![]() |
![]() |
||
Setting and viewing cipher specificationsThis section describes setting and viewing cipher specifications for secure transactions. Links to related topics appear at the end of this section.
For each virtual host, set the cipher specification to use during secure transactions. The specified cipher specifications validate against the level of the GSK toolkit installed on your system. Invalid cipher specifications cause an error to log in the error log. If the client issuing the request does not support the ciphers specified, the request fails and the connection closes to the client. Specifying cipher specifications
Viewing configured cipher specificationTo see which cipher specifications the server uses for secure transactions, look at the informational messages in the error log.
The order that the cipher specifications appear in the error log from top to bottom represents the attempted order of the cipher specifications.
(Back to the top) |