Proxing to tomcat with httpd
example) ● mod_cluster (httpd dynamic load balancer) ● Undertow proxy (jboss servlet container) ● Ingress (in kubernetes, well Nginx or GCE) ● Traffic Server ● Nginx 10/12/22 13 Other protocols ● Jboss-remoting 10/12/22 21 Using TLS (1 httpd) httpd.conf SSLProxyEngine on SSLProxyCACertificateFile "/etc/pki/CA/cacert.pem" ProxyPass "/examples" "https://localhost:8443/examples" ProxyPassReverse "/examples"0 码力 | 26 页 | 242.80 KB | 1 年前3httpd 2.2.29 中文文档
Creating a Root-Level CA As noted earlier, each certificate requires an issuer to assert the validity of the identity of the certificate subject, up to the top-level Certificate Authority (CA). This presents called Server Gated Cryptography (SGC) and requires a Global ID server certificate, signed by a special CA certificate from Verisign. This enables strong encryption in 'export' versions of browsers, which traditionally your own CA certificate (ca.crt) and then verify the clients against this certificate. httpd.conf # require a client certificate which has to be directly # signed by our CA certificate in ca.crt SSLVerifyClient0 码力 | 1854 页 | 1.48 MB | 1 年前3httpd 2.2.27 中文文档
Creating a Root-Level CA As noted earlier, each certificate requires an issuer to assert the validity of the identity of the certificate subject, up to the top-level Certificate Authority (CA). This presents called Server Gated Cryptography (SGC) and requires a Global ID server certificate, signed by a special CA certificate from Verisign. This enables strong encryption in 'export' versions of browsers, which traditionally your own CA certificate (ca.crt) and then verify the clients against this certificate. httpd.conf # require a client certificate which has to be directly # signed by our CA certificate in ca.crt SSLVerifyClient0 码力 | 1849 页 | 1.47 MB | 1 年前3httpd 2.2.31 中文文档
Creating a Root-Level CA As noted earlier, each certificate requires an issuer to assert the validity of the identity of the certificate subject, up to the top-level Certificate Authority (CA). This presents called Server Gated Cryptography (SGC) and requires a Global ID server certificate, signed by a special CA certificate from Verisign. This enables strong encryption in 'export' versions of browsers, which traditionally your own CA certificate (ca.crt) and then verify the clients against this certificate. httpd.conf # require a client certificate which has to be directly # signed by our CA certificate in ca.crt SSLVerifyClient0 码力 | 1860 页 | 1.48 MB | 1 年前3httpd 2.2.27.dev 中文文档
Creating a Root-Level CA As noted earlier, each certificate requires an issuer to assert the validity of the identity of the certificate subject, up to the top-level Certificate Authority (CA). This presents called Server Gated Cryptography (SGC) and requires a Global ID server certificate, signed by a special CA certificate from Verisign. This enables strong encryption in 'export' versions of browsers, which traditionally your own CA certificate (ca.crt) and then verify the clients against this certificate. httpd.conf # require a client certificate which has to be directly # signed by our CA certificate in ca.crt SSLVerifyClient0 码力 | 1849 页 | 1.47 MB | 1 年前3Apache HTTP Server Documentation Version 2.2
Creating a Root-Level CA As noted earlier, each certificate requires an issuer to assert the validity of the identity of the certificate subject, up to the top-level Certificate Authority (CA). This presents called Server Gated Cryptography (SGC) and requires a Global ID server certificate, signed by a special CA certificate from Verisign. This enables strong encryption in ’export’ versions of browsers, which traditionally your own CA certificate (ca.crt) and then verify the clients against this certificate. httpd.conf # require a client certificate which has to be directly # signed by our CA certificate in ca.crt SSLVerifyClient0 码力 | 805 页 | 2.51 MB | 1 年前3httpd 2.2.32 中文文档
Creating a Root-Level CA As noted earlier, each certificate requires an issuer to assert the validity of the identity of the certificate subject, up to the top-level Certificate Authority (CA). This presents called Server Gated Cryptography (SGC) and requires a Global ID server certificate, signed by a special CA certificate from Verisign. This enables strong encryption in 'export' versions of browsers, which traditionally your own CA certificate (ca.crt) and then verify the clients against this certificate. httpd.conf # require a client certificate which has to be directly # signed by our CA certificate in ca.crt SSLVerifyClient0 码力 | 1866 页 | 1.48 MB | 1 年前3Apache HTTP Server Documentation Version 2.4
Creating a Root-Level CA As noted earlier, each certificate requires an issuer to assert the validity of the identity of the certificate subject, up to the top-level Certificate Authority (CA). This presents signed by your own CA certificate (ca.crt) and then verify the clients against this certificate. # require a client certificate which has to be directly # signed by our CA certificate in ca.crt SSLVerifyClient SSLVerifyClient require SSLVerifyDepth 1 SSLCACertificateFile conf/ssl.crt/ca.crt How can I force clients to authenticate using certificates for a particular URL, but still allow arbitrary clients to access the0 码力 | 1031 页 | 3.23 MB | 1 年前3httpd 2.4.23 中文文档
Creating a Root-Level CA As noted earlier, each certificate requires an issuer to assert the validity of the identity of the certificate subject, up to the top-level Certificate Authority (CA). This presents signed by your own CA certificate (ca.crt) and then verify the clients against this certificate. # require a client certificate which has to be directly # signed by our CA certificate in ca.crt SSLVerifyClient SSLVerifyClient require SSLVerifyDepth 1 SSLCACertificateFile "conf/ssl.crt/ca.crt" How can I force clients to authenticate using certificates for a particular URL, but still allow arbitrary clients to access0 码力 | 2559 页 | 2.11 MB | 1 年前3httpd 2.4.9 中文文档
Creating a Root-Level CA As noted earlier, each certificate requires an issuer to assert the validity of the identity of the certificate subject, up to the top-level Certificate Authority (CA). This presents signed by your own CA certificate (ca.crt) and then verify the clients against this certificate. # require a client certificate which has to be directly # signed by our CA certificate in ca.crt SSLVerifyClient SSLVerifyClient require SSLVerifyDepth 1 SSLCACertificateFile conf/ssl.crt/ca.crt How can I force clients to authenticate using certificates for a particular URL, but still allow arbitrary clients to access the0 码力 | 2398 页 | 1.84 MB | 1 年前3
共 24 条
- 1
- 2
- 3