Upgrading clustered queue managers and channels to SSL/TLS
Upgrade the cluster channels one at a time, changing all the CLUSRCVR channels before the CLUSSDR channels.
Before you begin
Consider the following considerations, as these might affect your choice of CipherSpec for a cluster:
- Some CipherSpecs are not available on all platforms. Take care to choose a CipherSpec that is supported by all of the queue managers in the cluster.
- Some CipherSpecs might be new in the current IBM® MQ
release and not supported in older releases. A cluster containing queue managers running at
different MQ releases is only be able to use the CipherSpecs supported by each release.
To use a new CipherSpec within a cluster, you must first migrate all of the cluster queue managers to the current release.
- Some CipherSpecs require a specific type of digital certificate to be used, notably those that use Elliptic Curve Cryptography.
Attention: It is not possible to use a mixture of Elliptic Curve-signed
certificates and RSA-signed certificates on queue managers that you want to join together as part of
a cluster.
Queue managers in a cluster must all use RSA-signed certificates, or all use EC-signed certificates, not a mixture of both.
See Digital certificates and CipherSpec compatibility in IBM MQ for more information.
Upgrade all queue managers in the cluster to IBM MQ V8 or higher, if they are not already at these levels. Distribute the certificates and keys so that TLS works from each of them.
Before you can upgrade to, or use, any of the alias CipherSpecs (ANY_TLS13, ANY_TLS13_OR_HIGHER,
ANY_TLS12, ANY_TLS12_OR_HIGHER, and so on) you must upgrade your queue managers:
- Upgrade all IBM MQ for Multiplatforms queue managers in the cluster to IBM MQ 9.1.4 or later.
- Upgrade all IBM MQ for z/OS® queue managers in the cluster to IBM MQ for z/OS 9.2.0 or later.