Commit
a445cb92ef5b3a31313ebce30e18cc1d6e0bdecb removed the default file
names for server-side CRL and CA files, but left them in the docs with a
small note. This removes the note and the previous default names to
clarify, as well as changes mentions of the file names to make it
clearer that they are configurable.
Author: Daniel Gustafsson
Reviewed-by: Michael Paquier
The default is empty, meaning no CA file is loaded,
and client certificate verification is not performed.
- In previous releases of PostgreSQL, the name of this file was
- hard-coded as root.crt.
-
file or on the server command line.
The default is empty, meaning no CRL file is loaded.
- In previous releases of PostgreSQL, the name of this file was
- hard-coded as root.crl.
-
certificate of the signing authority to the postgresql.crt>
file, then its parent authority's certificate, and so on up to a certificate
authority, root> or intermediate>, that is trusted by
- the server, i.e. signed by a certificate in the server's
- root.crt file.
+ the server, i.e. signed by a certificate in the server's root CA file
+ ().
To require the client to supply a trusted certificate, place
certificates of the certificate authorities (
CAs)
- you trust in the file root.crt in the data
+ you trust in a file named root.crt in the data
directory, set the parameter in
postgresql.conf to root.crt,
and add the authentication option clientcert=1 to the
summarizes the files that are
relevant to the SSL setup on the server. (The shown file names are default
- or typical names. The locally configured names could be different.)
+ names. The locally configured names could be different.)
|
- ($PGDATA/root.crt>)
+
trusted certificate authorities
checks that client certificate is
signed by a trusted certificate authority
|
- ($PGDATA/root.crl>)
+
certificates revoked by certificate authorities
client certificate must not be on this list
This function is really useful only if you have more than one trusted CA
- certificate in your server's root.crt> file, or if this CA
+ certificate in your server's certificate authority file, or if this CA
has issued some intermediate certificate authority certificates.