jdbc:teiid:<myVdb>@mms://<host>:<port>
Client SSL Settings
The following sections define the properties required for each SSL mode. Note that when connecting to Teiid Spring Boot Server with SSL enabled, you MUST use the "mms" protocol, instead of "mm" in the JDBC connection URL, for example
There are two different sets of properties that a client can configure to enable 1-way or 2-way SSL.
Option 1: Java SSL properties
These are standard Java defined system properties to configure the SSL under any JVM, Teiid Spring Boot is not unique in its use of SSL. Provide the following system properties to the client VM process.
-Djavax.net.ssl.trustStore=<dir>/server.truststore (required)
-Djavax.net.ssl.trustStorePassword=<password> (optional)
-Djavax.net.ssl.keyStoreType (optional)
-Djavax.net.ssl.keyStore=<dir>/client.keystore (required)
-Djavax.net.ssl.keyStrorePassword=<password> (optional)
-Djavax.net.ssl.trustStore=<dir>/server.truststore (required)
-Djavax.net.ssl.trustStorePassword=<password> (optioanl)
-Djavax.net.ssl.keyStroreType=<keystore type> (optional)
Option 2: Teiid Spring Boot Specific Properties
Use this option when the above "javax" based properties are already in use by the host process. For example if your client application is a Tomcat process that is configured for https protocol and the above Java based properties are already in use, and importing Teiid Spring Boot-specific certificate keys into those https certificate keystores is not allowed.
In this scenario, a different set of Teiid Spring Boot-specific SSL properties can be set as system properties or defined inside the a "teiid-client-settings.properties" file. A sample "teiid-client-settings.properties" file can be found inside the "teiid-<version>-client.jar" file at the root called "teiid-client-settings.orig.properties". Extract this file, make a copy, change the property values required for the chosen SSL mode, and place this file in the client application’s classpath before the "teiid-<version>-client.jar" file.
SSL properties and definitions that can be set in a "teiid-client-settings.properties" file are shown below.
########################################
# SSL Settings
########################################
#
# The key store type. Defaults to JKS
#
org.teiid.ssl.keyStoreType=JKS
#
# The key store algorithm, defaults to
# the system property "ssl.TrustManagerFactory.algorithm"
#
#org.teiid.ssl.algorithm=
#
# The classpath or filesystem location of the
# key store.
#
# This property is required only if performing 2-way
# authentication that requires a specific private
# key.
#
#org.teiid.ssl.keyStore=
#
# The key store password (not required)
#
#org.teiid.ssl.keyStorePassword=
#
# The key alias(not required, if given named certificate is used)
#
#org.teiid.ssl.keyAlias=
#
# The key password(not required, used if the key password is different than the keystore password)
#
#org.teiid.ssl.keyPassword=
#
# The classpath or filesystem location of the
# trust store.
#
# This property is required if performing 1-way
# authentication that requires trust not provided
# by the system defaults.
#
#org.teiid.ssl.trustStore=
#
# The trust store password (not required)
#
#org.teiid.ssl.trustStorePassword=
#
# The cipher protocol, defaults to TLSv3
#
org.teiid.ssl.protocol=TLSv1
#
# Whether to allow anonymous SSL
# (the TLS_DH_anon_WITH_AES_128_CBC_SHA cipher suite)
# defaults to true
#
org.teiid.ssl.allowAnon=true
#
# Whether to allow trust all server certificates
# defaults to false
#
#org.teiid.ssl.trustAll=false
#
# Whether to check for expired server certificates (no affect in anonymous mode or with trustAll=true)
# defaults to false
#
#org.teiid.ssl.checkExpired=false
org.teiid.ssl.trustStore=<dir>/server.truststore (required)
org.teiid.ssl.keyStore=<dir>/client.keystore (required)
org.teiid.ssl.trustStore=<dir>/server.truststore (required)