While GemStone/S 64 Bit has a number of security features, the GemStone server is normally run within a secured environment that is not at risk for malicious attack. Starting with v3.5, GemStone/S 64 Bit also includes support for highly secured remote logins, in which each connection to a process on the Stone’s node is authenticated and the communication is protected by X509 certificates.
The security features in X509-Secured GemStone allows user applications in the cloud, for example, to login to a Stone on a secure node without any risk of compromising the Stone or any sensitive data.
GemStone/S 64 Bit also includes support for generating X509 Certificates, including self-signed Certificate Authority Certificates that allow the use of X509-Secure GemStone in a test configuration. For security, applications should generate certificate-requests and submit these to a external certificate authority. Correct security procedures must be followed in order to create a secure application.
The X509-secured GemStone feature is separately licensed; you must have a keyfile with appropriate permissions in order to use X509-secured logins.
X509 logins and associated processes, such as X509-secured NetLDIs and X509-secured remote shared page caches, use a different architectural model than ordinary GemStone logins.
Both kinds of logins are supported to a single Stone. However, the supporting processes such as the NetLDI and remote shared page cache are not shared between these two kinds of logins, which places some restrictions on the topography for configurations that will use both regular and X509-secured logins.
When instructed by the newly started HostAgent, the remote shared page cache that supports the secure login is started up by the remote NetLDI. The remote cache is configured based on specific new arguments to startnetldi that were passed in when the remote NetLDI was started.
X509-Secured login only can be done for RPC logins. Linked logins do not use certificates.
This also means that if the X509-Secured remote cache times out and shuts down (which occurs after a timeout, when no sessions are logged in and using that remote cache), which shuts down the Host Agent on the Stone’s node, you must execute starthostagent again on the Stone’s node before further X509-Secure logins are possible on that remote node.
There are no differences in the way the Stone is configured and started up, although some configuration parameters (such as those managing the use of SSL) are not relevant for X509-secured sessions.