I can imagine these situations where it can be helpful.

1. 

* There is active/passive cluster (provides a fully redundant instance of
each node, which is only brought online when its associated primary node
fails) environment where Java broker is running on node1
* Shared drive is used for keystore and truststore
* In keystore there are certificates for each node
   * node1 - CN=hostname1, alias hostname1
   * node2 - CN=hostname2, alias hostname2
   ...
* Unless "transport.verifyHost=false" is specified in connection string,
clients can connect only with correct certificates for each node
* When cluster node is relocated to node2, Java broker starts on node2 and
loads keystore from shared drive
* If client cannot connect with certificate for node1, he can try node2 and
if Java broker is running on node2, he can successfully connect to broker

2. 

* Certificate with "CN=hostname" and alias "hostname" is valid from
30.10.2014 10:00 to 30.10.2017 10:00
* At 26.10.2017 certificate with "CN=hostname" and alias "hostname_2" with
validity from 28.10.2017 10:00 to 28.10.2020 is added to server keystore and
sent to client
* Client can use both certificates in transitional period 28.10.2017 10:00 -
30.10.2017 10:00. Because there is transitional period client can prepare
new certificate in his software
* In maintenance batch at 30.10.2017 24:00 is expired certificate removed
and only new certificate is present in keystore





--
Sent from: http://qpid.2158936.n2.nabble.com/Apache-Qpid-users-f2158936.html

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@qpid.apache.org
For additional commands, e-mail: users-h...@qpid.apache.org

Reply via email to