Trust Store Management
Secure communication using SSL/TLS is essential for protecting sensitive data in modern applications. Trust stores are used to verify the authenticity of server certificates and to establish secure connections.
The ZIEWEB Client application supports multiple trust store sources, allowing secure communication across different platforms. The supported trust sources include:
-
Default JVM keystore (cacerts)
-
Custom JKS files
-
Windows certificate store
-
Well-known trusted Certificate Authorities (CAs)
-
SAF keyrings on IBM z/OS
Trust store configuration is flexible and is controlled through properties defined in the web.properties file. This approach keeps trust store management simple and consistent while ensuring secure connectivity.
The following parameters are used to configure the trust store for the Hex application. These settings are required to establish SSL/TLS trust when the application makes outbound HTTPS requests.
Key Parameters in web.properties
-
ENABLE_DEFAULT_CACERTS
Enables the default JVM trust store (cacerts).
-
ENABLE_CUSTOM_JKS
Enables the use of a custom JKS file from the HTTP server.
-
ENABLE_WINDOWS_BROWSER
Enables the Windows certificate store.
-
ENABLE_SAF_KEYRING
Enables the SAF keyring (IBM z/OS only).
-
ENABLE_WELLKNOWN_JKS
Enables a well-known trusted JKS file.
-
SSLSAFKeyringID
Specifies the keyring ID for the SAF trust store.
-
SSLSAFKeyringOwnerID
Specifies the owner ID for the SAF keyring.
-
JRE_DEFAULT_KEYSTORE
Specifies the password for the JVM default keystore (cacerts).
Based on the true/false values configured in the web.properties file, the corresponding trust store options are enabled or disabled. The SSL/TLS behavior is applied dynamically at runtime according to the configured settings.