|
Although it is still possible to specify more than one URI for the platforms property, only the first URI is used. Any subsequent URI is ignored. If you require failover to another instance of ThingWorx Platform, use ThingWorx High Availability with the v.2.0.0 or later of the eMessage Connector and v.9.0.0 or later of the ThingWorx Platform. While you can still use the previous version of ThingWorx High Availability (Active-Passive) Clustering with v.8.5.x of ThingWorx Platform and v.1.2.0 of the eMessage Connector, it is strongly recommended that you upgrade to v.9.0.0 or later of the platform and v.2.0.0 or later of the eMessage Connector. These later releases contain security fixes and enhancements as well as new features, making them the best choice for securing your IoT network.
|
|
Pay particular attention to the exact spelling of the names of the keys in the configuration file. Making a simple mistake such as leaving the dash off of the key-store tag, for example, can result in obscure errors, depending on how the Connector handles HTTP/S calls from Axeda eMessage agents.
|
|
If you are currently using a JKS keystore, you will need to convert it to a PKCS #12 keystore. Refer to Converting JKS Keystores to PKCS Keystores for instructions. If you must use a Java keystore, refer to Optional Configuration Properties.
The Connector also needs a trust store that contains the certificates necessary to validate the certificate presented by the ThingWorx Platform. By default, the Connector uses the default trust store provided by the JRE ("cacerts"). If you need to use a different trust store, refer to Optional Configuration Properties.
For information on configuring SSL/TLS for the connection between an Axeda Global Access Server (GAS) and an eMessage Connector, refer to Configuring the Connector for Remote Access. For information on configuring the GAS itself to use SSL/TLS refer to the ThingWorx Global Access Server Reference, v.7.1.0, which is available on the Reference Documents page of the PTC Support site.
|
|
If you are setting up an internal testing environment, this step is strongly recommended but not required. Do not skip this step when setting up a production environment. If you choose not to encrypt the configuration file, set the environment variable to point to your configuration files and to the SSL/TLS settings, as explained in and .
|