-
Notifications
You must be signed in to change notification settings - Fork 475
How to change Java security properties
Java security settings can be customized by overriding the default security properties. This is useful when enabling legacy protocols (e.g., TLS 1.0), modifying cryptographic algorithms, or adjusting security policies.
Warning: Re-enabling deprecated security features (e.g., TLS 1.0, weak ciphers) exposes your system to known vulnerabilities. Only do this if required for compatibility with legacy systems, and consider upgrading your security infrastructure instead.
-
Create a new file, e.g.,
java_custom.secure.properties
, to override default security settings. -
Modify the required security properties. For example, to enable
TLS 1.0
(which is disabled by default), removeTLSv1
fromjdk.tls.disabledAlgorithms
value:- Default setting (TLS 1.0 is disabled):
jdk.tls.disabledAlgorithms=SSLv3, TLSv1, TLSv1.1, DTLSv1.0, RC4, DES, \ MD5withRSA, DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \ ECDH
- Updated setting (TLS 1.0 is enabled):
jdk.tls.disabledAlgorithms=SSLv3, TLSv1.1, DTLSv1.0, RC4, DES, \ MD5withRSA, DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \ ECDH
You can modify other properties in the same way.
-
Map the file in the container.
-
Ensure the custom file is accessible inside the container where Java runs. In a Dockerized environment, map it to a known location.
-
Update your
docker-compose.yml
file with the following lines to place the file inside thecloudbeaver
container:
volumes: - ./java_custom.secure.properties:/location//java.secure.properties environment: - JAVA_OPTS="-Djava.security.properties=/location/with/java.secure.properties"
-
-
Restart the CloudBeaver to apply the changes.
- Getting started
- Create connection
- Connection network options
- Supported databases
-
Drivers management
- Database authentication methods
- Database navigator
- Properties editor
- Data editor
- SQL editor
-
Entity relation diagrams
- Cloud services
-
AI Smart assistance
- Data transfer
- General user guide
- Administration
- Server configuration
-
Server security and access configuration
- Authentication methods
- Access management
- Proxy configuration
-
Secret management
- Logs
-
Query manager
- Workspace location
- Command line parameters
-
Session manager
- Deployment options
- CloudBeaver Editions
- FAQ
- Development