Force Trust validation for outbound client connections
Outbound client connections in SSMC web application involve TCP/TLS. When FIPS 140-2 mode is not enabled, the server certificate trust validation is optional and is not always mandated by SSMC for connections to all external systems other than the storage array. However, to ensure that server certificate is always validated and trust verified, which is required by Standards security, set the following property in
ssmc.properties
to
true as shown:
ssmc.tls.trustManager.enabled=true
SSMC service must be restarted (TUI menu option 2) for the setting to take effect. Ensure that you import trust certificates suitably for all the existing external system connections (RMC, InfoSight, and SMTP) for working properly post enabling this setting. For more information on how to import SMTP certificate, see Importing a trust certificate for SMTP server in SSMC. See the HPE SSMC User Guide for instructions to import HPE InfoSight or HPE RMC certificates.