Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
Abstract:
This knowledge base article takes a look at the client side setup for SSL connections from the Qlik Replicate server to a DB2/Z source endpoint. It assumes that that DB2 on z/OS (the server side) has already been set up according to IBM documentation and is listening for incoming secure connections. It also assumes that the network connections (routers and firewalls) between the mainframe and the Replicate server have been configured to support the necessary socket ports and protocols.
Prerequisites:
The following software packages need to be installed on the Replicate Server in order for the endpoint (client) to complete a secure connection to DB2 for z/OS:
- DB2 CLI / ODBC V11.1 Driver or above from IBM (ex: v11.1.4fp4a_ntx64_odbc_cli.zip)
- GSKit 8 or above from IBM (ex: 8.0.55.4-ISS-GSKIT-WinX64-FP004.zip) – note that some DB2 client driver kits come with a subset of GSK, making this prereq optional.
Configuring the Client:
One or more of the following steps may be required, depending on platform and approach to DB2 DSN setup:
<?xml version="1.0" encoding="UTF-8" standalone="no" ?>
<configuration>
<dsncollection>
<dsn alias="DB2T" host="<ipaddress>" name="DSNDB2T" port="<port>">
<parameter name="SecurityTransportMode" value="SSL"/>
<parameter name="SSLClientKeystoredb" value="c:\temp\keystore.kdb"/>
<parameter name="SSLClientKeystash" value="c:\temp\keystore.sth"/>
</dsn>
</dsncollection>
<databases>
<database host="<ipaddress>" name="DSNDB2T" port="<port>">
<wlb>
<parameter name="enableWLB" value="false"/>
</wlb>
<acr>
<parameter name="enableACR" value="true"/>
</acr>
</database>
</databases>
</configuration>
Select IBM DB2 ODBC DRIVER and then Finish
Insert the Database Name in the Data source name Field and then OK
Open the just created System DSN, change to Advanced Settings and remove the DBAlias Entry.
gsk8capicmd -keydb -create -db c:\temp\keystore.kdb -pw ser123 -stash
gsk8capicmd -cert -create -db c:\temp\keystore.kdb -pw serv123 -label "SERVCA1" -dn "CN=SERVCA1"
gsk8capicmd -cert -list -db c:\temp\keystore.kdb -pw serv123
Certificates found
* default, - personal, ! trusted, # secret key
- SERVCA1
gsk8capicmd -cert -extract -db c:\temp\keystore.kdb -pw serv123 -label "SERVCA1" -target c:\temp\temp1.arm
gsk8capicmd -cert -add -db GSK_MS_CERTIFICATE_STORE -label "SERVCA1" -file c:\temp\temp1.arm
<parameter name="SSLClientKeystoredb" value="GSK_MS_CERTIFICATE_STORE"/>
additionalConnectionProperties:
Security=SSL
SSLClientKeystoredb=GSK_MS_CERTIFICATE_STORE (or actual kdb file)
CURSORHOLD=1
DESCRIBEPARAM=1
CONCURRENTACCESSRESOLUTION=1
More Information:
Additional information can be found at the following links:
GSK User Guide: ftp://ftp.software.ibm.com/software/webserver/appserv/library/v80/GSK_CapiCmd_UserGuide.pdf
Example use case: https://www.ibm.com/support/knowledgecenter/en/SSYQBZ_9.6.0/com.ibm.doors.configuring.doc/topics/r_e...
Hi,
We are using QLIK replicate (May 2025 release) product to replicate data from Mainframe Db2 (DB2 V13) for z/OS to multiple end points. The product is hosted in windows server and R4Z component is running in Mainframe. We have IBM Data Server Client 11.5.8 installed in windows server which setup the ODBC data sources to connect Mainframe Db2 from QLIK windows server
We are planning to encrypt the data using the transport layer security by defining secure port, AT-TLS policy etc., in Mainframe. I could see this was posted in 2021. Still the same steps are applicable ?
Thanks.