIBCO EMS clients produce messages and send them to the TIBCO EMS Server. Similarly, TIBCO EMS clients can connect to the TIBCO EMS Server and declare an interest in a particular queue or topic on that server. In doing so, it can consume messages that have been produced by another TIBCO EMS client.

The Enterprise Gateway can act as a message producer by sending messages to the TIBCO EMS Server and as a message consumer by listening on a queue or topic at the server. Both configurations require a connection to the TIBCO EMS Server. For more information on consuming and producing messages to and from TIBCO EMS, please refer to the following pages:

The instructions on the remainder of this page describe how to configure a connection to an TIBCO EMS Server. For more detailed information on configuring TIBCO EMS Connections, please refer to the TIBCO EMS documentation.

Configuration

The TIBCO EMS Connection is configured globally so that it can be referenced when configuring TIBCO EMS consumers and TIBCO EMS producers within the Enterprise Gateway. To configure a global connection to an TIBCO EMS Server, right-click on the "TIBCO Enterprise Messaging Service Connections" node, which can be found under the "External Connections" node in the tree view of the Policy Studio. Select the Add a TIBCO EMS Connection option from the context menu. The remainder of this help guide describes how to configure the tabs and fields on the TIBCO Enterprise Messaging System Connection dialog.

Before configuring the following fields you must enter a name for this TIBCO EMS Connection in the Name field. This connection will then be available when configuring a TIBCO EMS Consumer and also when configuring a TIBCO EMS Routing filter.

General Tab:
The following fields are available on the General Tab:

Server URL:
Enter the full URL of the TIBCO EMS Server in this field, for example tcp://hostname:7222 for non-SSL connections or ssl://server:7243 for SSL-enabled TIBCO EMS Servers.

User Name:
Enter a username to use when the Enterprise Gateway connects to the TIBCO EMS Server.

Password:
Enter the password for this user.

SSL Tab:
The following tabs and fields are available on the SSL Tab:

Limit the use of SSL to improve performance:
If this option is checked, SSL will only be used for establishing (mutual) authentication with the TIBCO EMS Server, which takes place during the initial SSL handshaking process. Once the channel has been set up, data sent over this channel will be sent in the clear and will not be encrypted as in a typical SSL session.

Enable client verification of the host certificate or host name:
Check this option if you want to compare the Common Name (i.e. "cn") X.509 attribute of the Distinguished Name in the TIBCO EMS Server's certificate. Typically, the SSL handshake requires that the common name in the host's certificate matches the name of the host machine. So, for example, in order to "trust" the certificate associated with the www.abc.com site, the certificate must have the common name attribute set to this name, i.e. "cn=www.abc.com". If you wish to perform this check on the TIBCO EMS Server's certificate presented to the Enterprise Gateway during SSL setup, you should check this checkbox.

Expected Host Name:
In cases where the common name in the certificate will not be the same as the host machine, you can override the default validation by specifying a host name that you expect instead of the host given in the common name of the server's certificate.

For example, let's say a generic TIBCO EMS Server certificate is issued for testing purposes and that this certificate has been created with a common name of "server", i.e. "cn=server". Now, let's assume that you want to create an SSL session with a TIBCO EMS Server running on a machine that is called "host".

The default client verification of the host name setting will check to make sure that the host on which the TIBCO EMS Server is running is called "server" since this is what is in the common name of the certificate. However, the host name of this machine is actually "host" and so this check will fail.

In such cases, we need to override the default host checking behavior by specifying the expected host name in this field. So, in this case, we enter "host" in the Expected Host Name field.

Cipher suites to be used:
Specify the OpenSSL cipher suites that the Enterprise Gateway supports. The ciphers will be negotiated during the SSL handshake with the TIBCO EMS Server so that the strongest and most secure ciphers that are common to both parties are used.

Trusted Certificates Tab:
You can select the CA (Certificate Authority) certificates that you consider "trusted" for setting up the connection to the TIBCO EMS Server on this tab.

The TIBCO EMS Server's certificate can be explicitly trusted by importing it into the Certificate Store and selecting it in the list. Alternatively, in a solution more typical for a Public Key Infrastructure, the CA certificate that issued the TIBCO EMS Server's certificate is imported into the Certificate Store and is selected in the list. In this case a "chain of trust" is established since all certificates issued by the CA are implicitly trusted if the CA is considered trusted.

Client Identity Tab:
If you want to configure mutual authentication to the TIBCO EMS Server you must select a client certificate from the list that the Enterprise Gateway can use to authenticate to the TIBCO EMS Server. In order for the SSL channel to be established successfully, the TIBCO EMS Server must trust the client certificate selected here.

Important Note:
It is important to note that if the selected client certificate has been issued by a CA (i.e. it is not self-signed), the certificate of this CA must be imported into the Trusted Certificate Store. If a chain of certificates exists (e.g. the client certificate was issued by an intermediary CA, which was issued by the root CA), then all intermediary CA certificates must be imported into the Certificate Store.