skip to main content
OpenAccess SDK Service Attributes : Defining Service Attributes : ServiceSSLCipherSuites
 

ServiceSSLCipherSuites

Specifies the SSL cipher suites that OpenAccess SDK supports for data transfers between the OpenAccess SDK Client and OpenAccess SDK Server.
OpenAccess SDK supports the use of anonymous ciphers. Anonymous ciphers allow the SSL connection to succeed without proper authentication of the peer by using the Diffie-Helmann algorithm.
The table "TLS1 Support Without Server Certificate Support" lists the cryptographic strong SSL cipher suites that can be used without server certificate support.
Table 29. TLS1 Support Without Server Certificate Support
Cipher Suite
ODBC Client
JDBC Client
ADO Client
ADO.NET Client
TLS_DH_anon_WITH_AES_128_CBC_SHA
X
X
N/A
TLS_DH_anon_WITH_AES_256_CBC_SHA
X
X
X
N/A
Cipher suites that support server certificates provide additional protection. See ServiceSSLKeyStore for supported values.
NOTE FOR .NET USERS: Because support for SSL in the .NET Framework requires the use of server certificates, you must set the default value for this service attribute to a TLS1 value specified in the table "TLS1 Support With Server Certificate Support" or TLS1.2 value specified in the table "TLS1.2 Support With Server Certificate Support."
Table 30. TLS1 Support With Server Certificate Support
Cipher Suite
ODBC Client
JDBC Client
ADO Client
ADO.NET Client
TLS_RSA_WITH_NULL_SHA
X
X
TLS_RSA_WITH_AES_128_CBC_SHA
X
X
X
X1
TLS_RSA_WITH_AES_256_CBC_SHA
X
X
X2
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
X
X
X
X2
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
X
X
X2
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
X
X
X
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
X
X

1 Only on Windows 8, Windows 7, Windows Vista, Windows Server 2008 and higher.

Table 31. TLS1.2 Support With Server Certificate Support
Cipher Suite
ODBC Client
JDBC Client
ADO Client
ADO.NET Client
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
X
X
X
TLS_RSA_WITH_AES_128_GCM_SHA256
X
X
X
TLS_RSA_WITH_AES_256_GCM_SHA384
X
X
X
TLS_RSA_WITH_AES_128_CBC_SHA256
X
X
X
TLS_RSA_WITH_AES_256_CBC_SHA256
X
X
X
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
X
X
X
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
X
X
X
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
X
X
X
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
X
X
X
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
X
X
X
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
X
X
X
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
X
X
X
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
X
X
X
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
X
X
X
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
X
X
X
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
X
X
X
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
X
X
X
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
X
X
X
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
X
X
X
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
X
X
X
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
X
X
X
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
X
X
X
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
X
X
X
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
X
X
X
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
X
X
X
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
X
X
X
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
X
X
X
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
X
X
X
TLS_ECDHE_RSA_WITH_RC4_128_SHA
X
X
X
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
X
X
X
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
X
X
X
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
X
X
X
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
X
X
X
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
X
X
X
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
X
X
X
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
X
X
X

Default

None

Type

Static