You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@lucene.apache.org by "Robert Muir (Jira)" <ji...@apache.org> on 2019/12/29 14:36:00 UTC

[jira] [Resolved] (SOLR-14141) eliminate JKS keystore from solr SSL docs

     [ https://issues.apache.org/jira/browse/SOLR-14141?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Robert Muir resolved SOLR-14141.
--------------------------------
      Assignee: Robert Muir
    Resolution: Fixed

> eliminate JKS keystore from solr SSL docs
> -----------------------------------------
>
>                 Key: SOLR-14141
>                 URL: https://issues.apache.org/jira/browse/SOLR-14141
>             Project: Solr
>          Issue Type: Improvement
>      Security Level: Public(Default Security Level. Issues are Public) 
>            Reporter: Robert Muir
>            Assignee: Robert Muir
>            Priority: Major
>             Fix For: 8.5
>
>         Attachments: SOLR-14141.patch, SOLR-14141.patch
>
>
> On the "Enabling SSL" page: https://lucene.apache.org/solr/guide/8_3/enabling-ssl.html#enabling-ssl
> The first step is currently to create a JKS keystore. The next step immediately converts the JKS keystore into PKCS12, so that openssl can then be used to extract key material in PEM format for use with curl.
> Now that PKCS12 is java's default keystore format, why not omit step 1 entirely? What am I missing? PKCS12 is a more commonly understood/standardized format.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscribe@lucene.apache.org
For additional commands, e-mail: issues-help@lucene.apache.org