Skip to main content

ActiveMQ TLS Connection Guide

These instructions define the procedure for enabling the TLS protocol connection to the ActiveMQ.

SAST ActiveMQ Clients

The following services operate as ActiveMQ clients:

  • Access Control (IIS)

  • Engine Service

  • Scans Manager Service

  • Results Service

Configuring ActiveMQ Server Certificates


In some instances, ActiveMQ servers are also referred to as ActiveMQ brokers.

Server certificates can be configured in several ways. For the purposes of this guide, we provide examples for a self-signed certificate and a CA certificate.

Self-Signed Certificate

Self-signed certificates are used for testing and development.

1. Navigate to the Checkmarx ActiveMQ\conf folder.

2. In the Search field, enter cmd and execute the relevant command according to the respective scenarios listed below.

3. Create the server certificate (self-signed) as illustrated:

During the process of self-signed certification creation, you are prompted for the following credentials and information:

  • Password. Required, the key store password.

  • Your first and last name, which is going to be your domain name (FQDN). Required by the ActiveMQ URI for the certificate to operate.

  • Additional organizational information. Optional

  • Certificate Password. Required, it is recommended to to use the same password as for the key store password.


You may use the wildcard * for subdomains, for example *


4. Export the server certificate.


The certificate must be available to every client.

5. Install the desired certificate on every client as explained in the relevant section below.

CA Certificate

CA certificates are used for production.


CA Certificates must be in .pfx format.

1. Navigate to theCheckmarx ActiveMQ\conffolder.

2. Enter cmd in the Search field and execute the relevant command according to the respective scenarios listed below:

3. Create a key store from an existing CA certificate (cert.pfx).

4. Copy the CA certificate to every client.

5. Install the desired certificate on every client as explained in the relevant section below.

Installing the Certificate

This section explains how to install the respective certificate under Windows:

  • Copy the certificate to the client and then double-click it or use the Certificate Management tool (certmgr.msc) to install.


Certificates must be installed in the Trusted Root Certificate Store on every client host.

Enabling TLS Protocol Connection

The TLS protocol connection to the ActiveMQ can be enabled by first configuring the ActiveMQ server via a configuration file (activemq.xml) and then updating the ActiveMQ client configuration via the database (CxDB).

Configuring the ActiveMQ Server

Once the CxSAST environment has been installed and fully configured, do the following:,

1. Navigate to the Checkmarx ActiveMQ\conf folder and open activemq.xml.

2. Edit the <sslContext> tag accordingly, using either a KS or a PFX file, as shown in the following examples:


2. Edit the <transportConnectors> tag accordingly:


The transportConnector defines theportthat will be used for ActiveMQ communications.

This port will be required for the ActiveMQ URI.


It is required to use TLS v1.2 and relevant Cipher suites:


3. Navigate to C:\Program Files\Checkmarx\Checkmarx ActiveMQ\bin and open a command line window (cmd instance) for that folder.

4. Use the ActiveMQ encryption utility to encrypt your password by entering the following in the command line:


activemq encrypt --password CxManager --input CxExamplePassword

Note: The password argument is related to the “ACTIVEMQ_ENCRYPTION_PASSWORD” environment variable, which is by default “CxManager”.

5. Copy the encrypted text (yellow fonts in the screen image below).


6. Navigate to C:\Program Files\Checkmarx\Checkmarx ActiveMQ\conf and edit

7. Add a new variable in the same format as the existing value to the text file with the encrypted text between the brackets, for example:


High Availability Environment

If High Availability cluster setup is used, copy the following files to every server:

  • activemq.xml

  • server.ks


Restart each relevant ActiveMQ service on the respective server after copying all the files.

ActiveMQ Connection URI

1. For TLS connections, use ssl as the protocol prefix of the URI. The URI format is as follows:

2. Define additional connection parameters as follows:


To ensure that the CxEngine sends the results to the correct ActiveMQ server, ensure that the ValidateEngineMessageQueueConfigurationEnabled feature flag configuration item in the CxComponentConfiguration table is set to true (the default).

If the URL of the ActiveMQ on the server is different from the ActiveMQ URL of the application (as specified in CxComponentConfiguration), the CxEngine will go offline with an OfflineReason error message.

TLS Server Example

High Availability TLS Example

Refer to the High Availability user guide at Configuring ActiveMQ for High Availability Environments.


  • The parameter value must be ULR encoded

  • Disabling server name verification is not recommended.

  • High Availability setup broker certificate must be deployed to all clients in a similar environment.

  • For advanced URI configuration options please refer to ActiveMQ documentation:

Configuring ActiveMQ Clients

To configure ActiveMQ clients, do the following:

1. OpenMS SQL Server Management Studio.

2. Connect to the SQL server.

3. Navigate to Databases > CxDB > Tables.


4. Expand the Tables repository to view its content and navigate to dbo.CxComponentConfiguration .

5. Right-click dbo.CxComponentConfiguration and then select Edit Rows.

6. In the ActiveMessageQueueURL key field, enter the ActiveMQ URI.

7. In the Tables repository, right-click Config.CxEngineConfigurationKeysMeta and select Edit Rows.

8. In the ACTIVE_MESSAGE_QUEUE_URL key field, enter the ActiveMQ URI:


These steps can be performed by using the following DB TSQL script:

Replace <host.domain> with your relevant value:

DECLARE @AmqString varchar(1000)

SET @AmqString = 'ssl://<host.domain>:61617'

Update [CxDB].[dbo].CxComponentConfiguration

set [Value] = @AmqString

where [Key] = 'ActiveMessageQueueURL'

Update [CxDB].[Config].[CxEngineConfigurationKeysMeta]

set [DefaultValue] = @AmqString


9. Restart the following services for the changes to take effect:

  • Scans Manager Service

  • Results Service

  • Access Control (IIS)

Configuring M&O with ActiveMQ TLS

In the C:\Program Files\Checkmarx\Checkmarx Risk Management\AMQclient folder, create the mnoTrustStore.ts file. The Client trust store file contains the certificate of the server. This file is mandatory and must always be available in the AMQclient folder to configure AMQ SSL. The Client keystore file is only needed in case of mutual TLS.

To create the mnoTrustStore.ts file:

1. Open the Windows command line interface (cmd)

2. Enter copy client.ts mnoTrustStore.ts

3. Create a file called with the password of the client truststore. The file content looks as follows:

  • TRUST_STORE_PASSWORD - Mandatory and must always be set.

  • AMQ_BROKER_URL - Not mandatory in this file. If supplied, it is used by MnO instead of the URL in the CxComponentConfiguration table. The URL must not contain certificate information like the broker URL in CxComponentConfiguration since this information is supplied by the passwords in and mnoTrustStore.ts .

  • The file is relevant for AMQ SSL configuration only.


  • When using self-signed certificate, the URL must contain the name of the domain (FQDN) used when creating the server certificate.

  • The values are encrypted after restarting CXARM.