You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ROOT/pages/security/ssl-framework.adoc
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1122,22 +1122,24 @@ The following steps outline the process for certificates rotation.
1122
1122
1123
1123
. Enable the dynamic reloading of certificates on all cluster members.
1124
1124
It is best to do this when the cluster is deployed as changing this configuration requires a restart:
1125
-
1125
+
+
1126
1126
[source, properties]
1127
1127
----
1128
1128
dbms.security.tls_reload_enabled=true (default is false)
1129
1129
----
1130
1130
1131
1131
. Replace old certificates either by overwriting them on the filesystem or by copying them to a new location.
1132
-
Then update the required SSL configuration for each effected scope.
1133
1132
+
1134
-
New and old certificates may co-exist on the filesystem, but only one can be referenced in the configuration.
1135
-
New certificates need to be copied to all cluster members as required.
1133
+
Keep in mind that if you choose to copy the certificates to a new directory or use different filenames, you must dynamically update the SSL policy settings.
1134
+
If you are overwriting the certificates in place and not changing anything else, there is no need to dynamically update the SSL policy settings.
1135
+
+
1136
+
New and old certificates may co-exist on the filesystem, but only one can be referenced in the configuration. +
1137
+
It is required to copy new certificates to all cluster members.
1136
1138
1137
-
. Make necessary changes to any of the SSL configuration and/or replace certificates for effected scopes.
1139
+
. Make necessary changes to any of the SSL configuration and/or replace certificates for affected scopes.
1138
1140
1139
1141
. Connect to each cluster member in turn with Cypher Shell using a <<ssl-bolt-connect,`bolt` URI scheme>> and run the reload procedure:
0 commit comments