Enable JDBC encryption for PostgreSQL servers - Connect_CDC - connect_cdc_mimix_share - aws_mainframe_modernization_service - 6.x

Connect CDC Getting Started Guide

Product type
Software
Portfolio
Integrate
Product family
Connect
Product
Connect > Connect CDC (MIMIX Share)
Version
6.x
ft:locale
en-US
Product name
Connect CDC
ft:title
Connect CDC Getting Started Guide
Copyright
2025
First publish date
2003
ft:lastEdition
2026-02-25
ft:lastPublication
2026-02-25T19:01:02.274000
L1_Product_Gateway
Integrate
L2_Product_Segment
Data Integration
L3_Product_Brand
Precisely Connect
L4_Investment_Segment
Application Data Integration
L5_Product_Group
ADI - Connect
L6_Product_Name
Connect CDC

Before you enable the JDBC encryption option for PostgreSQL servers in Connect CDC Director, you must:

  • configure PostgreSQL to use a TLS certificate for encrypted communication.

  • install and enable OpenSSL on the server and client.

To enable JDBC encryption for PostgreSQL servers, you must also configure Connect CDC to use the PostgreSQL server key and root certificate to validate encrypted connections. Specifically, the client requires the following 3 files in the %appdata%\postgresql directory for Windows and in the ~/.postgresql/ directory for Linux:

  • root.crt (trusted root certificate)

  • postgresql.crt (client certificate)

  • postgresql.key (private key)