Red Hat AMQ 6
As of February 2025, Red Hat is no longer supporting Red Hat AMQ 6. If you are using AMQ 6, please upgrade: Migrating to AMQ 7.Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
3.4. Setting up SSL for A-MQ
				ActiveMQ includes key and trust stores that reference a dummy self signed certificate.
			
				To install and configure SSL support for A-MQ, you need to create a keystore file to store the server's private key and self-signed certificate and uncomment the 
SSL HTTP/1.1 Connector entry in conf/server.xml.
			Note
					When you create a broker certificate and trust stores for your installation, either overwrite the values in the 
conf directory or delete the existing dummy key and trust stores so they do not interfere.
				Starting the Broker with SSL
Link kopierenLink in die Zwischenablage kopiert!
				To start the broker, use the 
>javax.net.ssl.keyStore and javax.net.ssl.keyStorePassword system properties
			- Set the SSL_OPTS environment variable so that it knows to use the broker keystore.<export SSL_OPTS = -Djavax.net.ssl.keyStore=/path/to/broker.ks -Djavax.net.ssl.keyStorePassword=passwordAlternately, you can set the system properties in the broker configuration file.
				To configure the security context in the broker configuration file, follow the instructions below:
			
- In theconf/activemq.xml, edit the attributes in thesslContextelement.
- Set the values for KeyStore, Key StorePassword, truststore, trustStorePassword.Copy to Clipboard Copied! Toggle word wrap Toggle overflow 
- keyStore
- equivalent to settingjavax.net.ssl.keyStore
- keyStorePassword
- equivalent to settingjavax.net.ssl.keyStorePassword
- keyStoreType
- equivalent to settingjavax.net.ssl.keyStoreType
- keyStoreAlgorithm
- defaults to JKS
- trustStore
- equivalent to settingjavax.net.ssl.trustStore
- trustStorePassword
- equivalent to settingjavax.net.ssl.trustStorePassword
- trustStoreType
- equivalent to settingjavax.net.ssl.trustStoreType
Verifying Client Certificates
Link kopierenLink in die Zwischenablage kopiert!
				To verify client certificates, follow the below instructions:
			
- Export the client's certificate to share it with the broker. keytool -export -alias client -keystore client.ks -file client_cert
- Create a truststore for the broker and import the client's certificate. This ensures that the broker trusts the client.keytool -import -alias client -keystore broker.ts -file client_cert keytool -import -alias client -keystore broker.ts -file client_certCopy to Clipboard Copied! Toggle word wrap Toggle overflow 
- Addjavax.net.ssl.trustStoresystem property toSSL_OPTSDjavax.net.ssl.trustStore=/path/to/broker.ts
- Instruct ActiveMQ to require client authentication by setting the following inactivemq.xml.<transportConnectors> <transportConnector name="ssl" uri="ssl://localhost:61617?needClientAuth=true"/> </transportConnectors> <transportConnectors> <transportConnector name="ssl" uri="ssl://localhost:61617?needClientAuth=true"/> </transportConnectors>Copy to Clipboard Copied! Toggle word wrap Toggle overflow