Delivery Channels Page
The Delivery Channels page lets you configure all external system connectivity parameters on a single page. To open the page, click the Channels button on the Message Scenarios page.
-
Green—No warnings and delivery channel is active.
-
Gray—No warnings and delivery channel is inactive.
-
Red—Warnings exist or the count is greater than zero and the channel is inactive.
-
x509 Trust File
-
x509 CRL File
-
Client Certificate
-
Client Private Key
Configure x509 Trust File
To configure the x509 trust file:
An X.509 trust file, also known as a trust store, is a collection of X.509 certificates used to verify the authenticity of other digital certificates, thus forming infrastructure for secure communication.
The file contains a list of trusted public certificates that are not expired:
- root certificates from Certificate Authorities (CAs)
- intermediate certificates
- self-signed certificates
The content of the trust file is held in PEM format.
Example:
# certificate A
-----BEGIN CERTIFICATE-----
<BASE64 encoded X.509 certificate data>
-----END CERTIFICATE-----
# certificate B
-----BEGIN CERTIFICATE-----
<BASE64 encoded X.509 certificate data>
-----END CERTIFICATE-----
It is possible to skip setting x.509 trust file if a certificate of the host to be connected is signed by well known CA. If the host certificate is signed by self-signed or intermediate certificate x.509 trust file must be set as that self-signed or intermediate certificate.
Example 1:
<Root CA> -> <Intermediate certificate 1> -> ... -> <Intermediate certificate N> -> <host certificate>
x.509 trust file must be set as <Intermediate certificate N>
Example 2:
<Self-signed certificate> -> <host certificate>
x.509 trust file must be set as <Self-signed certificate>