SSL Transport Reference
The SSL Transport
The SSL transport allows clients to connect to a remote ActiveMQ broker using SSL over a TCP socket.
The configuration options from TCP are relevant.
From version 5.4 any SSLServerSocket option may be set on a TransportConnection via ?transport.XXX, for example:
JMS clients can simply use the ActiveMQSslConnectionFactory together with an ssl:// broker url as the following Spring configuration illustrates
Unless the broker’s SSL transport is configured for transport.needClientAuth=true, the client won’t need a keystore but requires a truststore in order to validate the broker’s certificate.
Similar to the broker transport configuration you can pass on SSL transport options using ?socket.XXX, such as
You can also turn on SSL debug informations this way by adding:
this way you can see what goes wrong and why you get connections closed.
“Be careful with multicast discovery”
If your XML configuration file contains the following and you wish to use SSL
Then you will currently need to comment that out.
The reason is to prevent ActiveMQ atempting to connect to itself - if you do this with a self-signed
certificate, you will get a constant spam of certificate_unknown
stacktraces to the console, as the broker is not configured with the