You are viewing a plain text version of this content. The canonical link for it is here.
Posted to server-dev@james.apache.org by "Karsten Otto (Jira)" <se...@james.apache.org> on 2021/11/16 09:45:00 UTC

[jira] [Updated] (JAMES-3672) TLS authentication via client certificate

     [ https://issues.apache.org/jira/browse/JAMES-3672?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Karsten Otto updated JAMES-3672:
--------------------------------
    Description: 
In order to limit access to trusted partners/users only, James should support TLS with certificate-based client authentication.

For this purpose, TLS configuration is extended with the desired authentication mode (none, optional, required), and the associated trust store to validate any received client certificates. Example:
{code:java}
<tls socketTLS="true" startTLS="false">
  <keystore>file://conf/keystore</keystore>
  <keystoreType>JKS</keystoreType>
  <secret>yoursecret</secret>

  <clientAuth required="true">
    <truststore>file://conf/truststore</truststore>
    <truststoreType>JKS</truststoreType>
    <truststoreSecret>yoursecret</truststoreSecret>
  </clientAuth>
</tls>{code}
This is implemented mostly in {{AbstractConfigurableAsyncServer}} and associated Netty infrastructure.

T-Shirt size M.

  was:
In order to limit access to trusted partners/users only, James should support TLS with certificate-based client authentication.

For this purpose, TLS configuration is extended with the desired authentication mode (none, optional, required), and the associated trust store to validate any received client certificates. Example:

 
{code:java}
<tls socketTLS="true" startTLS="false">
  <keystore>file://conf/keystore</keystore>
  <keystoreType>JKS</keystoreType>
  <secret>yoursecret</secret>

  <clientAuth required="true">
    <truststore>file://conf/truststore</truststore>
    <truststoreType>JKS</truststoreType>
    <truststoreSecret>yoursecret</truststoreSecret>
  </clientAuth>
</tls>{code}
 

 

This is implemented mostly in {{AbstractConfigurableAsyncServer}} and associated Netty infrastructure.

T-Shirt size M.


> TLS authentication via client certificate
> -----------------------------------------
>
>                 Key: JAMES-3672
>                 URL: https://issues.apache.org/jira/browse/JAMES-3672
>             Project: James Server
>          Issue Type: Improvement
>    Affects Versions: master
>            Reporter: Karsten Otto
>            Priority: Major
>
> In order to limit access to trusted partners/users only, James should support TLS with certificate-based client authentication.
> For this purpose, TLS configuration is extended with the desired authentication mode (none, optional, required), and the associated trust store to validate any received client certificates. Example:
> {code:java}
> <tls socketTLS="true" startTLS="false">
>   <keystore>file://conf/keystore</keystore>
>   <keystoreType>JKS</keystoreType>
>   <secret>yoursecret</secret>
>   <clientAuth required="true">
>     <truststore>file://conf/truststore</truststore>
>     <truststoreType>JKS</truststoreType>
>     <truststoreSecret>yoursecret</truststoreSecret>
>   </clientAuth>
> </tls>{code}
> This is implemented mostly in {{AbstractConfigurableAsyncServer}} and associated Netty infrastructure.
> T-Shirt size M.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

---------------------------------------------------------------------
To unsubscribe, e-mail: server-dev-unsubscribe@james.apache.org
For additional commands, e-mail: server-dev-help@james.apache.org