Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Reverted from v. 11

...

(You can find the advanced options for the FIX session on the FIX Antenna Java configuration page.)

Property nameDefault valueRequired for session initiatorRequired for session acceptorDescription

sessionType

acceptor

YesYes

Session type. If type is not defined the session will be resolved as an acceptor.

Valid values: acceptor/initiator.

host


Yes

The connecting host for the initiator session.

port


Yes
Yes, if SSL is enabled

The connecting port for the initiator session or the listening port for the acceptor session.

For the session initiator, this is the assigned value used to identify a password to send in the logon message.

For the session acceptor, this is the value that is used for validating the pw received in the logon request

. The same port may be defined for several acceptor sessions

.

All of these sessions should contain the same value for the 'enableSSL' property.

The FIXEdge server accepts a session of this kind only on the defined port.

senderCompID


YesYes

The assigned value used to identify a firm that sends the message.

senderSubID




The assigned value is used to identify a specific message originator (desk, trader, etc.)

senderLocationID




The assigned value used to identify a specific message originator’s location (i.e. geographic location and/or desk, trader).

targetCompID


YesYes

The assigned value used to identify a receiving firm.

targetSubID




The assigned value used to identify a specific individual or a unit intended to receive the message.

targetLocationID




The assigned value used to identify a specific message destination’s location (i.e. geographic location and/or desk, trader)

fixVersion


YesYes

A version of the FIX protocol, version of the transport protocol when using FIX 5.0-FIX 5.0 SP2 (FIXT1.1) or a custom version (see Custom FIX dictionaries setup)

FIX.4.0, FIX.4.1, FIX.4.2, FIX.4.3, FIX.4.4, FIXT.1.1

appVersion




A version of the application-level protocol or a custom version (see Custom FIX dictionaries setup)

Valid values: FIX.4.0, FIX.4.1, FIX.4.2, FIX.4.3, FIX.4.4, FIX.5.0, FIX.5.0SP1, FIX.5.0SP2

backupHost




Backup host for initiator session

backupPort




Backup port for initiator session

incomingSequenceNumber

0



An initial incoming sequence number

outgoingSequenceNumber

0



An initial outgoing sequence number

heartbeatInterval

30



Heartbeat interval (in seconds)

fixFieldList




User-defined fields for messages. If this list is not empty, the Engine adds it to each outgoing message.

outgoingLoginFixFieldList




Additional fields for the outgoing Logon message

groups




A comma-separated list of routing groups

username




The assigned value used to identify a username to send in the Logon message for an initiator session and a username to validate with the user name from the Logon request for a session acceptor. The session will still be accepted if the username is not defined.

password




The assigned value used to identify a password to send in the Logon message for the session initiator and the password to validate
with the password from the Logon request for the session acceptor. The session will be accepted if the password is not defined.

disposeOnDisconnect

false

Disposes the FIX session when another side breaks the connection or in case of disconnection. More details about session statuses can be found in the FIX Antenna Java documentation.

NOTE: If the property is set to true, then the reconnect logic will be suppressed.

NOTE: The FIX session can be started or stopped only if scheduling is applied. Otherwise, the session will be inactive. Refer to the Scheduler configuration section where the session start procedure is specified

...

.

...

2.1 Timestamps in storages

...

PropertyDefault value Description

enableSSL

falseEnable secure transport for the session.

keyStorePath


Path to a Keystore that contains private keys for secure connection

keyStorePassword


Keystore password

trustStorePath


Path to a Truststore. Usually contains a chain of trusted certificates.

trustStorePassword


Truststore password

sslKeystoreType

JKSThe type of Keystore.
See the Keystore section in the Java Cryptography Architecture Standard Algorithm Name Documentation for information about standard types.
Examples of value: JKS, JCEKS, PKCS12, PKCS11

sslTruststoreType

JKSThe type of Truststore.
See the KeyStore section in the Java Cryptography Architecture Standard Algorithm Name Documentation for information about standard types.
Examples of value: JKS, JCEKS, PKCS12, PKCS11

sslKeystoreKeyAlias


Alias filter for used entities in Keystore. Only the keys with a defined alias will be used for a secure connection if this property is defined.

sslTruststoreKeyAlias


Alias filter for used entities in Truststore. Only the certificates with a defined alias will be used for a secure connection if this property is defined.

sslProtocol

TLSv1.2Preferred SSL protocol.For the initiator side, it's the protocol that is used for handshake initialization (but the server may propose another protocol for connection).
For the acceptor side, it defines a family of possible protocols. See the   SSLContext  section in section in the Java Cryptography Architecture Standard Algorithm Name Documentation for information about standard protocol names.

To define certain protocol(s) for communication please use the option acceptedSslServerProtocols.

acceptedSslServerProtocols

Accepted SSL protocols for connection to the server.
This option is used to restrict the SSL protocols on which the initiator can connect.
Value type: comma-separated string
Examples of value: "TLSv1.2", "SSL, SSLv2, SSLv3, TLS, TLSv1, TLSv1.1, TLSv1.2"

keyManagerAlgorithm

SunX509Key manager factory algorithm name (see Customizing the Default Key Managers and Trust Managers). Possible values are SunX509, PKIX.

trustManagerAlgorithm

SunX509Trust manager factory algorithm name (see Customizing the Default Key Managers and Trust Managers). Possible values are SunX509, PKIX.

sslServerNeedClientAuth

falseMust be defined if authentication is required for the server-side socket. This option only work for acceptor sessions.

...