ObjectDB Database Search
1-1 of 1 resultSSL Configuration over an insecure network, such as the Internet. SSL Keystore and Truststore Files To use SSL ... . The SSL protocol uses the RSA algorithm for key exchange. A truststore file that contains ... /keytool.html By using these keystore and truststore files, a client can verify during the SSL handshake |