此内容没有您所选择的语言版本。

1.3. Preparing to use AMQ with SSL


Overview

This section gives a brief overview of how to secure A-MQ using SSL to run the clients with security features enabled. To setup SSL for server authentication, you require broker certificates and password configuration.
  • To generate a certificate for the amq broker, create a directory on your system to hold the generated files. For example, mkdir certificates_dir
  • To generate the certificates, navigate to the certificates directory and run the following command.
    keytool -genkey -alias broker -keyalg RSA -keystore broker.ks \ -storepass ${general_passwd} -dname "O=RedHat Inc.,CN=$(hostname)" \ -keypass ${general_passwd} -validity 99999
    where, general_passwd is the value of the password that you need to specify and hostname specify the hostname as per the settings on your system

Setting up A-MQ for listening to amqp+ssl connection

To enable server authentication, client authentication, and to skip SASL authentication, modify the activemq.xml file to include the authentication settings
  • For Server authentication, add the amqp+ssl connector to the list if transportConnectors in activemq.xml.
    <transportConnector name="amqp+ssl" uri="amqp+ssl://<hostname>:5671"/>
  • For Client authentication, add the amqp+ssl connector to the list if transportConnectors in activemq.xml
    <transportConnector name="amqp+ssl" uri="amqp+ssl://<hostname>:5671?needClientAuth=true"/>
  • For skip SASL authentication, enable the anonymous access property for the simpleAuthenticationPlugin in activemq.xml
    <simpleAuthenticationPlugin anonymousAccessAllowed="true"/>
Red Hat logoGithubRedditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

© 2024 Red Hat, Inc.