To allow server certificate verification, the certificate(s) of one or more
placed in the file ~/.postgresql/root.crt> in the user's home
- directory. (On Microsoft Windows the file is named
+ directory. If intermediate
CA>s appear in
+ root.crt, the file must also contain certificate
+ chains to their root
CA>s. (On Microsoft Windows the file is named
%APPDATA%\postgresql\root.crt.)
intermediate> certificate authority, rather than one that is
directly trusted by the server. To use such a certificate, append the
certificate of the signing authority to the postgresql.crt>
- file, then its parent authority's certificate, and so on up to a
- root> authority that is trusted by the server. The root
- certificate should be included in every case where
- postgresql.crt> contains more than one certificate.
+ file, then its parent authority's certificate, and so on up to a certificate
+ authority, root> or intermediate>, that is trusted by
+ the server, i.e. signed by a certificate in the server's
+ root.crt file.
- Note that root.crt lists the top-level CAs that are
- considered trusted for signing server certificates. In principle it need
+ Note that the client's ~/.postgresql/root.crt> lists the top-level CAs
+ that are considered trusted for signing server certificates. In principle it need
not list the CA that signed the client's certificate, though in most cases
that CA would also be trusted for server certificates.
intermediate> certificate authority, rather than one that is
directly trusted by clients. To use such a certificate, append the
certificate of the signing authority to the server.crt> file,
- then its parent authority's certificate, and so on up to a root>
- authority that is trusted by the clients. The root certificate should
- be included in every case where server.crt> contains more than
- one certificate.
+ then its parent authority's certificate, and so on up to a certificate
+ authority, root> or intermediate>, that is trusted by
+ clients, i.e. signed by a certificate in the clients'
+ root.crt files.
SSL connection startup. (See for a
description of how to set up certificates on the client.) The server will
verify that the client's certificate is signed by one of the trusted
- certificate authorities. Certificate Revocation List (CRL) entries
+ certificate authorities. If intermediate
CA>s appear in
+ root.crt, the file must also contain certificate
+ chains to their root
CA>s. Certificate Revocation List
+ (CRL) entries
are also checked if the parameter is set.
(See
- Note that root.crt lists the top-level CAs that are
- considered trusted for signing client certificates. In principle it need
+ Note that the server's root.crt lists the top-level
+ CAs that are considered trusted for signing client certificates.
+ In principle it need
not list the CA that signed the server's certificate, though in most cases
that CA would also be trusted for client certificates.