Information
Enable hostname verification in JAX-WS applications by setting the http.conduit.tlsClientParameters.diableCNCheck HTTP conduit property to false.orDo not disable hostname verification in JAX-WS applications by setting the http.conduit.tlsClientParameters.diableCNCheck HTTP conduit property to true.orEnable hostname verification in JAX-WS applications.orDo not disable hostname verification in JAX-WS applications.
Disabling hostname verification in JAX-WS applications by setting the http.conduit.tlsClientParameters.diableCNCheck HTTP conduit property to false.Disable hostname verification in JAX-WS applications by setting the http conduit property http.conduit.tlsClientParameters.disableCNCheck to false.
Hostname verification enables the client to trust the server it is communicating with during the SSL/TLS handshake. Hostname verification mitigates the man-in-the-middle attackers which can spoof SSL/TLS servers via an arbitrary valid certificate by ensuring that SSL server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate.
Solution
Add the http.conduit.tlsClientParameters.disableCNCheck property to webservice-endpoint element in ${server.config.dir}/configDropins/overrides/<any file name>.xml Set the http.conduit.tlsClientParameters.disableCNCheck attributes value to false for both provider and client sides. The same setting can be disabled trough WEB-INF/ibm-ws-bnd.xml of the web application or META-INF/ibm-ws-bnd.xml of the EJB module.
..
<!-- ***** Provider Side ***** -->
<webApplication ... >
<webservices-bnd ... >
<webservice-endpoint ... >
<properties http.conduit.tlsClientParameters.disableCNCheck="false" />
</webservice-endpoint>
</webservices-bnd>
</webApplication>
...
<!-- ***** Client Side (service-ref) ***** -->
<webApplication ... >
<webservices-bnd ... >
<service-ref ... >
<properties http.conduit.tlsClientParameters.disableCNCheck="false" />
</service-ref>
</webservices-bnd>
</webApplication>