This dialog box opens when you press the Security.. button on the Listener Information dialog. (To reach the Listener Information dialog, you select Listener from the main window's Advanced menu.) The server side of LANSA Communication Extensions will determine whether the communication line is to be a secure or a non-secure line.

Cryptographic Algorithm

Select the cryptographic algorithm you require from the drop down list. Options are:

Compression

Select this option to enable and disable compression during connection.

The use of encryption and/or compression algorithms causes more CPU cycles to be consumed during communication sessions.

This option is not used when SSL is used. SSL has data compression integrated into the protocol.

Secure Sockets

Select this option to use the SSL/TLS protocols to authenticate and encrypt your data transmission between your client and server. SSL/TLS is designed to facilitate privacy and data security for communications over a network.

Options

Use self-signed certificate from default location

Select this option to use the default self-signed certificate that is installed by the Visual LANSA install.

Use the certificate present at below location

Select this option to use a certificate that you have obtained/generated. If you select this option, then specify the location of the certificate (in pfx or p12 format) in the field below. Use the “…” button to browse for the file.

Password

When generating a self-signed certificate or obtaining a Certificate Authority (CA) issued certificate in .pfx or .p12 format, the private key, certificate bundle/chain, and the certificate in .crt format may be wrapped or bundled using a password. The password may be blank. The password is required to parse the .pfx or .p12 package when communication is being established. The password must match exactly the password given during the .pfx/.p12 generation otherwise the communication attempt will fail.

SSL Version

Select the TLS version to use. Only the version that is currently supported by the operating system is listed. At the time of writing TLS 1.3 is only supported on Windows 11 and Windows Server 2022 and higher. Ensure that all clients that will be connecting to the server are able to support the selected version.

Notes

How to generate a self-signed certificate

The following commands are used to generate a self-signed certificate:

          openssl req -newkey rsa:2048 -nodes -keyout <keyFileName.pem> -x509 -days <xxx> -out <certificateFileName.pem>

OpenSSL will generate a new RSA private key, create a self-signed X.509 certificate using that key, and save both the key and certificate in the respective files (<keyFileName.pem>  and  <certificateFileName.pem>)

         openssl pkcs12 -inkey <keyFileName.pem> -in <certificateFileName.pem> -export -out <certificate.p12>

How to use a custom certificate from both a self-signed and CA issued perspective

A certificate in a .pfx/.p12 format is a common way to store a digital certificate and its associated private key in a single file.

Different certificate formats:

PEM (.pem)This is a widely used format that stores the certificate and private key separately in plain text files.
DER (.der)A binary format is used for certificates.
PKCS#7 (.p7b)A format that can store multiple certificates, often used for certificate chains.
PKCS#12 (.pfx/.p12)This format stores both the certificate and private key in a single file, typically password-protected.
Certificate (.crt)A .crt file, short for "certificate," typically contains the public key and additional information about the entity (e.g., a server or an individual) to whom the certificate is issued. It may also include the digital signature of a trusted Certificate Authority (CA), which vouches for the authenticity of the public key and the entity's identity.
Private key (.key)A .key file, short for "private key," contains the secret key associated with the public key in the corresponding .crt file.

Create a .pfx/.p12 file from multiple certificate files and a private key file

If you receive multiple .crt files and .key files from the CA authority, you should bundle those into a single file (.pfx/.p12) file. Use the following commands to bundle all files into a single file.

The generated .pfx/.p12 file can then be used.

Export the .pfx/p12 certificate from the certificate manager