FGLPROFILE entries for Web Services
The FGLPROFILE entries relating to Genero Web Services are divided between five categories: security, basic or digest HTTP authentication, proxy configuration, server configuration, and XML cryptography.
HTTPS and password encryption
On iOS platform the security entries are not available because iOS SSL/TLS layer is used.
However, you can configure the following security Web Services FGLPROFILE entries for GMI mobile
devices: security.global.ca
, security.global.ca.lookuppath
, and
security.global.systemca
.
Any entry defining a file on disk, for example security.global.ca
,
xml.keystore.calist
, etc., can be set with a relative or an
absolute path. If set as relative, the file is located based on the current
execution directory. The recommended practice is to specify an absolute path in case
fglrun is not always executed from the same directory.
Entry | Description |
---|---|
security.global.script |
Filename of a script executed each time a password of a private key is required
by the client. The security script accepts one argument corresponding to the filename of the private
key for which the password is required, and must return the correct password or the client stops.
For script examples, see Windows® Password Script Example or UNIX™ Password Script Example. This entry cannot be used if
security.global.agent is set. |
security.global.agent |
Port number where the fglpass agent is waiting for requests.
It returns the password that grants access to a private key when needed by a BDL application. The
DVM and the fglpass agent perform authentication and exchange encrypted data over
the local host network only. Refer to Using the password agent for details. This entry cannot be used if
security.global.script is set. |
security.global.agent.gid |
Set this entry as true to specify agent authentication based on
OS user group. This entry is only for UNIX
platforms. For more details, see Use the password agent. |
security.global.protocol Important:
Since GWS version 4.00 this entry is no longer supported. Protocol defaults to the OpenSSL engine preference. |
The SSL/TLS protocol to use for secured communications. Possible values are:
|
security.global.ca |
Filename of the Certificate Authority list, with the concatenated PEM-encoded third party X.509 certificates considered as trusted, and in order of preference. |
security.global.ca.lookuppath |
A list of directories containing certificate authorities. Genero Web Services will load the CA from the directories in this list. The entry is a list of directories separated by a semicolon. |
security.global.windowsca |
If set to true , build the Certificate Authority list from the
Certificate Authorities stored in the Windows key store.
This entry is only valid on Windows systems where
security.global.ca is not set. |
security.global.cipher |
The list of encryption, digest, and key exchange algorithms the client is allowed to use during a secured communication. If this entry is omitted, all algorithms are supported. For more details about cipher, refer to www.openssl.org. |
security.global.certificate |
Filename of the PEM-encoded client X.509 certificate to be used for any secured connection if not redefined in a specific server configuration. |
security.global.privatekey |
Filename of the PEM-encoded private key associated to the above X.509 certificate and to be used for any secured connection if not redefined in a specific server configuration. If the PEM file is password protected, you need to use the
|
security.global.keysubject |
The subject string of a X.509 certificate and its associated private key registered in the Windows key store to be used for any secured connection if not redefined in a specific server configuration. This entry is valid only on Windows systems. |
security.global.systemca |
When set to true , the Certificate Authority is loaded from the
key store on macOS® or Windows systems, and from a predefined directory on Unix/Linux®. If set to false , the
Certificate Authority is not loaded from the system-default location. Default is
true . This entry is only valid where security.global.ca is not
set. |
security.global.ocsp.enable |
If set to true , once the server has been validated against
local certificate authority, an additional request is performed to the certificate issuer's URL to
ensure that no certificate has been revoked at time of connection. Default value is
false (no additional request is done) |
security.global.ocsp.url |
Instead of checking revocation to the URL inside the issuer's certificate, you
can specify a fixed URL where all OCSP requests will be sent. For example:
By default, this entry is not set and the URL inside the certificate is used. |
security.global.options |
Set SSL options when connecting to a server not supporting secure renegotiation
— an unpatched server. For example, to ensure you can connect to the server, configure
these option flags (enclose options in quotes and add a pipe (| ) separator between
flags):
For
more details on OpenSSL OP flags, refer to the OpenSSL documentation.Warning: Using unsafe SSL connections Using |
security.global.verifyserver |
If set to false , once the server has been validated against the
local certificate authority, no additional request is performed to validate certificates for
applications or services run by the server. Default value is true (certificate
validation is done for all requests for HTTPS applications or services).Warning: Using unsafe SSL connections Setting |
security.idsec.certificate |
Filename of the PEM-encoded client X.509 certificate. |
security.idsec.privatekey |
Filename of the PEM-encoded private key associated to the above X.509 certificate. If the PEM file is password protected, you need to use the
|
security.idsec.keysubject |
The subject string of a X.509 certificate and its associated private key registered in the Windows key store. This entry is valid only on Windows systems. |
- The idsec keyword must be replaced with your own identifier, and all necessary entries must be set. See FGLPROFILE setting.
- If an entry is defined more that once, only the last occurrence is taken into account.
Basic or digest HTTP authentication
The following table lists the FGLPROFILE entries that specify the login and password to use in the case of HTTP authentication to a server or a proxy. The entries also specify the login and password to use in an application using the low-level com or xml API.
Entry | Description |
---|---|
|
The login identifying the client to a server during HTTP Authentication. |
|
The password validating the login of a client to a server during HTTP Authentication. As passwords are never recommended to be in clear text, you must encrypt them with the fglpass tool. For more information, see FGLPROFILE password encryption. |
|
The string identifying the server to the client during HTTP Authentication. If the string does not match the server's string, authentication fails. This parameter is optional, but it is recommended that you check the server identity, especially if the server's location is suspicious. |
|
One of the following strings representing the
different HTTP Authentication mechanisms.
|
- The
idauth
keyword must be replaced with your own identifier, and all necessary entries must be set. See FGLPROFILE setting. - If an entry is defined more that once, only the last occurrence is taken into account.
Proxy configuration
The following table lists the FGLPROFILE entries that specify how the Web Services client communicates with a proxy. The entries specify the way an application using the low-level com or xml API communicates with a proxy.
Entry | Description |
---|---|
|
Location of the HTTP proxy defined as
host:port or
ip:port . If the port is omitted, the port 80
is used. |
|
The list of beginning host names, separated with semicolons, for which the Web Services client does not go via the HTTP proxy. |
|
The authenticate.idauth the Web Services client uses to authenticate itself to the HTTP proxy. |
|
Location of the HTTPS proxy defined as
host:port or
ip:port . If the port is omitted, the port 443
is used |
|
The list of host names, separated with semicolons, for which the Web Services client does not go via this HTTPS proxy. |
|
The authenticate.idauth the Web Services client uses to authenticate itself to the HTTPS proxy. |
If an entry is defined more that once, only the last occurrence is taken into account.
IPv6 configuration
The following table lists the FGLPROFILE entries that specify how the Web Services client uses the IPv6 network protocol.
Entry | Description |
---|---|
|
Defines the IP protocol version to be used. Your options:
If not set, IPv4 is used. |
Important:
This entry is not supported on Microsoft™ Windows platforms. |
Defines the name of the network interface to be used for IPv6 link-local addresses. For example, this entry can get values such as "eth0", "en0", "ethernet_5". |
|
Defines the id of the network interface to be used for IPv6 link-local addresses. For example, this entry can get values such as "1", "2", "11". |
If an entry is defined more that once, only the last occurrence is taken into account.
Server configuration
The following table lists the FGLPROFILE file entries that specify the correct way a Web Services client connects to an end point (usually a server).
The entries specify also the way an application using the low-level com or xml API connects to an end point.
Entry | Description |
---|---|
|
The end point URL of the server. |
|
A regular expression to define all possible URLs that can be used in this server
configuration. If the This regex entry follows W3C rules as described in https://www.w3.org/TR/xmlschema-2/#regexs |
|
The list of encryption, digest and key exchange algorithms the client is allowed to use during a secured communication to that server. It overwrites the global definition. |
|
If set to true , the client performs a strict server identity validation. If not
fulfilled, it stops the communication; otherwise no server identity
verification is performed. The default value is true . |
|
The security identifier (security.idsec) the client uses to perform HTTPS communication with the server. See also Add configuration entries in your FGLPROFILE file. |
|
The authenticate.idauth the client uses to authenticate itself to the server. |
- The idws keyword must be replaced with your own identifier. All necessary entries, depending on the remote server's configuration, must be set. See FGLPROFILE setting.
- You can use the unique identifier in the .4gl code instead of the server URL, with the alias:// prefix. For example, alias://idws.
- If an entry is defined more that once, only the last occurrence is taken into account.
XML configuration
The following table lists the FGLPROFILE entries that control XML to Genero values conversion, and XML cryptography key or certificate mapping.
Entry | Description |
---|---|
|
The list of PEM-encoded third party X.509 certificates, separated with semicolons, of the Certificate Authority considered as trusted, in order of preference. |
|
The list of PEM-encoded third party X.509 certificates, separated with semicolons, to be used to find out the correct X.509 certificate when getting an incomplete one in a XML signature or an encrypted XML document. |
|
The filename of a cryptography key. For instance RSA.pem, DSA.der or HMAC.bin. |
|
The filename of a cryptography X.509 certificate. For instance Cert.crt. |
|
Controls empty string XML nodes conversion to Genero The default is If set to Note that this entry only works for the |
|
Defines the prefix for an XML Signature. Use By default, the XML Signature prefix is
|
|
Defines the prefix for an XML Encrypted data. Use By default, the XML Encrypted data prefix is
|
- The idxml keyword must be replaced with your own identifier. See FGLPROFILE: XML cryptography.
- You can use the unique identifier in the .4gl code instead of the filename.
- If an entry is defined more that once, only the last occurrence is taken into account.
HTTP configuration
The following table lists the FGLPROFILE entries control options for the HTTP protocol.
Entry | Description |
---|---|
|
This entry applies to all The HTTP RFC 2616 specifies that a Date header should not be sent, if the HTTP request does not contain a body. With the
For PUT and POST requests, the HTTP Date header is always sent. |
If an entry is defined more that once, only the last occurrence is taken into account.