IBM Integration Bus, Version 9.0.0.8 Operating Systems: AIX, HP-Itanium, Linux, Solaris, Windows, z/OS

See information about the latest product version

Application Transparent Transport Layer Security

AT-TLS is a service provided by the z/OS® Communication Server Policy Agent (PAGENT) and the TCP/IP stack. The AT-TLS service manages SSL connections on behalf of applications that are running on z/OS. The z/OS applications are unaware that SSL is used in the connection with partner applications.

The following diagram shows how AT-TLS works. The numbers in the diagram represent the steps that follow the diagram.
The diagram is described in the surrounding text.
  1. Step 1 represents an SSL connection when AT-TLS is not used, which requires that IBM® Integration Bus and the partner application are both enabled for SSL.
  2. The SSL handshake is managed by AT-TLS in the TCP layer.
  3. Inbound or outbound application data is received or sent in the clear by IBM Integration Bus. The TCP layer validates and decrypts inbound data from partner applications, or encrypts outbound data to partner applications.
  4. Inbound or outbound application data is protected by SSL.

AT-TLS components

RACF® key ring
The RACF key ring contains the IBM Integration Bus personal certificate and the partner application signer certificate.
AT-TLS policies
This file contains the rules and policies that control the SSL connections that are managed by AT-TLS. These policies are created by the network administrator, and are checked and enforced by the TCP network layer of the TCP/IP stack.
Policy Agent
This component manages and distributes network policies, including AT-TLS policies, to the TCP/IP stack or stacks. The policy agent is also called PAGENT. For AT-TLS to function successfully, PAGENT must be configured correctly and operational.
TCP/IP stack
The TCP/IP stack is the component that implements the AT-TLS services. The TCP network layer is where SSL connections are intercepted, the SSL handshake is performed, and data is decrypted and encrypted. The TCP/IP stack uses RACF services to validate and accept certificates that are presented by the partner application during the handshake. RACF retrieves the IBM Integration Bus personal certificate from the key ring.

bp22780_.htm | Last updated Friday, 21 July 2017