Defining the web server settings
Server
In the Server tab, configure the following Server connection and Server protocol settings established during installation.
Customize your CES installation by specifying the required Server name to identify your CES installation.
On applying the changes, this name appears in the CES header bar.- You can choose to manually restart the web server by clicking Restart server. The user interface displays a confirmation message and also returns you to the same page after the restart.
In the Server protocols pane, use the toggle switch to Enable HTTP or Enable HTTPS or enable both protocols, and specify the relevant HTTP Port or HTTPS Port established for the respective protocol.
If you want to enforce using CES only on the HTTPS port, you must set the Server protocol to Enable HTTPS, configure the relevant details, and click Apply. The CES server restarts. When the UI is available again, the Enable Strict HTTPS (HTTP Strict Transport Security) toggle switch appears. Enable the toggle switch to use CES only on the HTTPS port.
- (If the Server protocol is Enable HTTPS) Configure the following details in the Server certificate for Java KeyStore pane.
- Select the relevant Type, and enter platform-specific values in the subsequent fields:
(For Windows or Linux) If Type is Java KeyStore, enter the Location of the Java keystore file (.jks) and the Java keystore Password.
- Select the relevant Type, and enter platform-specific values in the subsequent fields:
(For USS only) If Type is Keyring or Keyring with Hardware CCA, enter the relevant Keyring username and Keyring name.
If the Keyring CCA server certificate feature does not work as expected, ensure that you are using the Java version J17.0_64.v11 or later. If required, update the Java version in the CESEMN file.Update the java.security file for Java. This file is a part of JDK and is located in the conf/security directory of the JDK installation. Update the file with the following providers:
security.provider.1=IBMJCEHYB
security.provider.2=IBMJCECCA
security.provider.3=OpenJCEPl
security.provider.4=IBMZSecur
security.provider.5=SUN
security.provider.6=SunRsaSig
security.provider.7=SunEC
security.provider.8=SunJSSE
security.provider.9=SunJCE
security.provider.10=SunJGSS
security.provider.11=SunSASLAfter making these changes, restart the CES service.
- Enter the Certificate alias to identify the certificate.
- (If the Server protocol is Enable HTTPS) Configure the following details in the Client workstation certificate authentication pane.
- Select the relevant Type of certificate authentication.
(If the Client certificate alias is TrustStore or Java KeyStore) Use the Require client authentication toggle switch to enforce client authentication.
- (If the Client certificate alias is TrustStore) Select the relevant Type, and enter platform-specific values in the subsequent fields:
- (For Windows or Linux) If Type is TrustStore, enter the Location of the TrustStore on the server and the keystore Password. The TrustStore can be the same as the Java KeyStore.
(For USS only) If Type is Keyring or Keyring with Hardware CCA, enter the relevant Keyring username and Keyring name. The TrustStore can be the same as the provided Keyring or Keyring with Hardware CCA type.
- Click Apply and restart server.