{"id":16217,"date":"2021-04-18T17:10:57","date_gmt":"2021-04-18T15:10:57","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/"},"modified":"2021-04-18T17:10:57","modified_gmt":"2021-04-18T15:10:57","slug":"documentum-ssl-certificate-based-secure-communication-setup","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/","title":{"rendered":"Documentum &#8211; SSL Certificate based secure communication setup"},"content":{"rendered":"<p>Around four years ago, I did a few presentations, here, in Switzerland about &#8220;Security &amp; Documentum&#8221;. In there, I talked about a lot of different subjects related to both security and Documentum (you guessed it&#8230;) like: ciphers, SHA, FIPS &amp; JCE, Documentum &amp; DFC connect mode (characteristics, ciphers, protocols, encryptions, limitations), Documentum &amp; DFC encryptions in transit and at rest (AEK\/DBK\/LTK\/FSK\/FEK, TCS, CS Lockbox, D2 Lockbox vs D2 Keystore, Passwords encryption and decryption), and some other topics (HTTPS on WebLogic, JBoss\/WildFly, Tomcat, best practices for security, LDAPS support, FIPS 140-2 support and compliance).<\/p>\n<p>&nbsp;<\/p>\n<p>&#8220;Why the hell are you talking about presentations you gave 4 years ago?&#8221;. Good question, thank you! This presentation was really dense so all I could do was just put an example of the configuration files needed for real SSL Certificate based secure communication but not how exactly to reach this point. I talked about this configuration in several blogs already but never took the time to explain\/show it from A to Z. So, that&#8217;s what I&#8217;m going to do here because without being able to create the SSL Certificate and trust stores, you will probably have some trouble to really configure Documentum to use the real-secure mode (in opposition to the default-secure, which is using anonymous and therefore not fully secure).<\/p>\n<p>&nbsp;<\/p>\n<p>In this blog, I will use self-signed SSL Certificate only. It is possible to use CA signed SSL Certificate, the only thing it would change is that you would need to set the trust chain into the different trust stores instead of the self-signed SSL Certificate. This has pros and cons however&#8230; This means it is easier to automate because a CA trust chain is a public SSL Certificate and therefore in case you are in a CI\/CD infrastructure, you can easily create the needed Documentum trust stores from anywhere (any pods, any containers, any VMs, aso&#8230;). However, that also means that anybody with access to this trust chain can potentially create the needed files used by a DFC Client to talk to your Docbroker and Repositories. That might or might not be a problem for you so I will let you decide on that. On the other hand, using a self-signed SSL Certificate makes it more difficult to gain access to the certificates (unless you are storing it in a public and open location of course) but at the same time, this complicates a little bit the setup for remote DFC Clients since you will need to share, somehow, the Docbroker and Repositories certificates in order to create a trust store for the DFC Clients.<\/p>\n<p>&nbsp;<\/p>\n<p>I split the steps into different sections: one global definition of parameters &amp; passwords and then one section per component. Please note that for the DFC Client section, I used the JMS. The same steps can be applied for any DFC Client, you will just need to have access to the needed input files. Please make sure that all components are shutdown when you start the configuration, to avoid expected errors: it will be easier to spot errors if something you expect to be working isn&#8217;t, if you don&#8217;t have hundreds of expected errors in the middle because all clients are still trying to use non-secure (or default-secure) modes. Alright, enough blabbering, let&#8217;s start with the setup.<\/p>\n<p>&nbsp;<\/p>\n<h3>I. Global setup\/parameters<\/h3>\n<p>All the files needed for the Docbroker and Repositories setup needs to be put into the <em>$DOCUMENTUM\/dba\/secure\/<\/em> folder so all the commands will be executed in there directly. I defined here some environment variables that will be used by all the commands. The read commands will simply ask you to enter the needed password and press enter. Doing that will store the password into the environment variable (<strong>lb_pp<\/strong>, <strong>b_pwd<\/strong>, <strong>s_pwd<\/strong> and <strong>d_pwd<\/strong>). If you aren&#8217;t using any Lockbox (since deprecated since Documentum 16.7), just ignore the Lockbox part.<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">cd $DOCUMENTUM\/dba\/secure\/\nlb_name=\"lockbox.lb\"\naek_name=\"CSaek\"\nb_name=\"docbroker\"\ns_name=\"contentserver\"\nd_name=\"dfc\"\n\nread -s -p \"  ----&gt; Please enter the ${lb_name} passphrase: \" lb_pp\n\nread -s -p \"  ----&gt; Please enter the ${b_name} related password: \" b_pwd\n\nread -s -p \"  ----&gt; Please enter the ${s_name} related password: \" s_pwd\n\nread -s -p \"  ----&gt; Please enter the ${d_name} related password: \" d_pwd\n\necho \"\nLockbox passphrase entered: ${lb_pp}\nBroker password entered: ${b_pwd}\nServer password entered: ${s_pwd}\nDFC password entered: ${d_pwd}\"<\/pre>\n<p>&nbsp;<\/p>\n<h3>II. Docbroker setup &#8211; SSL Server only<\/h3>\n<p>In this section, we will create the certificate for the Docbroker, create the needed keystore (it needs to be PKCS12) and encrypt the keystore password. If you aren&#8217;t using any Lockbox, in the &#8220;<strong>dm_encrypt_password<\/strong>&#8221; command, just remove the two parameters related to it (and its associated value\/password) and remove the &#8220;<strong>crypto_lockbox<\/strong>&#8221; from the <em>Docbroker.ini<\/em> file (or whatever the name of your file is).<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">openssl req -x509 -days 1096 -newkey rsa:2048 -keyout ${b_name}.key -out ${b_name}.crt -subj \"\/C=CH\/ST=Jura\/L=Delemont\/O=dbi services\/OU=IT\/CN=${b_name}\" -passout pass:\"${b_pwd}\"\n\nopenssl pkcs12 -export -out ${b_name}.p12 -inkey ${b_name}.key -in ${b_name}.crt -name ${b_name} -descert -passin pass:\"${b_pwd}\" -passout pass:\"${b_pwd}\"\n\ndm_encrypt_password -lockbox \"${lb_name}\" -lockboxpassphrase \"${lb_pp}\" -keyname \"${aek_name}\" -encrypt \"${b_pwd}\" -file ${b_name}.pwd\n\ncp $DOCUMENTUM\/dba\/Docbroker.ini $DOCUMENTUM\/dba\/Docbroker.ini.orig\n\necho \"[DOCBROKER_CONFIGURATION]\nsecure_connect_mode=secure\ncrypto_keyname=${aek_name}\ncrypto_lockbox=${lb_name}\nkeystore_file=${b_name}.p12\nkeystore_pwd_file=${b_name}.pwd\" &gt; $DOCUMENTUM\/dba\/Docbroker.ini<\/pre>\n<p>&nbsp;<\/p>\n<p>At this point, you can start the Docbroker and it should start only on the secure port, without errors. If there are still clients up&amp;running, you will probably face a lot of handshake failure errors&#8230; It is possible to define the list of ciphers to use in the <em>Docbroker.ini<\/em> file (<strong>cipherlist=xxx:yyy:zzz<\/strong>) but if you do so, please make sure that all the SSL Clients (Repository and DFC Clients alike) that will talk to it does support this cipher as well.<\/p>\n<p>&nbsp;<\/p>\n<h3>III. Repository setup &#8211; SSL Server and SSL Client<\/h3>\n<p>In this section, we will create the certificate for the Repositories (each repo can have its own if you prefer), create the needed keystore (it needs to be PKCS12), create the needed trust store (it needs to be PKCS7) and encrypt the keystore password. If you aren&#8217;t using any Lockbox, in the &#8220;<strong>dm_encrypt_password<\/strong>&#8221; command, just remove the two parameters related to it (and its associated value\/password). In case you have several Lockbox and AEK Key, you might want to retrieve their names from the <em>server.ini<\/em> directly (inside the loop) and then use these to encrypt the password, for each Repository, independently.<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">openssl req -x509 -days 1096 -newkey rsa:2048 -keyout ${s_name}.key -out ${s_name}.crt -subj \"\/C=CH\/ST=Jura\/L=Jura\/O=dbi services\/OU=IT\/CN=${s_name}\" -passout pass:\"${s_pwd}\"\n\nopenssl pkcs12 -export -out ${s_name}.p12 -inkey ${s_name}.key -in ${s_name}.crt -name ${s_name} -descert -passin pass:\"${s_pwd}\" -passout pass:\"${s_pwd}\"\n\ndm_encrypt_password -lockbox \"${lb_name}\" -lockboxpassphrase \"${lb_pp}\" -keyname \"${aek_name}\" -encrypt \"${s_pwd}\" -file ${s_name}.pwd\n\nopenssl crl2pkcs7 -nocrl -certfile ${b_name}.crt -outform der -out ${s_name}-trust.p7b\n\nfor s_ini in $(ls $DOCUMENTUM\/dba\/config\/*\/server.ini); do\n  cp ${s_ini} ${s_ini}.orig\n  sed -i --follow-symlinks \"\/keystore_file\/d\" ${s_ini}\n  sed -i --follow-symlinks \"\/keystore_pwd_file\/d\" ${s_ini}\n  sed -i --follow-symlinks \"\/truststore_file\/d\" ${s_ini}\n  sed -i --follow-symlinks \"\/cipherlist\/d\" ${s_ini}\n  sed -i --follow-symlinks \"\/^crypto_keyname\/a truststore_file = ${s_name}-trust.p7b\" ${s_ini}\n  sed -i --follow-symlinks \"\/^crypto_keyname\/a keystore_pwd_file = ${s_name}.pwd\" ${s_ini}\n  sed -i --follow-symlinks \"\/^crypto_keyname\/a keystore_file = ${s_name}.p12\" ${s_ini}\ndone<\/pre>\n<p>&nbsp;<\/p>\n<p>At this point, you can start the different Repositories and it should start and project itself to the Docbroker. However, The AgentExec should still fail to start properly because it should use the global <em>dfc.properties<\/em> of the Documentum Server, which wasn&#8217;t updated yet. So you might want to configure the global <em>dfc.properties<\/em> before starting the Repositories. It is possible to define the list of ciphers to use in the <em>server.ini<\/em> file (<strong>cipherlist=xxx:yyy:zzz<\/strong>) but if you do so, please make sure that all the SSL Clients (DFC Clients) that will talk to it and SSL Servers (Docbroker) it talks to does support this cipher as well.<\/p>\n<p>&nbsp;<\/p>\n<h3>IV. DFC Clients setup (JMS, IndexAgent, DA, D2, &#8230;) &#8211; SSL Client only<\/h3>\n<p>In this section, we will create the needed trust store (it needs to be JKS) and encrypt the trust store password. Regarding the password encryption, this command will work on any DFC Client, you will just need to add the <em>dfc.jar<\/em> in the classpath (for example on xPlore: <strong>-cp &#8220;$XPLORE_HOME\/dfc\/dfc.jar&#8221;<\/strong>) if you aren&#8217;t executing it on a Documentum Server.<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">openssl x509 -outform der -in ${b_name}.crt -out ${b_name}.der\n\nopenssl x509 -outform der -in ${s_name}.crt -out ${s_name}.der\n\n$JAVA_HOME\/bin\/keytool -importcert -keystore ${d_name}-trust.jks -file ${b_name}.der -alias ${b_name} -noprompt -storepass ${d_pwd}\n\n$JAVA_HOME\/bin\/keytool -importcert -keystore ${d_name}-trust.jks -file ${s_name}.der -alias ${s_name} -noprompt -storepass ${d_pwd}\n\nd_pwd_enc=$($JAVA_HOME\/bin\/java com.documentum.fc.tools.RegistryPasswordUtils ${d_pwd})\n\ncp $DOCUMENTUM\/config\/dfc.properties $DOCUMENTUM\/config\/dfc.properties.orig\nsed -i '\/dfc.session.secure_connect_default\/d' $DOCUMENTUM\/config\/dfc.properties\nsed -i '\/dfc.security.ssl.use_existing_truststore\/d' $DOCUMENTUM\/config\/dfc.properties\nsed -i '\/dfc.security.ssl.truststore\/d' $DOCUMENTUM\/config\/dfc.properties\nsed -i '\/dfc.security.ssl.truststore_password\/d' $DOCUMENTUM\/config\/dfc.properties\n\necho \"dfc.session.secure_connect_default=secure\ndfc.security.ssl.use_existing_truststore=false\ndfc.security.ssl.truststore=$DOCUMENTUM\/dba\/secure\/${d_name}-trust.jks\ndfc.security.ssl.truststore_password=${d_pwd_enc}\" &gt;&gt; $DOCUMENTUM\/config\/dfc.properties<\/pre>\n<p>&nbsp;<\/p>\n<p>This is technically the global <em>dfc.properties<\/em> of a Documentum Server and not really the JMS one but I assume almost everybody in the world is just including this one (using <strong>#include<\/strong>) for the <em>dfc.properties<\/em> of the JMS (ServerApps, acs, bpm, &#8230;), to avoid duplication of generic parameters\/configurations at multiple locations and just manage them globally.<\/p>\n<p>&nbsp;<\/p>\n<p>At this point, you can start the DFC Client and it should be able to communicate with the Docbroker and with the Repositories. As said before, if you already started the Repository, you might want to make sure that the AgentExec is running and if not, maybe restart the Repositories quickly.<\/p>\n<p>&nbsp;<\/p>\n<p>Some final remarks on the SSL Certificate based secure configuration of Documentum:<\/p>\n<ul>\n<li>Other Content Servers &amp; Docbrokers (HA part) must re-use the exact same keystores (and therefore trust store as well in the end). Files must be sent to all other hosts and re-used exactly in the same way<\/li>\n<li>Other DFC clients can use newly created files but in the end, it will contain the exact same content (either the self-signed Docbroker and Repositories certificates or the CA-signed trust chain)&#8230; Therefore, files can be sent to all DFC clients and re-used exactly in the same way as well<\/li>\n<li>After the initial generation, you don&#8217;t need any of the key, crt or der files anymore so you can remove them for security reasons:\n<ul>\n<li>rm ${b_name}.key ${b_name}.crt ${b_name}.der ${s_name}.key ${s_name}.crt ${s_name}.der<\/li>\n<\/ul>\n<\/li>\n<li>I didn&#8217;t describe everything in full-length here, there are a bunch of other things and limitations to know before going into that direction so you will probably want to read the documentation carefully<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Around four years ago, I did a few presentations, here, in Switzerland about &#8220;Security &amp; Documentum&#8221;. In there, I talked about a lot of different subjects related to both security and Documentum (you guessed it&#8230;) like: ciphers, SHA, FIPS &amp; JCE, Documentum &amp; DFC connect mode (characteristics, ciphers, protocols, encryptions, limitations), Documentum &amp; DFC encryptions [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[197,525],"tags":[1149,1602,567,1176,129,903,2321,382],"type_dbi":[],"class_list":["post-16217","post","type-post","status-publish","format-standard","hentry","category-application-integration-middleware","category-enterprise-content-management","tag-certificate","tag-content-server","tag-dfc","tag-docbroker","tag-documentum","tag-jms","tag-secure","tag-ssl"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Documentum - SSL Certificate based secure communication setup - dbi Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Documentum - SSL Certificate based secure communication setup\" \/>\n<meta property=\"og:description\" content=\"Around four years ago, I did a few presentations, here, in Switzerland about &#8220;Security &amp; Documentum&#8221;. In there, I talked about a lot of different subjects related to both security and Documentum (you guessed it&#8230;) like: ciphers, SHA, FIPS &amp; JCE, Documentum &amp; DFC connect mode (characteristics, ciphers, protocols, encryptions, limitations), Documentum &amp; DFC encryptions [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-18T15:10:57+00:00\" \/>\n<meta name=\"author\" content=\"Morgan Patou\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MorganPatou\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Morgan Patou\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/\"},\"author\":{\"name\":\"Morgan Patou\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8\"},\"headline\":\"Documentum &#8211; SSL Certificate based secure communication setup\",\"datePublished\":\"2021-04-18T15:10:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/\"},\"wordCount\":1428,\"commentCount\":0,\"keywords\":[\"Certificate\",\"Content Server\",\"dfc\",\"docbroker\",\"Documentum\",\"jms\",\"secure\",\"SSL\"],\"articleSection\":[\"Application integration &amp; Middleware\",\"Enterprise content management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/\",\"name\":\"Documentum - SSL Certificate based secure communication setup - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\"},\"datePublished\":\"2021-04-18T15:10:57+00:00\",\"author\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dbi-services.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Documentum &#8211; SSL Certificate based secure communication setup\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8\",\"name\":\"Morgan Patou\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"caption\":\"Morgan Patou\"},\"description\":\"Morgan Patou has over 12 years of experience in Enterprise Content Management (ECM) systems, with a strong focus in recent years on platforms such as Alfresco, Documentum, and M-Files. He specializes in the architecture, setup, customization, and maintenance of ECM infrastructures in complex &amp; critical environments. Morgan is well-versed in both engineering and operations aspects, including high availability design, system integration, and lifecycle management. He also has a solid foundation in open-source and proprietary technologies - ranging from Apache, OpenLDAP or Kerberos to enterprise-grade systems like WebLogic. Morgan Patou holds an Engineering Degree in Computer Science from ENSISA (\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs Sud Alsace) in Mulhouse, France. He is Alfresco Content Services Certified Administrator (ACSCA), Alfresco Content Services Certified Engineer (ACSCE) as well as OpenText Documentum Certified Administrator. His industry experience spans the Public Sector, IT Services, Financial Services\/Banking, and the Pharmaceutical industry.\",\"sameAs\":[\"https:\/\/blog.dbi-services.com\/author\/morgan-patou\/\",\"https:\/\/x.com\/MorganPatou\"],\"url\":\"https:\/\/www.dbi-services.com\/blog\/author\/morgan-patou\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Documentum - SSL Certificate based secure communication setup - dbi Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/","og_locale":"en_US","og_type":"article","og_title":"Documentum - SSL Certificate based secure communication setup","og_description":"Around four years ago, I did a few presentations, here, in Switzerland about &#8220;Security &amp; Documentum&#8221;. In there, I talked about a lot of different subjects related to both security and Documentum (you guessed it&#8230;) like: ciphers, SHA, FIPS &amp; JCE, Documentum &amp; DFC connect mode (characteristics, ciphers, protocols, encryptions, limitations), Documentum &amp; DFC encryptions [&hellip;]","og_url":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/","og_site_name":"dbi Blog","article_published_time":"2021-04-18T15:10:57+00:00","author":"Morgan Patou","twitter_card":"summary_large_image","twitter_creator":"@MorganPatou","twitter_misc":{"Written by":"Morgan Patou","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/"},"author":{"name":"Morgan Patou","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8"},"headline":"Documentum &#8211; SSL Certificate based secure communication setup","datePublished":"2021-04-18T15:10:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/"},"wordCount":1428,"commentCount":0,"keywords":["Certificate","Content Server","dfc","docbroker","Documentum","jms","secure","SSL"],"articleSection":["Application integration &amp; Middleware","Enterprise content management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/","url":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/","name":"Documentum - SSL Certificate based secure communication setup - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"datePublished":"2021-04-18T15:10:57+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8"},"breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/documentum-ssl-certificate-based-secure-communication-setup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Documentum &#8211; SSL Certificate based secure communication setup"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8","name":"Morgan Patou","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","caption":"Morgan Patou"},"description":"Morgan Patou has over 12 years of experience in Enterprise Content Management (ECM) systems, with a strong focus in recent years on platforms such as Alfresco, Documentum, and M-Files. He specializes in the architecture, setup, customization, and maintenance of ECM infrastructures in complex &amp; critical environments. Morgan is well-versed in both engineering and operations aspects, including high availability design, system integration, and lifecycle management. He also has a solid foundation in open-source and proprietary technologies - ranging from Apache, OpenLDAP or Kerberos to enterprise-grade systems like WebLogic. Morgan Patou holds an Engineering Degree in Computer Science from ENSISA (\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs Sud Alsace) in Mulhouse, France. He is Alfresco Content Services Certified Administrator (ACSCA), Alfresco Content Services Certified Engineer (ACSCE) as well as OpenText Documentum Certified Administrator. His industry experience spans the Public Sector, IT Services, Financial Services\/Banking, and the Pharmaceutical industry.","sameAs":["https:\/\/blog.dbi-services.com\/author\/morgan-patou\/","https:\/\/x.com\/MorganPatou"],"url":"https:\/\/www.dbi-services.com\/blog\/author\/morgan-patou\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/16217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=16217"}],"version-history":[{"count":0,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/16217\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=16217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=16217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=16217"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=16217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}