-
Notifications
You must be signed in to change notification settings - Fork 136
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
document that Security.WellKnownIssuers.Admin
was added and Security.WellKnownIssuerHashes.Admin
is obsolete
#1815
Open
reebhub
wants to merge
1
commit into
ravendb:master
Choose a base branch
from
reebhub:RDoc-2584_configOption
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
250 changes: 250 additions & 0 deletions
250
.../Raven.Documentation.Pages/server/configuration/security-configuration.markdown
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,250 @@ | ||
# Configuration: Security | ||
|
||
The following configuration values allow you to control the desired level of security in a RavenDB server. For a more detailed explanation, please visit the [Security Section](../security/overview). | ||
|
||
{PANEL:Security.Certificate.Path} | ||
|
||
The path to .pfx certificate file. If specified, RavenDB will use HTTPS/SSL for all network activities. | ||
Certificate setting priority order: | ||
1. Path | ||
2. Executable | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.Password} | ||
|
||
The (optional) password of the .pfx certificate file. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.Exec} | ||
|
||
Deprecated in 4.2 and replaced with [Security.Certificate.Load.Exec](../../server/configuration/security-configuration#security.certificate.load.exec), see below. | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.Exec.Arguments} | ||
|
||
Deprecated in 4.2 and replaced with [Security.Certificate.Load.Exec.Arguments](../../server/configuration/security-configuration#security.certificate.load.exec.arguments), see below. | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.Load.Exec} | ||
|
||
A command or executable that provides the .pfx cluster certificate when invoked by RavenDB. If specified, RavenDB will use HTTPS/SSL for all network activities. | ||
The `Security.Certificate.Path` setting takes precedence over this executable. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.Renew.Exec} | ||
|
||
A command or executable that handles automatic cluster certificate renewals and passes the renewed .pfx certificate to the rest of the cluster. The | ||
[leader node](../../server/clustering/rachis/cluster-topology#leader) will invoke this executable once every hour and if a new certificate is received, it | ||
will be sent to the other nodes. The executable specified in `Security.Certificate.Change.Exec` will then be used to persist the certificate across the cluster. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.Change.Exec} | ||
|
||
A command or executable that replaces the old cluster certificate with the renewed cluster certificate. After `Security.Certificate.Change.Exec` distibutes the | ||
new certificate, this executable persists it locally at each follower node. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.Load.Exec.Arguments} | ||
|
||
The command line arguments for the 'Security.Certificate.Load.Exec' command or executable. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.Renew.Exec.Arguments} | ||
|
||
The command line arguments for the 'Security.Certificate.Renew.Exec' command or executable. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.Change.Exec.Arguments} | ||
|
||
The command line arguments for the 'Security.Certificate.Change.Exec' command or executable. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.Exec.TimeoutInSec} | ||
|
||
The number of seconds to wait for the certificate executables to exit. | ||
Applies to: `Security.Certificate.Load.Exec`, `Security.Certificate.Renew.Exec`, and `Security.Certificate.Change.Exec`. | ||
|
||
- **Type**: `int` | ||
- **Default**: `30` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.Certificate.LetsEncrypt.Email} | ||
|
||
The E-mail address associated with the Let's Encrypt certificate. Used for renewal requests. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.MasterKey.Path} | ||
|
||
The path of the (256-bit) Master Key. If specified, RavenDB will use this key to protect secrets. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.MasterKey.Exec} | ||
|
||
A command or executable to run which will provide a (256-bit) Master Key, If specified, RavenDB will use this key to protect secrets. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.MasterKey.Exec.Arguments} | ||
|
||
The command line arguments for the 'Security.MasterKey.Exec' command or executable. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.MasterKey.Exec.TimeoutInSec} | ||
|
||
The number of seconds to wait for the Master Key executable to exit. | ||
|
||
- **Type**: `int` | ||
- **Default**: `30` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.UnsecuredAccessAllowed} | ||
|
||
If authentication is disabled, set the address range type for which server access is unsecured (`None | Local | PrivateNetwork | PublicNetwork`). | ||
|
||
- **Type**: `flags` | ||
- **Default**: `Local` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.DoNotConsiderMemoryLockFailureAsCatastrophicError} | ||
|
||
Determines whether RavenDB will consider memory lock error to be catastrophic. This is used with encrypted databases to ensure that temporary buffers are never written to disk and are locked to memory. Setting this to true is not recommended and should be done only after a proper security analysis has been performed. | ||
|
||
- **Type**: `bool` | ||
- **Default**: `false` | ||
- **Scope**: Server-wide or per database | ||
|
||
{WARNING Use with caution. /} | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.DisableHttpsRedirection} | ||
|
||
Disable automatic redirection when listening to HTTPS. By default, when using port 443, RavenDB redirects all incoming HTTP traffic on port 80 to HTTPS on port 443. | ||
|
||
- **Type**: `bool` | ||
- **Default**: `false` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.AuditLog.FolderPath} | ||
|
||
The path to a folder where RavenDB will store the access audit logs. | ||
|
||
- **Type**: `string` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.AuditLog.RetentionTimeInHours} | ||
|
||
How far back we should retain audit log entries. | ||
|
||
- **Type**: `int` | ||
- **Default**: `365 * 24` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.WellKnownCertificates.Admin} | ||
|
||
Allow to specify well known certificate thumbprints that will be trusted by the server as cluster admins. | ||
|
||
- **Type**: `strings seperated by ;` | ||
- **Example**: `297430d6d2ce259772e4eccf97863a4dfe6b048c;e6a3b45b062d509b3382282d196efe97d5956ccb` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.WellKnownIssuers.Admin} | ||
|
||
Provide a well-known issuer **certificate in base 64 format** or a certificate **file path**, | ||
that will be used to validate a new client certificate when the issuer's certificate has changed. | ||
|
||
- **Type**: `string[]` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} | ||
|
||
{PANEL:Security.TlsCipherSuites} | ||
|
||
{DANGER: For experts, use with caution} | ||
Defines a list of supported TLS Cipher Suites. Values must be semicolon separated. | ||
{DANGER/} | ||
|
||
- **Type**: `TlsCipherSuite[]` | ||
- **Example**: `TLS_RSA_WITH_RC4_128_MD5;TLS_RSA_WITH_RC4_128_SHA` | ||
- **Default**: `null` | ||
- **Scope**: Server-wide only | ||
|
||
{PANEL/} |
Binary file added
BIN
+16.1 KB
...ion.Pages/server/security/authentication/images/export_cluster_certificates.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+12.9 KB
...tation.Pages/server/security/authentication/images/renew_server_certificate.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+6.65 KB
...ation.Pages/server/security/authentication/images/upload-client-certificate.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Type:
strings seperated by ;
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done