You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/src/v1.7.0/maintain/bpe-reverse-proxy/configuration.md
+21-9Lines changed: 21 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ icon: config
11
11
12
12
### HTTPS_SERVER_NAME_PORT
13
13
-**Required:** Yes
14
-
-**Description:**External FQDN of your DSF BPE server with port, typically `443`
14
+
-**Description:** FQDN of your DSF BPE server with port, typically `443`
15
15
-**Example:**`my-external.fqdn:443`
16
16
17
17
@@ -41,34 +41,34 @@ icon: config
41
41
42
42
### SERVER_CONTEXT_PATH
43
43
-**Required:** No
44
-
-**Description:** Reverse proxy context path that delegates to the app server, `/` character at start, no `/` character at end, use `''` (empty string) to configure root as context path.
44
+
-**Description:** Reverse proxy context path that delegates to the app server, `/` character at start, no `/` character at end, use `''` (empty string) to configure root as context path
45
45
-**Default:**`/bpe`
46
46
47
47
48
48
### SSL_CA_CERTIFICATE_FILE
49
-
-**Required:**Yes
50
-
-**Description:** Certificate chain file including all signing, intermediate and ca certificate used to validate client certificates, PEM encoded, sets the apache httpd parameter `SSLCACertificateFile`
49
+
-**Required:**No
50
+
-**Description:** Certificate chain file including all issuing, intermediate and root certificates used to validate client certificates, PEM encoded, sets the apache httpd parameter `SSLCACertificateFile`
51
51
-**Recommendation:** Use docker secret file to configure
-**Description:** File containing all signing certificates excepted, will be used to specify the `Acceptable client certificate CA names` send to the client, during TLS handshake, sets the apache httpd parameter `SSLCADNRequestFile`; if omitted all entries from `SSL_CA_CERTIFICATE_FILE` are used
58
58
-**Recommendation:** Use docker secret file to configure
-**Description:** Certificate chain file, PEM encoded, must contain all certificates between the server certificate and the root ca certificate, sets the apache httpd parameter `SSLCertificateChainFile`; can be omitted if either no chain is needed (aka self signed server certificate) or the file specified via `SSL_CERTIFICATE_FILE` contains the certificate chain
64
+
-**Description:** Certificate chain file, PEM encoded, must contain all certificates between the server certificate and the root ca certificate (excluding the root ca certificate), sets the apache httpd parameter `SSLCertificateChainFile`; can be omitted if either no chain is needed (self signed server certificate) or the file specified via `SSL_CERTIFICATE_FILE` contains the certificate chain
65
65
-**Recommendation:** Use docker secret file to configure
-**Description:** Server certificate file, PEM encoded, sets the apache httpd parameter `SSLCertificateFile`
71
+
-**Description:** Server certificate file, PEM encoded, sets the apache httpd parameter `SSLCertificateFile`, may contain all certificates between the server certificate and the root ca certificate (excluding the root ca certificate). Omit `SSL_CERTIFICATE_CHAIN_FILE` if chain included
72
72
-**Recommendation:** Use docker secret file to configure
-**Description:** Expected client certificate subject DN country `C` values, must be a comma-separated list of strings in single quotation marks, e.g. `'DE', 'FR'`. If a client certificate with a not configured subject country `C` value is used, the server answers with a `403 Forbidden` status code
86
+
-**Default:**`'DE'`
87
+
88
+
89
+
### SSL_EXPECTED_CLIENT_I_DN_CN_VALUES
90
+
-**Required:** No
91
+
-**Description:** Expected client certificate issuer DN common-name `CN` values, must be a comma-separated list of strings in single quotation marks. If a client certificate from a not configured issuing ca common-name is used, the server answers with a `403 Forbidden` status code
92
+
-**Default:**`'GEANT TLS ECC 1', 'HARICA OV TLS ECC', 'GEANT TLS RSA 1', 'HARICA OV TLS RSA', 'GEANT S/MIME ECC 1', 'HARICA S/MIME ECC', 'GEANT S/MIME RSA 1', 'HARICA S/MIME RSA', 'DFN-Verein Global Issuing CA', 'Fraunhofer User CA - G02', 'D-TRUST SSL Class 3 CA 1 2009', 'Sectigo RSA Organization Validation Secure Server CA', 'GEANT OV RSA CA 4', 'GEANT Personal CA 4', 'GEANT eScience Personal CA 4', 'Sectigo ECC Organization Validation Secure Server CA', 'GEANT OV ECC CA 4', 'GEANT Personal ECC CA 4', 'GEANT eScience Personal ECC CA 4', 'D-TRUST Limited Basic CA 1-2 2019', 'D-TRUST Limited Basic CA 1-3 2019'`
93
+
94
+
83
95
### SSL_VERIFY_CLIENT
84
96
-**Required:** No
85
97
-**Description:** Modifies the apache mod_ssl config parameter `SSLVerifyClient`
86
98
-**Recommendation:** Set to `optional` when using OIDC authentication
0 commit comments