|
If using a custom name for the eMessage Connector, make sure that the name is unique. The ThingWorx Platform will not create a Thing for the eMessage Connector or allow it to connect if the name is a duplicate.
|
|
Setting these properties is shown in Step 5 of the "Required Configuration" section in the topic,Minimal Configuration.
|
|
The environment variable, EMESSAGE_OPTS, must be set to point to the configuration files for the Connector and for logging (logback.xml). In addition, when using SSL/TLS, you must set the trust store path and password as shown above. For procedures, refer to Setting Environment Variables for an eMessage Connector.
|
|
The IP address of a ThingWorx Platform instance can be set in the instance’s SSL/TLS certificate either in Subject Common Name (CN) field or in the Subject Alternative Name field. The IP address that the ThingWorx Platform registers in ZooKeeper is either the first site-local IP address, if found, or the first non-loopback IP address found on the available network interfaces.
|
|
By default the ThingWorx Platform uses the thingworx-http service name when registering its HTTP endpoint information in ZooKeeper and the thingworx-https service name when registering its HTTPS endpoint information. If the ThingWorx Platform is configured to use different service names, be sure to use the correct service name for the eMessage Connector service-discovery.service-name value.
|
|
The eMessage Connector does not comply with FIPS standards on its own. However, it automatically activates FIPS 140-3 compliant algorithms to support communication with a FIPS compliant Axeda Agent. The users should note that no configuration is required for eMessage to utilize FIPS 140-3 compliant algorithms.
|
Property
|
Default Value
|
Description
|
||
---|---|---|---|---|
cx-server.protocol.port
|
8443
|
The port on which the eMessage Connector listens for incoming HTTP connections. The default value is the common secure port, 8443. If no port is specified at all, port 8080 is used.
|
||
cx-server.health-check.port
|
9009
|
The port on which the eMessage Connector's Health Check service listens for HTTP(S) connections. To use a different port, uncomment the line and enter a different port number.
|
||
cx-server.thing.name
|
"emessage-cxserver-<uuid>"
|
The Thing name with which the eMessage Connector binds after connecting to the ThingWorx Platform. If no name is specified (the value is null), the Thing name will be emessage-cxserver-<uuid>, where <uuid> is a randomly generated, unique identifier. To use a different Thing name, uncomment the line and enter the Thing name.
|
||
cx-server.protocol.ssl.enabled
|
true
|
SSL/TLS is enabled by default for the port on which the eMessage Connector listens for incoming HTTP connections. PTC strongly recommends always leaving SSL/TLS enabled.
|
||
cx-server.protocol.ssl.key-store.type
|
"jks"
|
Java Key Store: The Java Key Store format is considered insecure compared to a PKCS #12 key store. It is recommended that you convert the JKS key store into a PKCS #12 key store, following this instructions in Converting JKS Keystores to PKCS Keystores. If you must use a JKS key store:
1. Set the key-store.file property above in the REQUIRED section to the path of the JKS key store (.jks).
2. Uncomment this property line to enable the JKS key store format support.
|
||
cx-server.transport.websockets.service-discovery.tls-enabled
|
true
|
SSL/TLS is enabled by default for the WebSocket connections between the eMessage Connector and a ThingWorx Platform in a ThingWorx HA Cluster. The value of this property must align with the service-name used to look up ThingWorx Platform endpoints. If SSL/TLS is enabled here, the service-name property value must match the HTTPS service name configured for the ThingWorx Platform. If SSL/TLS is disabled here, the service-name property value must match the HTTP service name configured for the ThingWorx Platform.
|
||
cx-server.transport.websockets.discovery.service-name
|
"thingworx-https"
|
The service name with which the eMessage Connector should look up the ThingWorx Platform instances from service discovery. The platform instances will register with service discovery depending on its configuration. If it is configured with an HTTPS endpoint, the platform will register with its configured HTTPS service name, thingworx-https by default. If it is configured with an HTTP endpoint, the platform will register with its configured HTTP service name, thingworx-http by default.
|
||
cx-server.discovery.sasl-enabled
|
true
|
Whether to use SASL for communications with the ZooKeeper instances,
|
||
cx-server.discovery.sasl-krb5-conf-file
|
/path/to/kerberos-conf
|
If SASL is enabled, specify the path to the configuration file for KRB5 (Kerberos) in the cluster.
|
||
cx-server.discovery.sasl-jaas-file
|
/path/to/jaas-conf
|
If SASL is enabled, specify the path to the configuration file for JAAS (Java Authentication and Authorization Service) in the cluster.
|
|
If you are setting up an internal testing environment, this step is strongly recommended but not required. Do not skip this step when setting up a production environment. If you choose not to encrypt the configuration file, set the environment variable to point to your configuration files and to the SSL/TLS settings, as explained in Minimal Configuration and Setting the Environment Variable.
|