EPE - Certificates for Native Connectors explained
EPE - Certificates for Native Connectors explained
Certificates for Native Connectors
When a Native Connector communicates with another source/target system (such as Active Directory, LDAP, or an API), it uses a secure connection (HTTPS or LDAPS). For this connection to work, the connector must trust the target system. And this trust is based on certificates.
Native Connectors do not trust any certificates by default for security reasons. This means source/target systems certificates must always be installed manually to Native Connectors.
What certificate do you need?
You need to install to Native Connector the certificate of the source/target system, or more precisely, the certificate that proves it is trustworthy. E.g. if you are connecting to Active Directory, you need Active Directory root certificate. And e.g if you are connecting to some API endpoint, you need that API's root certificate.
In practice, this means one of the following:
Option 1 (recommended)
Root CA certificate
The main authority that issued the certificate (highest on certificate chain).
Option 2
Intermediate CA certificate(s)
These may exist between the root and the server.
Option 3 (fallback only, not recommended for production usage as these expire very frequently)
Server certificate
The actual certificate of the target system.
Simple mental model how you can think of certificates needed for Native Connectors
The source/target system presents a certificate when the connector connects.
The connector checks who issued that certificate.
If the connector trusts that issuer, the connection is allowed.
Because Native Connectors do not trust any certificates by default, you must explicitly install that to allow Native Connector to trust it.
How do you know what to install?
If your source/target system REST API is public SaaS solution, you can fetch their root certificate from their site on internet.
Or ask your IT team or system owner:
“Please provide the Root certificate for this system on base64 encoded PEM format.”
Or:
“What CA (Certificate Authority) signed this system’s certificate? Download that on base64 encoded PEM format”
Common mistakes
- Using expired certificates
- Using certificates from the wrong environment (test vs production)
What happens when it works?
- The connector connects successfully
- No SSL or TLS errors
- Data flows normally
What happens when it is wrong?
You may see errors such as:
- “SSL handshake failed”
- “PKIX path building failed”
- “Unable to find valid certification path”
These typically mean the Native Connector does not trust the certificate.
How to install certificates
Only Matrix42 can install certificates to Native Connectors, connect Matrix42 to install certificates.
Table of Contents