Certificate management
Remote Control uses certificates in the Server and in the Broker to address the authentication and verification required for ensuring secure connections between the different product components.
Remote Control can use multiple types of Public Key Infrastructure ( PKI)
- A commercial Certificate Authority ( CA)
- An internal CA
- Self-signed certificates
- Non-strict certificate validation
-
- Non-strict certificate validation performs the following checks against the
certificate
- The identity of the certificate matches the hostname of the broker that you are trying to connect to.
- The certificate is within its validity period.
Note: This type of certificate validation is strongly discouraged for production usage for remote control sessions over the internet, it is only intended for demo and test environments.
- Non-strict certificate validation performs the following checks against the
certificate
- Strict certificate validation
-
- Strict certificate validation performs one additional check. This additional check requires that the client has a trust store that contains all the root certificates required to validate the certificate chain.
For Certificate operations you can use the IBM Key Management tool (ikeyman), which ships as part of Remote Control, the OpenSSL command line tool or other third party tools. Procedures in this manual show the use of the IBM Key Management tool.