Delivery Channels Page

The Delivery Channels page lets you configure all external system connectivity parameters on a single page. To open the page, click the Channels button on the Message Scenarios page.

The Deliver Channels list uses color coding to indicate the number and status of message scenarios using each delivery channel. The following color codes are used:
  • Green—No warnings and delivery channel is active.

  • Gray—No warnings and delivery channel is inactive.

  • Red—Warnings exist or the count is greater than zero and the channel is inactive.

The Advanced Settings section of the Delivery Channels page is hidden if the Connection field is set to Not encrypted. Otherwise it is shown. The advanced settings include the following:
  • x509 Trust File

  • x509 CRL File

  • Client Certificate

  • Client Private Key

The format of the files in the Advanced Settings is PEM. You do not have to complete all fields. However, the Client Certificate and Client Private Key fields must both be either empty or completed.

Configure x509 Trust File

To configure the x509 trust file:

An X.509 trust file, also known as a trust store, is a collection of X.509 certificates used to verify the authenticity of other digital certificates, thus forming infrastructure for secure communication.

The file contains a list of trusted public certificates that are not expired:

  1. root certificates from Certificate Authorities (CAs)
  2. intermediate certificates
  3. self-signed certificates

The content of the trust file is held in PEM format.

Example:

# certificate A

-----BEGIN CERTIFICATE-----

<BASE64 encoded X.509 certificate data>

-----END CERTIFICATE-----

# certificate B

-----BEGIN CERTIFICATE-----

<BASE64 encoded X.509 certificate data>

-----END CERTIFICATE-----

It is possible to skip setting x.509 trust file if a certificate of the host to be connected is signed by well known CA. If the host certificate is signed by self-signed or intermediate certificate x.509 trust file must be set as that self-signed or intermediate certificate.

Example 1:

<Root CA> -> <Intermediate certificate 1> -> ... -> <Intermediate certificate N> -> <host certificate>

x.509 trust file must be set as <Intermediate certificate N>

Example 2:

<Self-signed certificate> -> <host certificate>

x.509 trust file must be set as <Self-signed certificate>