Secure Global Desktop Administration Guide > Security > Securing the SOAP connections to a Secure Global Desktop server
Client applications, such as the browser-based webtop, use the SOAP protocol (over HTTP) to access the web services provided by a Secure Global Desktop server. We recommend you use HTTPS to secure these SOAP connections if you:
com.tarantella.tta.webservices.client.views
package, either on the same host as Secure Global Desktop or on a different host.Note If you develop your own client, for example because you want to use a different programming language, you need to develop your own methods for securing the SOAP connections. This page gives the general principles you need to implement.
To secure the SOAP connections, the client must be configured to use HTTPS and to trust the X.509 certificates for any Secure Global Desktop servers it connects to. Follow these steps:
/opt/tarantella/bin/jre/bin/keytool -import -keystore keystore_path -file certificate_path
/opt/tarantella/var/tsp/cert.pem.
webapps/sgd/WEB-INF/classes/com/tarantella/tta/webservices/client/apis
directory.Resources.properties
file.http://server:port/service
(the default is http://localhost:80
/service).localhost
for the server if the webtop/application is on the same host as Secure Global Desktop. Otherwise, use the fully qualified DNS name of a Secure Global Desktop server.https://boston.indigo-insurance.com:443/axis/services/rpc/print
.Resources.properties
file:
keystore=keystore keystorepass=passwordwhere keystore is the path to the keystore and password is the password for the keystore.
Resources.properties
file.tarantella webserver restart --ssl
.Resources.properties
file. You must also make sure the web server is configured to accept HTTPS connections and restart it.If you have relocated the browser-based webtop to another host, or if you have developed your
own applications on another host using the
com.tarantella.tta.webservices.client.views
package, you must edit
both the relocated Resources.properties
file and the one on the
Secure Global Desktop server.
In the relocated Resources.properties
file, the URLs must be for the Secure Global Desktop server the client application will connect to, for example
https://boston.indigo-insurance.com:443/axis/services/rpc/print
.
In the Resources.properties
file on the Secure Global Desktop host, amend the URLs to https://localhost:443
.
You have to create two keystores:
For the HTTPS connections to the Secure Global Desktop server, you must create a
keystore on the remote host, using your own JDK. This keystore must contain the Secure Global Desktop server certificate. Add the details of this keystore to the relocated Resources.properties
file.
For the HTTPS connections from the Secure Global Desktop server to the remote host, you must install the root certificate for the remote host into the keystore (the cacerts
file) for the JVM used by the Secure Global Desktop server. You do this using the keytool application. We also recommend you use the -alias command to identify the certificate, for example:
/opt/tarantella/bin/jre/bin/keytool -import \ -keystore /opt/tarantella/bin/jre/lib/security/cacerts \ -file certificate_path -alias remote_server_name
If you have developed your own Java web applications and you do not want to include the keystore details in the Resources.properties
file, you can pass in this information by setting the following System properties:
keystore path: javax.net.ssl.trustStore keystore password: javax.net.ssl.keyStorePassword
If you do this, you must not assign any keystore values in the Resources.properties
file.
Copyright © 1997-2005 Sun Microsystems, Inc. All rights reserved.