1
|
Write a label for the connector in the Label field.
|
2
|
Select when and how the connector should start listening on its port in the Start mode list. Select Automatic if the connector should start listening when the Model Manager server starts. Select Manual if the connector should only start listening when clicking Start on the Connector page.
|
3
|
Select Default in the Port list if the connector should listen on the default port — the default port is 443 if TLS is enabled, 80 if TLS is disabled. Select Manual to manually write the port to listen on in the shown input field.
|
4
|
Select All in the Listener address list to let the connector listen on all local addresses. Select Custom and write an IP address in the shown input field to only listen on that address.
|
5
|
Select between Enabled or Disabled in the Enable TLS list to explicitly set whether or not TLS is enabled for the connector. Select Automatic if TLS should be enabled if, and only if, a TLS host configuration has been added.
|
6
|
Select between Enabled or Disabled in the Support HTTP/2 list to explicitly set whether or not the HTTP/2 protocol is enabled for the connector. Select Automatic if HTTP/2 is to be enabled if, and only if, TLS is enabled.
|
1
|
Select Default in the Hostname list to accept connections regardless of the hostname used by a connecting client. The Default option can be used for at most one TLS host configuration. Select Custom and write the name of the host associated with your certificate in the shown text field to use a custom hostname for this TLS host configuration. You can write either a fully qualified domain name, say modelmanager.example.com, or a wildcard domain name, say *.example.com.
|
2
|
Select the TLS versions that are available when communicating with clients in the Client compatibility list. Select Modern for TLSv1.3, Intermediate for TLSv1.2 and TLSv1.3., or Automatic if the Model Manager server should decide.
|
3
|
a
|
Either write a new name, or keep the suggested name, for the certificate in the Name field. The name must be unique in the list of certificates for a TLS host configuration.
|
b
|
Select the type of location used to store certificates in the Location list. A Model Manager server supports the following locations: PEM Files, PKCS#12 Keystore, Windows Native Certificate Store, and MacOS Native Keychain.
|
4
|
Click Save to save the new connector.
|
•
|
Certificate file. The path on the Model Manager server computer to the certificate file.
|
•
|
Chain file. The path on the Model Manager server computer to the certificate chain file. Leave empty if the certificate does not have a chain file.
|
•
|
Key file. The path on the Model Manager server computer to the file containing the certificate key. Leave empty if there is no separate file for the key.
|
•
|
Key password. The key password for the certificate.
|
•
|
Keystore file. The path on the Model Manager server computer to the keystore file.
|
•
|
Keystore password. The password for the keystore file.
|
•
|
Key alias. The alias of the certificate to use from the keystore. Select from the list of available aliases.
|
•
|
Key password. The key password for the certificate.
|