7.6 Connecting Oracle GoldenGate Veridata to SSL-Enabled MySQL Database
Setting up Server Authentication via server certificate
Setting up Client Authentication via client certificate
- Copy
client-cert.pem
andclient-key.pem
two files from MySQL database server to veridata agent machine. - Run the
openssl
command in the veridata agent machine to convert the client key and certificate files to a PKCS #12 archive:$> openssl pkcs12 -export -in client-cert.pem -inkey client-key.pem -name "<Set_Your_name>" -passout pass:<Set_Your_Password> -out client-keystore.p12
- Run the
keytool
command in the veridata agent machine to import the PKCS file:$> keytool -importkeystore -srckeystore client-keystore.p12 -srcstoretype pkcs12 -srcstorepass <Set_Your_Password> -destkeystore keystore -deststoretype JKS -deststorepass <Set_Your_Password>
.Note:
If the keystore file does not already exist, then new one is created; else, the certificate is added to the existing file. - Export java parameters to read the keystore you just
created or modified:
export JAVA_OPTS="$JAVA_OPTS -Djavax.net.ssl.keyStore=<path_to_keystore_file> -Djavax.net.ssl.keyStorePassword=<your_keystore_password>"
. - Authentication via client certificate does not require
connection parameters in
MySQL JDBC URL
as opposed to via server certificate.
2-Way Authentication
Apply the steps outlined in both Setting up Server Authentication via server certificate and Setting up Client Authentication via client certificate topics.
Parent topic: Secure