<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ssl Archives | ZappySys Blog</title>
	<atom:link href="https://zappysys.com/blog/tag/ssl/feed/" rel="self" type="application/rss+xml" />
	<link>https://zappysys.com/blog/tag/ssl/</link>
	<description>SSIS / ODBC Drivers / API Connectors for JSON, XML, Azure, Amazon AWS, Salesforce, MongoDB and more</description>
	<lastBuildDate>Fri, 21 Nov 2025 03:31:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.4</generator>

<image>
	<url>https://zappysys.com/blog/wp-content/uploads/2023/01/cropped-zappysys-symbol-large-32x32.png</url>
	<title>ssl Archives | ZappySys Blog</title>
	<link>https://zappysys.com/blog/tag/ssl/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to configure MongoDB SSL Connection in SSIS</title>
		<link>https://zappysys.com/blog/configure-mongodb-ssl-connection-certificate/</link>
		
		<dc:creator><![CDATA[ZappySys]]></dc:creator>
		<pubDate>Tue, 29 Aug 2017 19:50:01 +0000</pubDate>
				<category><![CDATA[SSIS MongoDB Source]]></category>
		<category><![CDATA[MongoDB]]></category>
		<category><![CDATA[pem]]></category>
		<category><![CDATA[ssis]]></category>
		<category><![CDATA[SSIS PowerPack]]></category>
		<category><![CDATA[ssl]]></category>
		<category><![CDATA[X509]]></category>
		<guid isPermaLink="false">http://zappysys.com/blog/?p=1719</guid>

					<description><![CDATA[<p>Introduction MongoDB comes with SSL support, which can secure your end-to-end communication. However, setting up a MongoDB SSL Connection may require some configuration on both sides (i.e., Server and Client side). In this post, we aim to secure your MongoDB Integration in SSIS. Now, let&#8217;s look at the steps to configure SSL in MongoDB. Configure [&#8230;]</p>
<p>The post <a href="https://zappysys.com/blog/configure-mongodb-ssl-connection-certificate/">How to configure MongoDB SSL Connection in SSIS</a> appeared first on <a href="https://zappysys.com/blog">ZappySys Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Introduction</h2>
<p><a href="https://zappysys.com/blog/wp-content/uploads/2017/08/mongodb-logo.png"><img decoding="async" class="size-full wp-image-2115 alignleft" src="https://zappysys.com/blog/wp-content/uploads/2017/08/mongodb-logo.png" alt="" width="88" height="88" /></a>MongoDB comes with SSL support, which can secure your end-to-end communication. However, setting up a MongoDB SSL Connection may require some configuration on both sides (i.e., Server and Client side). In this post, we aim to secure your <a href="//zappysys.com/products/ssis-powerpack/ssis-mongodb-integration-pack/" target="_blank" rel="noopener">MongoDB Integration in SSIS</a>.</p>
<p>Now, let&#8217;s look at the steps to configure SSL in MongoDB.</p>
<h2>Configure SSL Support in MongoDB Server</h2>
<p>To configure MongoDB for SSL connectivity, the very first step is to generate a self-signed certificate in <a href="http://how2ssl.com/articles/working_with_pem_files/" target="_blank" rel="noopener">*.pem format</a> (This must be stored on the server)</p>
<h3>Download and Install OpenSSL</h3>
<p>First step is to <a href="http://slproweb.com/products/Win32OpenSSL.html" target="_blank" rel="noopener">download and install OpenSSL</a>. <span style="box-sizing: border-box; margin: 0px; padding: 0px;">Assuming you are running <strong>a </strong><span style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong>64 Bit Windows</strong> OS, you can download the <strong>64 Bit Lite version</strong> of OpenSSL (about 3 </span>MB).</span> If you install it using default settings, then all binaries will be installed under <strong>C:\OpenSSL-Win64\bin\ </strong></p>
<h3>Create a self-signed certificate and *.pem file using OpenSSL.</h3>
<p>If you don&#8217;t have a trust issue and want to use a self-signed certificate rather than buying from a 3rd-party SSL Certificate Authority, you can create a self-signed certificate using the OpenSSL Command line as shown below. Now let&#8217;s look at how to generate a private key, a certificate file, and finally the *.pem file, which is the only required file by MongoDB.</p>
<p>A PEM file is the most common file format (container file format), which includes a Certificate and a Private Key in a single file.</p>
<p><span style="box-sizing: border-box; margin: 0px; padding: 0px;">Let&#8217;s look at how to <strong>create a PEM file using OpenSSL</strong>.</span></p>
<ol>
<li>First, run the command below. When prompted, enter &#8220;passphrase&#8221; (in our case, enter &#8220;test&#8221;).<br />
<pre class="crayon-plain-tag">openssl genrsa -des3 -out server.key 2048</pre>
</li>
<li>Now run the command below to <strong>generate a private key</strong> (*.key file)<br />
<pre class="crayon-plain-tag">openssl rsa -in server.key -out server.key</pre>
</li>
<li>After the private key is created, run the command below to <strong>create a CSR file</strong> (i.e., &#8220;Certificate Signing Request&#8221;). This file is needed to generate an actual certificate (Self-Signed or Signed by a 3rd Party, such as VeriSign or RapidSSL). If you omit the sub argument from below, then it may ask you a few questions (e.g, company name, department, etc), but for testing purposes, let&#8217;s make it easy 🙂<br />
To enter full details or just provide CN=xxxx<br />
<pre class="crayon-plain-tag">openssl req -sha256 -new -key server.key -out server.csr -subj &quot;/C=US/ST=Georgia/L=Atlanta/O=ZappySys LLC/OU=Org/E=testuser@zappysys.com/CN=localhost&quot;
-- or --
openssl req -sha256 -new -key server.key -out server.csr -subj &quot;/CN=localhost&quot;</pre>
</li>
<li>Now, let&#8217;s run the command below to <strong>generate a certificate file</strong> (*.crt). We are setting the expiration to 365 days; you can adjust as per your needs.<br />
<pre class="crayon-plain-tag">openssl x509 -req -sha256 -days 365 -in server.csr -signkey server.key -out server.crt</pre>
</li>
<li>Now, the last step is to <strong>combine the certificate (*.crt) and private key (*.key)</strong> <strong>files<strong> into a single </strong>PEM file</strong> using the command below. It will generate the desired *.pem file format, which can be used by the MongoDB server (In Unix OS, you can use the <strong>cat command</strong> rather than <strong>typing</strong>)<br />
<pre class="crayon-plain-tag">type server.crt server.key &gt; cert.pem</pre>
</li>
</ol>
<p>Once done, your <strong>cert.pem</strong> file will look like the following (Open and view in Notepad)</p><pre class="crayon-plain-tag">-----BEGIN CERTIFICATE-----
MIIDjjCCAnYCCQCDKO4/pCBfqTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMC
VVMxCzAJBgNVBAgMAkdBMRAwDgYDVQQHDAdBdGxhbnRhMREwDwYDVQQKDAhaYXBw
eVN5czELMAkGA1UECwwCSVQxFTATBgNVBAMMDHphcHB5c3lzLmNvbTEjMCEGCSqG
RF5DmNx6gKlRWlOFmokMCz7wAglErDL4h/I3w6iZaVVkBmeDj30cms/fQ+upAI8U
KrBpNEwOglU9fjqjpnW0u8qGpXIk3NfdCm+6Lr91GL/u/9+gmSYw5YCCF6kYaRA/
2mqLXZ3Xp6WfTfVyQskKMB9D1+7QljqBZmFnTjLCaJ9MdJzzMpFyWPRB4Ix1kAzV
yZk=
-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----
MIIEowIBAAKCAQEAyo++fr54Wh8anfEDZrr5O1NXwrPZW6KI3dPQ8FVHVDcBPETi
VX3qGcq8vywXH/LdwMEC4EQGED+zo50GmQdNiIzUfsnDbkq6rkqVNKjh7agkDlip
5vK3yuHtYAVp+laJ8X8kKISRttY7kcnl9gSkfTilwpN8//49G45Nx0JFu3o3Ortb
H4FPWjidQBAA6hPxoQi2h7YfEfpICL1RwYDCaQpdwMEJJqzcvaHCpdYVYd5PHLks
xRi8iwKBgA/S5w4/pwrzq0Jab/Afzf8AleZm/xLmXFpglgZF25AtVhpnayoHiTIk
9BdCXydi0ZOg4LtMqkSwt427UWCEnoRRH1WbKH2F9ZRWaELw/ix9RrZgTNmF821F
1/ILtO+QrN8tFnrLX3NAWurxUJxvzhBnvq40ZIHCyWvhRXUTkzTH
-----END RSA PRIVATE KEY-----</pre><p>
&nbsp;</p>
<h3>Edit the MongoDB Server config file (v3.0 or higher)</h3>
<p>Now that we have the *.pem file, we can use it to launch a MongoDB server instance. Before we do that, one more step is needed. We have to specify a few parameters in the MongoDB config file.</p>
<ol>
<li>Navigate to the MongoDB installation directory (where <strong>mongod.exe</strong> is found)</li>
<li>Create an empty text file called mongo-config.txt and enter the following text (assuming cer.pem, mongo-config.txt, and all mongod.exe are in the same folder). The password was tested when we created the PEM file. If you used a different one, then change it below.<br />
<strong>mongo-config.txt</strong><br />
<pre class="crayon-plain-tag">net:  
    bindIp: localhost
    ssl:
        mode: requireSSL
        PEMKeyFile: cert.pem
        PEMKeyPassword: test
        allowInvalidCertificates: true
        allowInvalidHostnames: true</pre>
</li>
</ol>
<h3>Start the MongoDB Server using the Config file</h3>
<p>Once you create a config file, we can start the MongoDB instance using the following command line to use the new config file with SSL mode enabled. That&#8217;s it, your server is now accepting Secure connections using SSL.</p><pre class="crayon-plain-tag">mongod -f &quot;mongod-config.txt&quot;</pre><p>
<h2>Using the SSL option in the SSIS MongoDB Connection</h2>
<p>Now, let&#8217;s look at the steps to secure the MongoDB connection in SSIS.</p>
<h3><span id="Prerequisites">Prerequisites</span></h3>
<p>Before we look at the Step-By-Step section on securing the MongoDB Connection in SSIS, let&#8217;s make sure you meet the following requirements.</p>
<ol>
<li>SSIS designer installed. Sometimes it is referred to as BIDS or SSDT (<a href="https://docs.microsoft.com/en-us/sql/ssdt/download-sql-server-data-tools-ssdt" target="_blank" rel="noopener">download it from the Microsoft site</a>).</li>
<li>Basic knowledge of SSIS package development using <em>Microsoft SQL Server Integration Services</em>.</li>
<li><a href="//zappysys.com/products/ssis-powerpack/" target="_blank" rel="noopener"><em>ZappySys SSIS PowerPack</em> installed</a>. Click on the link to download a FREE trial.</li>
<li>You have basic familiarity with MongoDB.</li>
</ol>
<h3>Using SSL in the SSIS MongoDB Connection Manager</h3>
<p>To enable SSL in SSIS, open the MongoDB connection manager and go to the SSL Tab. Check the Enable SSL option as shown below. Once you do this, and if your MongoDB server is configured correctly to use SSL, then your connection Test will be green, and any traffic between you and your MongoDB server will be encrypted using SSL.</p>
<div id="attachment_11646" style="width: 1035px" class="wp-caption aligncenter"><a href="https://zappysys.com/blog/wp-content/uploads/2017/08/SSIS-MongoDB-Connection-SSL-Settings.png"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-11646" class="wp-image-11646 size-full" src="https://zappysys.com/blog/wp-content/uploads/2017/08/SSIS-MongoDB-Connection-SSL-Settings.png" alt="" width="1025" height="540" srcset="https://zappysys.com/blog/wp-content/uploads/2017/08/SSIS-MongoDB-Connection-SSL-Settings.png 1025w, https://zappysys.com/blog/wp-content/uploads/2017/08/SSIS-MongoDB-Connection-SSL-Settings-300x158.png 300w, https://zappysys.com/blog/wp-content/uploads/2017/08/SSIS-MongoDB-Connection-SSL-Settings-768x405.png 768w, https://zappysys.com/blog/wp-content/uploads/2017/08/SSIS-MongoDB-Connection-SSL-Settings-720x380.png 720w" sizes="(max-width: 1025px) 100vw, 1025px" /></a><p id="caption-attachment-11646" class="wp-caption-text">SSIS MongoDB Connection &#8211; SSL Settings</p></div>
<h3>Using X509 Client Authentication in SSIS MongoDB Connection Manager</h3>
<p>Now, let&#8217;s look at how to authenticate using the X509 Client Certificate (X509) method. For this method, you must use the PFX certificate format (do not use PEM). To create a PFX file from the PEM we created earlier, you can run the following command. When prompted, use the same password you used before to generate a private key.</p><pre class="crayon-plain-tag">openssl pkcs12 -export -out cert.pfx -inkey server.key -in server.crt</pre><p>
<span style="box-sizing: border-box; margin: 0px; padding: 0px;">To learn more about the whole process of how to configure the MongoDB Server to use Client X509 Certificate, <a href="https://github.com/shauryashaurya/tutorial-x.509certificates-mongo" target="_blank" rel="noopener">check this Article</a>.</span></p>
<p>Let&#8217;s look at the steps to configure the SSIS MongoDB Connection Manager to use X509 Client Certificate Mode.</p>
<ol>
<li>Open ZappySys MongoDB Connection Manager UI</li>
<li>Enter the User ID you created in the <strong>$external</strong> database (This UserID usually matches the Subject of your Certificate). For example, in our case, UserID may appear as follows. Leave the password blank because it&#8217;s not used in the X. 509 method.<br />
<pre class="crayon-plain-tag">emailAddress=user@myemail.com,CN=127.0.0.1,OU=UNIT,O=DEMO,L=city,ST=test,C=AU</pre>
<div id="attachment_11644" style="width: 628px" class="wp-caption aligncenter"><a href="https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Set-UserID-of-external-database.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-11644" class="wp-image-11644 size-full" src="https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Set-UserID-of-external-database.png" alt="" width="618" height="540" srcset="https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Set-UserID-of-external-database.png 618w, https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Set-UserID-of-external-database-300x262.png 300w" sizes="(max-width: 618px) 100vw, 618px" /></a><p id="caption-attachment-11644" class="wp-caption-text">Configure SSIS MongoDB Connection for Client X509 Certificate (Set UserID of $external database)</p></div>
<div class="mceTemp"></div>
</li>
<li> Now go to the SSL Tab. Check SSL Option, You can check Ignore SSL Validation error (If it&#8217;s a signed certificate)</li>
<li>Select the PFX file path and enter the certificate password if needed. If you type Path, then Subject Line appears automatically (You can use it as UserID field if you were unsure in Step#1 however, we still recommend making sure UserID is an  exact match based on the original name your System Admin created in <strong>$external</strong> DB)
<div class="mceTemp"></div>
<div id="attachment_11643" style="width: 571px" class="wp-caption aligncenter"><a href="https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Select-PFX-File-Specify-Password.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-11643" class="wp-image-11643 size-full" src="https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Select-PFX-File-Specify-Password.png" alt="" width="561" height="541" srcset="https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Select-PFX-File-Specify-Password.png 561w, https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Select-PFX-File-Specify-Password-300x289.png 300w" sizes="(max-width: 561px) 100vw, 561px" /></a><p id="caption-attachment-11643" class="wp-caption-text">Configure SSIS MongoDB Connection for Client X509 Certificate (Select PFX File &#8211; Specify Password)</p></div>
<div class="mceTemp"></div>
</li>
<li>Now go to the Advanced Tab and enter the Below Option. By default, MongoDB Connection Manager uses the userid/password mode. To use <strong>X509</strong> Auth mode, you must set an option in the Advanced Options table as shown below.<br />
<pre class="crayon-plain-tag">authMechanism=MONGODB-X509</pre>
<div id="attachment_11645" style="width: 571px" class="wp-caption aligncenter"><a href="https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Specify-authMechanismMONGODB-X509.png"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-11645" class="wp-image-11645 size-full" src="https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Specify-authMechanismMONGODB-X509.png" alt="" width="561" height="541" srcset="https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Specify-authMechanismMONGODB-X509.png 561w, https://zappysys.com/blog/wp-content/uploads/2017/08/Configure-SSIS-MongoDB-Connection-for-Client-X509-Certificate-Specify-authMechanismMONGODB-X509-300x289.png 300w" sizes="(max-width: 561px) 100vw, 561px" /></a><p id="caption-attachment-11645" class="wp-caption-text">Configure SSIS MongoDB Connection for Client X509 Certificate (Specify authMechanism=MONGODB-X509)</p></div>
<div class="mceTemp"></div>
</li>
<li>Click Test connection to make sure it&#8217;s successful.</li>
</ol>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://zappysys.com/blog/configure-mongodb-ssl-connection-certificate/">How to configure MongoDB SSL Connection in SSIS</a> appeared first on <a href="https://zappysys.com/blog">ZappySys Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
