Configuring DA Server to Use SSL for JDBC Communication

Configure the DA server to use SSL to encrypt JDBC communication with an Adaptive Server.

  1. Configure a truststore.
    If you have already enabled SSL for DA server to DA agent JDBC communication, you can skip this step.
    This example shows how to configure a truststore:
    sslconfig truststore "C:/ssl/truststore.ks"
    go
    sslconfig truststore_passwd openSesame
    go
    
    Note: Enter Windows directory paths using forward slashes instead of backslashes.
  2. Add an Adaptive Server certificate to a DA truststore.
    For example:
    %JAVA_HOME%\bin\keytool -importcert -alias myAlias
    -file %SYBASE%\ASE-15_0\certificates\myase.crt
    -keystore "C:\ssl\truststore.ks"
    -storepass openSesame
    where:
    • %JAVA_HOME%\bin\keytool.exe – is the Java keytool location on Windows. Java keytool is available in all Java Development Kits (JDKs).
      Note: Use the Java Keytool to add the Adaptive Server certificates into the DA truststore. If the truststore does not already exist, it is created.
    • %SYBASE%\ASE-15_0\certificates\myase.crt – is an Adaptive Server certificate location.
    • C:\ssl\truststore.ks – is the keystore flat file absolute path.
    Select Yes when prompted to trust the certificate.
  3. Restart DA server.
  4. To create a DA connection for an Adaptive Server database using the jConnect SYBSOCKET_FACTORY connection property, enter:
    create connection instance_ssl
        set agent agent_name
    and set type ASE
    and set host host_name
    and set port port_number
    and set database database_name
    and set user user_name
    and set password password
    with properties
     set SYBSOCKET_FACTORY 'com.sybase.da.jdbc.AseSslSocketFactory'
    go
Related reference
create connection
sslconfig