-
Notifications
You must be signed in to change notification settings - Fork 83
Update the ssl config for backup #2610
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: dev
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -928,7 +928,7 @@ The owner/group should be configured to the user/group that will be running the | |
Default user/group is neo4j/neo4j. | ||
==== | ||
|
||
. Set the backup SSL configuration in _neo4j.conf_. | ||
. Set the backup SSL configuration in the _neo4j.conf_ file. | ||
.. Set the backup SSL policy to `true`: | ||
+ | ||
[source, properties] | ||
|
@@ -956,6 +956,29 @@ If the certificate is a different path outside of NEO4J_HOME, then set the absol | |
dbms.ssl.policy.backup.client_auth=REQUIRE | ||
---- | ||
|
||
=== Configure the backup client for SSL | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. bit of a meta comment, but it might be worth including in the documentation, we do not the validate the keys of ssl policy values so |
||
|
||
When using `neo4j-admin backup` command, you need to specify the SSL policy to be used by the backup client. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I think this doesn't make it entirely clear that you can back up against the cluster endpoint(6000 default) and its SSL policy |
||
You can do this by setting a matching SSL configuration in the _neo4j.conf_ and _neo4j-admin.conf_ files. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It is not entirely true that they must match, but be sympathetic of/mirror one another. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. However, when they use a certificate authority to signs both the client's and server's certificates, the trusted_dir only needs to contain an intermediate CA cert. |
||
This is crucial for the backup to work properly. | ||
For example, if you have set up the backup SSL policy described in section <<ssl-backup-config>>, then you need to set the following in the _neo4j-admin.conf_ file: | ||
|
||
[source, properties] | ||
---- | ||
dbms.ssl.policy.backup.enabled=true | ||
dbms.ssl.policy.backup.base_directory=/path/to/certificates/backup | ||
dbms.ssl.policy.backup.private_key=private.key | ||
dbms.ssl.policy.backup.public_certificate=public.crt | ||
dbms.ssl.policy.backup.client_auth=REQUIRE | ||
dbms.ssl.policy.backup.tls_versions=TLSv1.2,TLSv1.3 | ||
dbms.ssl.policy.backup.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | ||
---- | ||
renetapopova marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
[NOTE] | ||
==== | ||
Keep in mind that if the backup client is on a different machine from the Neo4j server, you must install the same SSL certs and keys on the backup client machine as well, so that the backup client can authenticate the server and vice versa. | ||
==== | ||
|
||
[[ssl-other-configs]] | ||
=== Other configurations for SSL | ||
|
||
|
@@ -1150,7 +1173,7 @@ This means that while new connections will use new certificates, the existing co | |
Even if a certificate expires, active connections remain unaffected because the certificates are only used during the initial connection handshake. | ||
|
||
. Verify that the intra-cluster communication is still encrypted using external tooling, such as Nmap, described in <<ssl-cluster-config, Configuring SSL for intra-cluster communications>>. | ||
|
||
|
||
[[ssl-terminology]] | ||
== Terminology | ||
|
Uh oh!
There was an error while loading. Please reload this page.