Secure Port: Enter the port number on which Security Services listens. With Security Services installed, all HTTPS requests to Management & Control Services (MCS) go through this port.
|If you created your own HTML files for accessing MCS, you must change the port value in those files to match the port setting in the MCS.
If you previously configured clients to use SSL via Security Services, and you change the Security Services port, you must resave the client configurations in order for the clients to use the new port.
Use TLS only: Select this option to force TLS to be used with browsers. This option is not enabled by default, allowing Security Services to negotiate SSL or TLS with browsers. If you select this option, the browser must be able to accept TLS in order for a connection to be established.
Force 128-bit encryption: Select this option to allow connections to 128-bit browsers only. This option is not enabled by default, allowing Security Services connections to both 56-bit and 128-bit browsers. If you select this option, the browser must support 128-bit encryption in order for a connection to be established.
Log level: Select the type of diagnostic messages that you want Security Services to record:
If you select Errors Only or Errors and Info, Security Services sends its log entries to the MCS Event log. If you select Debug/Trace, log entries are sent to the location specified for
stdout on each supported platform (due to the large amount of data generated), as shown below:
|Application Server||Default Install Location|
|Apache Tomcat||The location will be under the Tomcat install directory, as follows if Tomcat is installed with an Attachmate product.
Save: Click this button to save your changes. After saving your changes, you must restart the Web application server on which MCS is running to invoke the changes.
|In addition to the Security Services options on this page, there are editable options in the SecurityGateway.properties file. For details, see Modifying the SecurityGateway.properties File.|
|Overview of Security Services|
|Configuring Security Services|