Skip to content

Commit 6074ad4

Browse files
committed
changed permission section to allow new fhir proxy without root privs
1 parent 3967501 commit 6074ad4

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

docs/src/operations/v1.9.0/install.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -94,12 +94,12 @@ Here is a quick overview of the expected network setup.
9494
9595
1. Add certificates and keys
9696
* Add the server certificate (certificate _A_), the corresponding private-key and the certificate chain (one file with all intermediate certificates, excluding the root CA) to **/opt/fhir/secrets/**
97-
* ssl_certificate_file.pem (chmod: 440, chown: fhir:docker)
98-
* ssl_certificate_key_file.pem (chmod: 440, chown: fhir:docker)
99-
* ssl_certificate_chain_file.pem (chmod: 440, chown: fhir:docker)
97+
* ssl_certificate_file.pem (chmod: 440, chown: root:4101, 4101 is the user of the fhir proxy)
98+
* ssl_certificate_key_file.pem (chmod: 440, chown: root:4101)
99+
* ssl_certificate_chain_file.pem (chmod: 444, chown: root:fhir)
100100
* Add the client certificate (Certificate _B_) and the corresponding private-key to **/opt/fhir/secrets/**
101-
* client_certificate.pem (chmod: 440, chown: fhir:docker)
102-
* client_certificate_private_key.pem (chmod: 440, chown: fhir:docker)
101+
* client_certificate.pem (chmod: 440, chown: root:fhir)
102+
* client_certificate_private_key.pem (chmod: 440, chown: root:fhir)
103103
* If the private key is encrypted, add a password file with the password as the only content to **/opt/fhir/secrets/client_certificate_private_key.pem.password**
104104
* If the private key is not encrypted, remove the corresponding docker secret lines from the `docker-compose.yml` file
105105
```
@@ -112,12 +112,12 @@ Here is a quick overview of the expected network setup.
112112
```
113113
114114
::: tip How to chmod / chown
115-
For the example *ssl_certificate_file.pem (chmod: 440, chown: fhir:docker)* you must:
115+
For the example *ssl_certificate_file.pem (chmod: 440, chown: root:4101)* you must:
116116
117117
1. Set the file content as requested
118118
2. Change the file permissions to 440 (allow read access to the owner of the file and the group the file belongs to, deny write access to everybody and deny read for other users):
119119
`chmod 440 /opt/fhir/secrets/ssl_certificate_file.pem`
120-
3. Change the owner of the file to the user `fhir` and the group the file belongs to to `docker`:
120+
3. Change the owner of the file to the user root and the group the file belongs to to the id 4101:
121121
`chown fhir:docker /opt/fhir/secrets/ssl_certificate_file.pem`
122122
123123
:::
@@ -172,8 +172,8 @@ Here is a quick overview of the expected network setup.
172172
173173
1. Add certificates and keys
174174
* Add the client certificate (Certificate _B_) and the corresponding private-key to **/opt/bpe/secrets/**
175-
* client_certificate.pem (chmod: 440 chown: bpe:docker)
176-
* client_certificate_private_key.pem (chmod: 440 chown: bpe:docker)
175+
* client_certificate.pem (chmod: 440 chown: root:bpe)
176+
* client_certificate_private_key.pem (chmod: 440 chown: root:bpe)
177177
* If the private key is encrypted, add a password file with the password as the only content to **/opt/bpe/secrets/client_certificate_private_key.pem.password**
178178
* If the private key is not encrypted, remove the corresponding docker secret lines from the `docker-compose.yml` file
179179
```

0 commit comments

Comments
 (0)