Skip to content

Commit 522b951

Browse files
committed
update the ssl config for backup
1 parent 21ecf7e commit 522b951

File tree

2 files changed

+31
-4
lines changed

2 files changed

+31
-4
lines changed

modules/ROOT/pages/backup-restore/online-backup.adoc

Lines changed: 29 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -317,12 +317,39 @@ The SSL configuration policy has the key of `dbms.ssl.policy.backup`.
317317

318318
As an example, add the following content to your _neo4j.conf_ and _neo4j-admin.conf_ files:
319319

320+
.Server configuration in _neo4j.conf_
320321
[source, properties]
321322
----
323+
server.backup.listen_address=0.0.0.0:6362
322324
dbms.ssl.policy.backup.enabled=true
323-
dbms.ssl.policy.backup.tls_versions=TLSv1.2
324-
dbms.ssl.policy.backup.ciphers=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
325+
dbms.ssl.policy.backup.base_directory=certificates/backup
326+
dbms.ssl.policy.backup.private_key=private.key
327+
dbms.ssl.policy.backup.public_certificate=public.crt
325328
dbms.ssl.policy.backup.client_auth=REQUIRE
329+
dbms.ssl.policy.backup.tls_versions=TLSv1.2,TLSv1.3
330+
# dbms.ssl.policy.backup.tls_versions=TLSv1.2
331+
dbms.ssl.policy.backup.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
332+
# dbms.ssl.policy.backup.ciphers=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
333+
# dbms.ssl.policy.backup.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
334+
# dbms.netty.ssl.provider=OPENSSL
335+
dbms.netty.ssl.provider=JDK
336+
----
337+
338+
.Client configuration in _neo4j-admin.conf_
339+
[source, properties]
340+
----
341+
# Enable SSL backup
342+
dbms.ssl.policy.backup.enabled=true
343+
# dbms.ssl.policy.backup.base_directory=certificates/backup
344+
dbms.ssl.policy.backup.private_key=/path/to/certificates/backup/private.key
345+
dbms.ssl.policy.backup.public_certificate=/path/to/certificates/backup/public.crt
346+
dbms.ssl.policy.backup.client_auth=REQUIRE
347+
dbms.ssl.policy.backup.tls_versions=TLSv1.2,TLSv1.3
348+
# dbms.ssl.policy.backup.tls_versions=TLSv1.2
349+
dbms.ssl.policy.backup.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
350+
# dbms.netty.ssl.provider=OPENSSL
351+
dbms.netty.ssl.provider=JDK
352+
server.jvm.additional=-Djavax.net.ssl.trustStore=/path/to/certificates/backup/trusted/
326353
----
327354

328355
[TIP]

modules/ROOT/pages/security/ssl-framework.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -928,7 +928,7 @@ The owner/group should be configured to the user/group that will be running the
928928
Default user/group is neo4j/neo4j.
929929
====
930930
931-
. Set the backup SSL configuration in _neo4j.conf_.
931+
. Set the backup SSL configuration in both _neo4j.conf_ and _neo4j-admin.conf_.
932932
.. Set the backup SSL policy to `true`:
933933
+
934934
[source, properties]
@@ -1150,7 +1150,7 @@ This means that while new connections will use new certificates, the existing co
11501150
Even if a certificate expires, active connections remain unaffected because the certificates are only used during the initial connection handshake.
11511151
11521152
. Verify that the intra-cluster communication is still encrypted using external tooling, such as Nmap, described in <<ssl-cluster-config, Configuring SSL for intra-cluster communications>>.
1153-
1153+
11541154
11551155
[[ssl-terminology]]
11561156
== Terminology

0 commit comments

Comments
 (0)