TLS Endpoint Certificate Data Caching Configuration

To configure SIP endpoint certificate data caching for an enforcement profile:

  1. Access the enforcement-profile configuration element.
    ORACLE# configure terminal
    ORACLE(configure)# session-router
    ORACLE(session-router)# enforcement-profile
    ORACLE(enforcement-profile)# 
  2. Select the enforcement-profile object to edit.
    ORACLE(enforcement-profile)# select
    <name>:
    
    ORACLE(enforcement-profile)#
  3. add-certificate-info—Enter a list of one or more certificate attribute names to enable TLS certificate information caching and insertion of cached certificate information into a customized SIP INVITEs. This parameter is empty by default.

    If you want to list more than one value, enclose the value in quotation marks (“ “) and separate the values with Spaces.

    ORACLE(enforcement-profile)# add-certificate-info "sub-common-name sub-alt-name-DNS"
  4. certificate-ruri-check—Change this parameter from disabled, its default, to enabled if you want your Oracle Communications Session Border Controller to cache TLS certificate information and use it to validate Request-URIs. Enabling this parameter also means the Oracle Communications Session Border Controller will use the cached TLS certificate information in a customized SIP INVITE.
  5. Type done to save your configuration.