User guide
10-1
Chapter 10
How to Use SSL with the CORBA Service
Client-server application linkage using the CORBA Service enables encrypted communication via SSL.
This chapter explains the SSL communication via the CORBA application.
In the CORBA service, the two environments listed below can be used to manage certificates and
private keys required for encryption and signature processing.
• Interstage certificate environment
• Certificate/key management environment configured with the SMEE commands
Set either of the above environments according to the operation type. To use an Interstage certificate
environment, refer to Chapter 7, Setting and Use of the Interstage Certificate Environment to configure
the Interstage certificate environment. Then, set an SSL environment in a CORBA service using the
Interstage management console.
Setting Access Permission
In an Interstage certificate environment, to run an application with permission of a common user (other
than a system administrator (root)), the user must belong to an ownership group. Add the users running
applications to the ownership group in the Interstage certificate environment. For more information,
refer to Setting Up Access Permissions in the Interstage Certificate Environments in Chapter 7.
In a certificate/key management environment configured with the SMEE commands, to run an
application with permission of a common user (other than a system administrator (root)), execute the
odsetpath command because common user access permission must be set in a private key/certificate.
To enable a general user (a user without Administrators authority) to run an application in an Interstage
certificate environment with general user authority, the access authority for the Interstage certificate
environment must be changed. For details, refer to Setting up Access Permissions in the Interstage
Certificate Environment in Chapter 7.
To enable a general user (a user without Administrators authority) to run an application in a
certificate/key management environment configured with the SMEE command access (assuming that
user is not the one that actually configured the certificate/key management environment), the following
needs to be completed:
• Executing user access authority must be added to the certificate/key management environment.