Ignore Client Certificate Requests During SSL Handshake


THE INFORMATION IN THIS ARTICLE APPLIES TO:

  • EFT Server Enterprise version 5.1.3 - 6.2.x 

(In version 6.3 and later, EFT Server will allow the ClientFTP DLL to attempt to continue the SSL handshake without specifying a client certificate.) 

DISCUSSION

If an SSL client certificate is not defined when the SSL Server requests a client certificate, the default behavior of the ClientFTP DLL is to FAIL. However, some servers will ask for a client certificate, but operate just fine if the client does not provide one. Therefore, EFT Server uses a registry setting to allow the ClientFTP DLL to attempt to continue the SSL handshake without specifying a client certificate.

To turn on the "ignore client certificate requests" feature, create the DWORD IgnoreClientCertificateRequests at the following location and set it to 00000001.

32-bit:

HKEY_LOCAL_MACHINE\SOFTWARE\GlobalSCAPE Inc.\TED 6\Settings\SecuritySSL

64-bit:

HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GlobalSCAPE Inc.\TED 6\Settings\SecuritySSL