-
Notifications
You must be signed in to change notification settings - Fork 83
Update the ssl config for backup #2610
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: dev
Are you sure you want to change the base?
Conversation
d16d56b
to
695ea41
Compare
695ea41
to
522b951
Compare
522b951
to
7b76645
Compare
477121b
to
61e7f49
Compare
This PR includes documentation updates Updated pages: |
=== Configure the backup client for SSL | ||
When using `neo4j-admin backup` command, you need to specify the SSL policy to be used by the backup client. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this doesn't make it entirely clear that you can back up against the cluster endpoint(6000 default) and its SSL policy dbms.ssl.policy.cluster.*
, or the backup endpoint(6362 default) and its SSL policy dbms.ssl.policy.backup.*
, but regardless of which you do back up against, the admin client will use the SSL policy specified for backups dbms.ssl.policy.backup.*
=== Configure the backup client for SSL | ||
When using `neo4j-admin backup` command, you need to specify the SSL policy to be used by the backup client. | ||
You can do this by setting a matching SSL configuration in the _neo4j.conf_ and _neo4j-admin.conf_ files. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It is not entirely true that they must match, but be sympathetic of/mirror one another.
i.e., if they want mutualTLS with self-signed certificates, the server must have the client's certificate in its trusted_dir, and the client must have the server's certificate in its trusted_dir
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
However, when they use a certificate authority to signs both the client's and server's certificates, the trusted_dir only needs to contain an intermediate CA cert.
dbms.ssl.policy.backup.client_auth=REQUIRE | ||
---- | ||
=== Configure the backup client for SSL |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
bit of a meta comment, but it might be worth including in the documentation, we do not the validate the keys of ssl policy values so
dbms.ssl.policy.backup.foo
will parse happily but will not help, so it is important that users validate the config keys when configuring SSL, dbms.ssl.policy.backup.trusted_directory
got me as it must be dbms.ssl.policy.backup.trusted_dir
which is inconsistent with *.base_directory
No description provided.