Skip to content

Commit 2286c8f

Browse files
Add a tip about needing server and client usage in intra-cluster TLS certificates (#1688)
Servers act as both servers and clients, and will complain if they only have one of the modes
1 parent cafac50 commit 2286c8f

File tree

2 files changed

+37
-0
lines changed

2 files changed

+37
-0
lines changed

modules/ROOT/pages/clustering/setup/encryption.adoc

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,25 @@ The generation of xref:security/ssl-framework.adoc#term-ssl-cryptographic-object
3939
It generally requires having a PKI with a xref:security/ssl-framework.adoc#term-ssl-certificate-authority[Certificate Authority (CA)] within the organization and they should be able to advise here.
4040
Note that the information in this manual relating to the PKI is mainly for illustrative purposes.
4141

42+
[TIP]
43+
====
44+
If setting up intra-cluster encryption as part of a cluster configuration, ensure that the certificates used on the cluster endpoint support server and client usage.
45+
This is because when connecting between the Neo4j servers for clustering, each server uses its own certificate to authenticate as a client on the connection to another server.
46+
47+
This could be verified from within the certificate details:
48+
49+
----
50+
openssl x509 -in public.crt -noout -text
51+
----
52+
We should see that the X509v3 Extended Key Usage section shows both the usages listed:
53+
54+
----
55+
X509v3 Extended Key Usage:
56+
TLS Web Server Authentication, TLS Web Client Authentication
57+
----
58+
====
59+
60+
4261
When the certificates and private keys are obtained they can be installed on each of the servers.
4362
Each server has a certificate of its own, signed by a CA, and the corresponding private key.
4463
The certificate of the CA is installed into the `trusted` directory, and any certificate signed by the CA is thus trusted.

modules/ROOT/pages/security/ssl-framework.adoc

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,24 @@ If the same certificates are used across all instances of the cluster, make sure
100100
Multi-host and wildcard certificates are also supported.
101101
====
102102

103+
[TIP]
104+
====
105+
If setting up intra-cluster encryption as part of a cluster configuration, ensure that the certificates used on the cluster endpoint support server and client usage.
106+
This is because when connecting between the Neo4j servers for clustering, each server uses its own certificate to authenticate as a client on the connection to another server.
107+
108+
This could be verified from within the certificate details:
109+
110+
----
111+
openssl x509 -in public.crt -noout -text
112+
----
113+
We should see that the X509v3 Extended Key Usage section shows both the usages listed:
114+
115+
----
116+
X509v3 Extended Key Usage:
117+
TLS Web Server Authentication, TLS Web Client Authentication
118+
----
119+
====
120+
103121
==== Transformations
104122

105123
Neo4j requires all SSL certificates to be in the `PEM` format.

0 commit comments

Comments
 (0)