Skip to content

Commit 415a36c

Browse files
committed
update the ssl config for backup
1 parent ca614f7 commit 415a36c

File tree

2 files changed

+31
-4
lines changed

2 files changed

+31
-4
lines changed

modules/ROOT/pages/backup-restore/online-backup.adoc

Lines changed: 29 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -315,12 +315,39 @@ The SSL configuration policy has the key of `dbms.ssl.policy.backup`.
315315

316316
As an example, add the following content to your _neo4j.conf_ and _neo4j-admin.conf_ files:
317317

318+
.Server configuration in _neo4j.conf_
318319
[source, properties]
319320
----
321+
server.backup.listen_address=0.0.0.0:6362
320322
dbms.ssl.policy.backup.enabled=true
321-
dbms.ssl.policy.backup.tls_versions=TLSv1.2
322-
dbms.ssl.policy.backup.ciphers=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
323+
dbms.ssl.policy.backup.base_directory=certificates/backup
324+
dbms.ssl.policy.backup.private_key=private.key
325+
dbms.ssl.policy.backup.public_certificate=public.crt
323326
dbms.ssl.policy.backup.client_auth=REQUIRE
327+
dbms.ssl.policy.backup.tls_versions=TLSv1.2,TLSv1.3
328+
# dbms.ssl.policy.backup.tls_versions=TLSv1.2
329+
dbms.ssl.policy.backup.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
330+
# dbms.ssl.policy.backup.ciphers=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
331+
# dbms.ssl.policy.backup.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
332+
# dbms.netty.ssl.provider=OPENSSL
333+
dbms.netty.ssl.provider=JDK
334+
----
335+
336+
.Client configuration in _neo4j-admin.conf_
337+
[source, properties]
338+
----
339+
# Enable SSL backup
340+
dbms.ssl.policy.backup.enabled=true
341+
# dbms.ssl.policy.backup.base_directory=certificates/backup
342+
dbms.ssl.policy.backup.private_key=/path/to/certificates/backup/private.key
343+
dbms.ssl.policy.backup.public_certificate=/path/to/certificates/backup/public.crt
344+
dbms.ssl.policy.backup.client_auth=REQUIRE
345+
dbms.ssl.policy.backup.tls_versions=TLSv1.2,TLSv1.3
346+
# dbms.ssl.policy.backup.tls_versions=TLSv1.2
347+
dbms.ssl.policy.backup.ciphers=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
348+
# dbms.netty.ssl.provider=OPENSSL
349+
dbms.netty.ssl.provider=JDK
350+
server.jvm.additional=-Djavax.net.ssl.trustStore=/path/to/certificates/backup/trusted/
324351
----
325352

326353
[TIP]

modules/ROOT/pages/security/ssl-framework.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -928,7 +928,7 @@ The owner/group should be configured to the user/group that will be running the
928928
Default user/group is neo4j/neo4j.
929929
====
930930
931-
. Set the backup SSL configuration in _neo4j.conf_.
931+
. Set the backup SSL configuration in both _neo4j.conf_ and _neo4j-admin.conf_.
932932
.. Set the backup SSL policy to `true`:
933933
+
934934
[source, properties]
@@ -1162,7 +1162,7 @@ This means that while new connections will use new certificates, the existing co
11621162
Even if a certificate expires, active connections remain unaffected because the certificates are only used during the initial connection handshake.
11631163
11641164
. Verify that the intra-cluster communication is still encrypted using external tooling, such as Nmap, described in <<ssl-cluster-config, Configuring SSL for intra-cluster communications>>.
1165-
1165+
11661166
11671167
[[ssl-terminology]]
11681168
== Terminology

0 commit comments

Comments
 (0)