# Set to true to enforce SSL for JMX monitoring client
org.talend.jmxmp.useSSL=true
org.talend.jmxmp.ssl.keyStore=<path_to_monitoring_client_keystore>
org.talend.jmxmp.ssl.keyStorePassword=<monitoring_client_keystore_password>
#org.talend.jmxmp.ssl.keyStoreType=JKS
org.talend.jmxmp.ssl.trustStore=<path_to_monitoring_client_truststore>
org.talend.jmxmp.ssl.trustStorePassword=<monitoring_client_truststore_password>
#org.talend.jmxmp.ssl.trustStoreType=JKS
#org.talend.jmxmp.ssl.enabled.protocols=TLSv1.2,TLSv1.3
#org.talend.jmxmp.ssl.enabled.cipher.suites=<comma separated list of enabled cipher suites>
It is very similar to the configuration on the server side. The
keystore is only used if certificate based client authentication
is configured for the JMX monitoring server. In this case the
keystore is mandatory. Otherwise the client cannot be
authenticated.
The truststore must correspond to the keystore on the server side
and the keystore needs to correspond to the truststore on the
server side (if needed). If the truststore is undefined, the
client trusts any monitoring server.