This is an automated email from the ASF dual-hosted git repository.
techdocsmith pushed a commit to branch 28.0.0
in repository https://gitbox.apache.org/repos/asf/druid.git
The following commit(s) were added to refs/heads/28.0.0 by this push:
new 77e47e6f613 [backport] docs: LDAP trust store property clarification
(#15028) (#15314)
77e47e6f613 is described below
commit 77e47e6f613f91ac99d8c345cf6b7303d348d4f1
Author: 317brian <[email protected]>
AuthorDate: Thu Nov 2 15:09:00 2023 -0700
[backport] docs: LDAP trust store property clarification (#15028) (#15314)
Co-authored-by: 317brian <[email protected]>
Co-authored-by: cristian-popa <[email protected]>
---
docs/operations/auth-ldap.md | 19 +++++++++++--------
1 file changed, 11 insertions(+), 8 deletions(-)
diff --git a/docs/operations/auth-ldap.md b/docs/operations/auth-ldap.md
index 93320049668..f45f7419b30 100644
--- a/docs/operations/auth-ldap.md
+++ b/docs/operations/auth-ldap.md
@@ -254,17 +254,20 @@ Before you start to set up LDAPS in Druid, you must
[configure Druid for LDAP au
Complete the following steps to set up LDAPS for Druid. See [Configuration
reference](../configuration/index.md) for the location of the configuration
files.
-1. Import the CA certificate for your LDAP server or a self-signed certificate
into the truststore location saved as `druid.client.https.trustStorePath` in
your `common.runtime.properties` file.
+1. Import the CA or self-signed certificate for your LDAP server into either a
newly created LDAP trust store or the trust store specified by the
`druid.client.https.trustStorePath` property located in your
`common.runtime.properties` file.
- ```
- keytool -import -trustcacerts -keystore path/to/cacerts -storepass
truststorepassword -alias aliasName -file path/to/certificate.cer
- ```
+ The example below illustrates the option with one key store for both HTTPS
clients and LDAP clients, but you can use a separate dedicated trust store just
for ldap if you wish.
- Replace `path/to/cacerts` with the path to your truststore,
`truststorepassword` with your truststore password, `aliasName` with an alias
name for the keystore, and `path/to/certificate.cer` with the location and name
of your certificate. For example:
+ ```
+ keytool -import -trustcacerts -keystore path/to/cacerts -storepass
truststorepassword -alias aliasName -file path/to/certificate.cer
+ ```
+
+ Replace `path/to/cacerts` with the path to your truststore,
`truststorepassword` with your truststore password, `aliasName` with an alias
name for the keystore, and `path/to/certificate.cer` with the location and name
of your certificate. For example:
```
- keytool -import -trustcacerts -keystore
/Library/Java/JavaVirtualMachines/adoptopenjdk-8.jdk/Contents/Home/jre/lib/security/cacerts
-storepass mypassword -alias myAlias -file /etc/ssl/certs/my-certificate.cer
- ```
+ keytool -import -trustcacerts -keystore
/Library/Java/JavaVirtualMachines/adoptopenjdk-8.jdk/Contents/Home/jre/lib/security/cacerts
-storepass mypassword -alias myAlias -file /etc/ssl/certs/my-certificate.cer
+ ```
+
2. If the root certificate for the CA isn't already in the Java truststore,
import it:
@@ -278,7 +281,7 @@ Complete the following steps to set up LDAPS for Druid. See
[Configuration refer
keytool -importcert -keystore
/Library/Java/JavaVirtualMachines/adoptopenjdk-8.jdk/Contents/Home/jre/lib/security/cacerts
-storepass mypassword -alias myAlias -file /etc/ssl/certs/my-certificate.cer
```
-3. In your `common.runtime.properties` file, add the following lines to the
LDAP configuration section, substituting your own truststore path and password:
+3. In your `common.runtime.properties` file, add the following lines to the
LDAP configuration section, substituting your own trust store path and
password. Note that the property to point to the trust store is
`druid.auth.basic.ssl.trustStorePath` and not
`druid.client.https.trustStorePath` . Regardless of if you use the same trust
store for HTTPS clients and LDAP or if you use a separate LDAP trust store,
ensure the correct property points to the trust store where you imported the
LDAP [...]
```
druid.auth.basic.ssl.trustStorePath=/Library/Java/JavaVirtualMachines/adoptopenjdk-8.jdk/Contents/Home/jre/lib/security/cacerts
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]