Merge "Use optional CRL with CLIENT_SSL_CERT_LDAP"
This commit is contained in:
@@ -119,6 +119,8 @@ registration (name and email) from LDAP, and some group memberships.
|
|||||||
Therefore, the "_LDAP" suffix in the name of this authentication type.
|
Therefore, the "_LDAP" suffix in the name of this authentication type.
|
||||||
This authentication type can only be used under hosted daemon mode, and
|
This authentication type can only be used under hosted daemon mode, and
|
||||||
the httpd.listenUrl must use https:// as the protocol.
|
the httpd.listenUrl must use https:// as the protocol.
|
||||||
|
Optionally, certificate revocation list file can be used
|
||||||
|
at <review-site>/etc/crl.pem. For details, see httpd.sslCrl.
|
||||||
+
|
+
|
||||||
* `LDAP`
|
* `LDAP`
|
||||||
+
|
+
|
||||||
@@ -1633,6 +1635,23 @@ errors caused by very long Referer URLs or large cookie values.
|
|||||||
By default, 16384 (16 K), which is sufficient for most OpenID and
|
By default, 16384 (16 K), which is sufficient for most OpenID and
|
||||||
other web-based single-sign-on integrations.
|
other web-based single-sign-on integrations.
|
||||||
|
|
||||||
|
[[httpd.sslCrl]]httpd.sslCrl::
|
||||||
|
+
|
||||||
|
Path of the certificate revocation list file in PEM format. This
|
||||||
|
crl file is optional, and available for CLIENT_SSL_CERT_LDAP
|
||||||
|
authentication.
|
||||||
|
+
|
||||||
|
To create and view a crl using openssl:
|
||||||
|
+
|
||||||
|
----
|
||||||
|
openssl ca -gencrl -out crl.pem
|
||||||
|
openssl crl -in crl.pem -text
|
||||||
|
----
|
||||||
|
+
|
||||||
|
If not absolute, the path is resolved relative to `$site_path`.
|
||||||
|
+
|
||||||
|
By default, `$site_path/etc/crl.pem`.
|
||||||
|
|
||||||
[[httpd.sslKeyStore]]httpd.sslKeyStore::
|
[[httpd.sslKeyStore]]httpd.sslKeyStore::
|
||||||
+
|
+
|
||||||
Path of the Java keystore containing the server's SSL certificate
|
Path of the Java keystore containing the server's SSL certificate
|
||||||
|
@@ -193,6 +193,12 @@ public class JettyServer {
|
|||||||
|
|
||||||
if (AuthType.CLIENT_SSL_CERT_LDAP.equals(authType)) {
|
if (AuthType.CLIENT_SSL_CERT_LDAP.equals(authType)) {
|
||||||
ssl.setNeedClientAuth(true);
|
ssl.setNeedClientAuth(true);
|
||||||
|
|
||||||
|
File crl = getFile(cfg, "sslcrl", "etc/crl.pem");
|
||||||
|
if (crl.exists()) {
|
||||||
|
ssl.setCrlPath(crl.getAbsolutePath());
|
||||||
|
ssl.setValidatePeerCerts(true);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
defaultPort = 443;
|
defaultPort = 443;
|
||||||
|
Reference in New Issue
Block a user