ObjectDB Database Search

1-1 of 1 result

SSL Configuration

over an insecure network, such as the Internet. SSL Keystore and Truststore Files To use SSL ... . The SSL protocol uses the RSA algorithm for key exchange. A truststore file that contains ... /keytool.html By using these keystore and truststore files, a client can verify during the SSL handshake