Skip to content

Commit 9a94409

Browse files
Clarify the difference between copying and overwriting TLS certificates (#2193)
Clarify steps, fix formatting and mistakes.
1 parent b3f2a90 commit 9a94409

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

modules/ROOT/pages/security/ssl-framework.adoc

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1122,22 +1122,24 @@ The following steps outline the process for certificates rotation.
11221122
11231123
. Enable the dynamic reloading of certificates on all cluster members.
11241124
It is best to do this when the cluster is deployed as changing this configuration requires a restart:
1125-
1125+
+
11261126
[source, properties]
11271127
----
11281128
dbms.security.tls_reload_enabled=true (default is false)
11291129
----
11301130
11311131
. Replace old certificates either by overwriting them on the filesystem or by copying them to a new location.
1132-
Then update the required SSL configuration for each effected scope.
11331132
+
1134-
New and old certificates may co-exist on the filesystem, but only one can be referenced in the configuration.
1135-
New certificates need to be copied to all cluster members as required.
1133+
Keep in mind that if you choose to copy the certificates to a new directory or use different filenames, you must dynamically update the SSL policy settings.
1134+
If you are overwriting the certificates in place and not changing anything else, there is no need to dynamically update the SSL policy settings.
1135+
+
1136+
New and old certificates may co-exist on the filesystem, but only one can be referenced in the configuration. +
1137+
It is required to copy new certificates to all cluster members.
11361138
1137-
. Make necessary changes to any of the SSL configuration and/or replace certificates for effected scopes.
1139+
. Make necessary changes to any of the SSL configuration and/or replace certificates for affected scopes.
11381140
11391141
. Connect to each cluster member in turn with Cypher Shell using a <<ssl-bolt-connect,`bolt` URI scheme>> and run the reload procedure:
1140-
1142+
+
11411143
[source]
11421144
----
11431145
dbms.security.reloadTLS()

0 commit comments

Comments
 (0)