-
Language:
English
-
Language:
English
Chapter 3. Reference
3.1. key-manager
attributes
You can configure a key-manager
by setting its attributes.
Table 3.1. key-manager attributes
Attribute | Description |
---|---|
algorithm |
The name of the algorithm to use to create the underlying |
alias-filter | A filter to apply to the aliases returned from the keystore. This can either be a comma-separated list of aliases to return or one of the following formats:
|
credential-reference |
The credential reference to decrypt keystore item. This can be specified in clear text or as a reference to a credential stored in a |
key-store |
Reference to the |
provider-name |
The name of the provider to use to create the underlying |
providers |
Reference to obtain the |
3.2. key-store
attributes
You can configure a key-store
by setting its attributes.
Table 3.2. key-store attributes
Attribute | Description |
---|---|
alias-filter | A filter to apply to the aliases returned from the keystore, can either be a comma separated list of aliases to return or one of the following formats:
Note
The |
credential-reference |
The password to use to access the keystore. This can be specified in clear text or as a reference to a credential stored in a |
path | The path to the keystore file. |
provider-name | The name of the provider to use to load the keystore. When you set this attribute, the search for the first provider that can create a key store of the specified type is disabled. |
providers | A reference to the providers that should be used to obtain the list of provider instances to search. If not specified, the global list of providers will be used instead. |
relative-to |
The base path this store is relative to. This can be a full path or a predefined path such as |
required |
If set to |
type |
The type of the key store, for example, Note The following key store types are automatically detected:
You must manually specify the other key store types. A full list of key store types can be found in Java Cryptography Architecture Standard Algorithm Name Documentation for JDK 11 in the Oracle JDK documentation. |
3.3. server-ssl-context
attributes
You can configure the server SSL context, server-ssl-context
, by setting its attributes.
Table 3.3. server-ssl-context
attributes
Attribute | Description |
---|---|
authentication-optional |
If |
cipher-suite-filter |
The filter to apply to specify the enabled cipher suites. This filter takes a list of items delimited by colons, commas, or spaces. Each item may be an OpenSSL-style cipher suite name, a standard SSL/TLS cipher suite name, or a keyword such as |
cipher-suite-names | The filter to apply to specify the enabled cipher suites for TLSv1.3. |
final-principal-transformer | A final principal transformer to apply for this mechanism realm. |
key-manager |
Reference to the key managers to use within the |
maximum-session-cache-size | The maximum number of SSL/TLS sessions to be cached. |
need-client-auth |
If set to |
post-realm-principal-transformer | A principal transformer to apply after the realm is selected. |
pre-realm-principal-transformer | A principal transformer to apply before the realm is selected. |
protocols | The enabled protocols. Allowed options are
This defaults to enabling Warning Use TLSv1.2, or TLSv1.3 instead of SSLv2, SSLv3, and TLSv1.0. Using SSLv2, SSLv3, or TLSv1.0 poses a security risk, therefore you must explicitly disable them. |
provider-name |
The name of the provider to use. If not specified, all providers from |
providers |
The name of the providers to obtain the |
realm-mapper | The realm mapper to be used for SSL/TLS authentication. |
security-domain | The security domain to use for authentication during SSL/TLS session establishment. |
session-timeout | The timeout for SSL sessions, in seconds.
The value
The value
The default value is |
trust-manager |
Reference to the |
use-cipher-suites-order |
If set to |
want-client-auth |
If set to |
wrap |
If |
The realm-mapper
and principal-transformer
attributes for server-ssl-context
apply only for the SASL EXTERNAL mechanism, where the certificate is verified by the trust manager. HTTP CLIENT-CERT authentication settings are configured in an http-authentication-factory
.
3.4. trust-manager
attributes
You can configure the trust manager, trust-manager
, by setting its attributes.
Table 3.4. trust-manager attributes
Attribute | Description |
---|---|
algorithm |
The name of the algorithm to use to create the underlying |
alias-filter | A filter to apply to the aliases returned from the key store. This can either be a comma-separated list of aliases to return or one of the following formats:
|
certificate-revocation-list |
Enables certificate revocation list checks in a trust manager. You can only define a single CRL path using this attribute. To define multiple CRL paths, use
|
certificate-revocation-lists |
Enables certificate revocation list checks in a trust manager using multiple certificate revocation lists. The attributes of
|
key-store |
Reference to the |
maximum-cert-path |
The maximum number of non-self-issued intermediate certificates that can exist in a certification path. The default value is
This attribute has been moved to Note
Define |
ocsp |
Enables online certificate status protocol (OCSP) checks in a trust manager. The attributes of
|
only-leaf-cert |
Check revocation status of only the leaf certificate. This is an optional attribute. The default values is |
provider-name |
The name of the provider to use to create the underlying |
providers |
Reference to obtain the providers to use when creating the underlying |