Hi @durgabhavanirali — for IIQ 8.5 “Windows Local” (Windows Connector), TLS is enabled on the IdentityIQ ↔ IQService channel. This is a clean way to manage this
What you need before starting
IQService server FQDN (example: iqservice01.company.com). Your certificate must match this.
Pick one TLS port (use whatever your org standard is).
A service account that IIQ will use to authenticate to IQService (example: DOMAIN\svc_iqservice).
- Issue the IQService server certificate on the Windows host
On the IQService Windows server, make sure the cert is:
• In Local Computer → Personal store
• Has the private key
• EKU includes Server Authentication
• CN = FQDN AND SAN includes DNS = same FQDN
If SAN is missing, TLS will fail even if the cert “looks fine”.
- Install (or re-install) IQService to listen on TLS
From the IQService folder (where IQService.exe exists):
Install on TLS port:
IQService.exe -i -o <TLS_PORT>
If you’re converting an existing install and want to avoid mixed-mode confusion:
Disable the non‑TLS port + restart:
IQService.exe -p 0
IQService.exe -t
Verify what IQService is actually listening on:
IQService.exe -v
You should see a configured TLS port.
- Force IQService to pick the correct cert (common real-world gotcha)
If the machine has multiple certs, tell IQService which subject to use:
IQService.exe -m DNS:iqservice01.company.com
IQService.exe -t
- Enable Client Authentication (required when using TLS)
Register the account that IIQ will use:
IQService.exe -a “DOMAIN\svc_iqservice”
- Configure the Windows Local application in IIQ
In the Windows Local Application configuration:
• IQServiceHost = IQService FQDN / IP
• IQServicePort = your TLS port
• useTLSforIQService = true
• IQServiceUser / IQServicePassword = the SAME user registered in step 4
Most failures happen because people enable TLS but forget the IQService user/password or they use a different account than the one registered.
- Trust chain (must be correct on both sides)
• On the IQService Windows host: the issuing CA chain must be trusted.
• On the IIQ side: the JVM used by the app server must trust the issuing CA/root (import the CA chain into the JVM truststore used by your IIQ runtime).
⸻
Official documentation to check references
Windows Local connector configuration parameters:
IQService: Configuring TLS + Client Authentication (includes commands/checklist):
IQService command reference (e.g., -m, -a, -p, -t, -v):
https://documentation.sailpoint.com/connectors/iqservice/help/integrating_iqservice_admin/commands.