THE INFORMATION IN THIS ARTICLE APPLIES TO:
- EFT Server Enterprise version 5.1.3 - 6.2.x
(In version 6.3 and later, EFT Server will allow the ClientFTP DLL to attempt to continue the SSL handshake without specifying a client certificate.)
If an SSL client certificate is not defined when the SSL Server requests a client certificate, the default behavior of the ClientFTP DLL is to FAIL. However, some servers will ask for a client certificate, but operate just fine if the client does not provide one. Therefore, EFT Server uses a registry setting to allow the ClientFTP DLL to attempt to continue the SSL handshake without specifying a client certificate.
To turn on the "ignore client certificate requests" feature, create the DWORD IgnoreClientCertificateRequests at the following location and set it to 00000001.
HKEY_LOCAL_MACHINE\SOFTWARE\GlobalSCAPE Inc.\TED 6\Settings\SecuritySSL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlobalSCAPE Inc.\TED 6\Settings\SecuritySSL