Tag Archives: Java

What can i do?

When you ask recent IT graduates about the IBM i they either have never heard of it or think of green screen and RPG.  The IBM i has been more than green screen and RPG for a long time and has progressed along with the needs of its customer base, always keeping pace with current trends.  It was 20 years after the original release of the IBM System/3x, lineup that Sun released it first version of java.  And java was not widely used until a few years ago.  Those first releases of Sun java performed poorly.  The first releases of java on the IBM i had the same poor performance issues, but with the recent releases of the OS and Power hardware, java performance on the IBM i is now inline with other platforms.  Continue reading

SSL: Troubleshooting a client-authentication issue

In my last blog post, “SSL: What is “two-way” authentication?” I gave an overview of the types of authentication involved in an SSL communication. Now I’d like to talk about a recent customer implementation that required SSL two-way authentication, an authentication issue that we encountered along the way and the troubleshooting that went into getting this issue resolved.

Customer Implementation
In this implementation project, our customer was going to be setting up EXTOL’s EBI application to communicate with a third-party electronic invoicing vendor. One of the requirements was that the communication with the vendor would be done over SSL using two-way authentication. Because EXTOL was doing the initial communications/connectivity implementation and setup on behalf of our customer, the vendor sent an electronic form for us to fill out. One of the main pieces of information that the vendor required was the IP address from which we would be communicating. This was important because the vendor specifically only allowed incoming communications through their firewall from approved/authorized IP addresses. Once that was set up, the vendor supplied us with a certificate that identified their server.  EBI was then configured to trust their server certificate, and that part of the setup was completed.

Continue reading