tag::ssl-certificate[] Specifies the path for the PEM encoded certificate (or certificate chain) that is associated with the key.
+
This setting can be used only if ssl.key
is set.
end::ssl-certificate[]
tag::ssl-certificate-authorities[] List of paths to PEM encoded certificate files that should be trusted.
+
This setting and ssl.truststore.path
cannot be used at the same time.
end::ssl-certificate-authorities[]
tag::ssl-cipher-suites-values[]
Supported cipher suites vary depending on which version of Java you use. For
example, for version 12 the default value is TLS_AES_256_GCM_SHA384
,
TLS_AES_128_GCM_SHA256
, TLS_CHACHA20_POLY1305_SHA256
,
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
,
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
,
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
,
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
,
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
,
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
,
TLS_RSA_WITH_AES_256_GCM_SHA384
, TLS_RSA_WITH_AES_128_GCM_SHA256
,
TLS_RSA_WITH_AES_256_CBC_SHA256
, TLS_RSA_WITH_AES_128_CBC_SHA256
,
TLS_RSA_WITH_AES_256_CBC_SHA
, TLS_RSA_WITH_AES_128_CBC_SHA
.
+ For more information, see Oracle’s Java Cryptography Architecture documentation. end::ssl-cipher-suites-values[]
tag::ssl-cipher-suites-values-java11[]
Supported cipher suites vary depending on which version of Java you use. For
example, for version 11 the default value is TLS_AES_256_GCM_SHA384
,
TLS_AES_128_GCM_SHA256
, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
,
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
,
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
,
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
,
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
,
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
, TLS_RSA_WITH_AES_256_GCM_SHA384
,
TLS_RSA_WITH_AES_128_GCM_SHA256
, TLS_RSA_WITH_AES_256_CBC_SHA256
,
TLS_RSA_WITH_AES_128_CBC_SHA256
, TLS_RSA_WITH_AES_256_CBC_SHA
,
TLS_RSA_WITH_AES_128_CBC_SHA
.
+
Note
|
The default cipher suites list above includes TLSv1.3 ciphers and ciphers
that require the Java Cryptography Extension (JCE) Unlimited Strength
Jurisdiction Policy Files for 256-bit AES encryption. If TLSv1.3 is not
available, the TLSv1.3 ciphers TLS_AES_256_GCM_SHA384 and
TLS_AES_128_GCM_SHA256 are not included in the default list. If 256-bit AES is
unavailable, ciphers with AES_256 in their names are not included in the
default list. Finally, AES GCM has known performance issues in Java versions
prior to 11 and is included in the default list only when using Java 11 or above.
|
For more information, see Oracle’s Java Cryptography Architecture documentation.
end::ssl-cipher-suites-values-java11[]
tag::ssl-key-pem[] Path to a PEM encoded file containing the private key.
+
If HTTP client authentication is required, it uses this file. You cannot use
this setting and ssl.keystore.path
at the same time.
end::ssl-key-pem[]
tag::ssl-key-passphrase[] The passphrase that is used to decrypt the private key. Since the key might not be encrypted, this value is optional.
+
You cannot use this setting and ssl.secure_key_passphrase
at the same time.
end::ssl-key-passphrase[]
tag::ssl-keystore-key-password[] The password for the key in the keystore. The default is the keystore password.
+
You cannot use this setting and ssl.keystore.secure_password
at the same time.
end::ssl-keystore-key-password[]
tag::ssl-keystore-password[] The password for the keystore. end::ssl-keystore-password[]
tag::ssl-keystore-path[] The path for the keystore file that contains a private key and certificate.
+
It must be either a Java keystore (jks) or a PKCS#12 file. You cannot use this
setting and ssl.key
at the same time.
end::ssl-keystore-path[]
tag::ssl-keystore-secure-key-password[] The password for the key in the keystore. The default is the keystore password. end::ssl-keystore-secure-key-password[]
tag::ssl-keystore-secure-password[] The password for the keystore. end::ssl-keystore-secure-password[]
tag::ssl-keystore-type-pkcs12[]
The format of the keystore file. It must be either jks
or PKCS12
. If the
keystore path ends in ".p12", ".pfx", or ".pkcs12", this setting defaults
to PKCS12
. Otherwise, it defaults to jks
.
end::ssl-keystore-type-pkcs12[]
tag::ssl-secure-key-passphrase[] The passphrase that is used to decrypt the private key. Since the key might not be encrypted, this value is optional. end::ssl-secure-key-passphrase[]
tag::ssl-supported-protocols[]
Supported protocols with versions. Valid protocols: SSLv2Hello
,
SSLv3
, TLSv1
, TLSv1.1
, TLSv1.2
, TLSv1.3
. If the JVM’s SSL provider supports TLSv1.3,
the default is TLSv1.3,TLSv1.2,TLSv1.1
. Otherwise, the default is
TLSv1.2,TLSv1.1
.
+
Note
|
If xpack.security.fips_mode.enabled is true , you cannot use SSLv2Hello
or SSLv3 . See [fips-140-compliance].
|
end::ssl-supported-protocols[]
tag::ssl-truststore-password[] The password for the truststore.
+
You cannot use this setting and ssl.truststore.secure_password
at the same
time.
end::ssl-truststore-password[]
tag::ssl-truststore-path[] The path for the keystore that contains the certificates to trust. It must be either a Java keystore (jks) or a PKCS#12 file.
+
You cannot use this setting and ssl.certificate_authorities
at the same time.
end::ssl-truststore-path[]
tag::ssl-truststore-secure-password[] Password for the truststore. end::ssl-truststore-secure-password[]
tag::ssl-truststore-type[]
The format of the truststore file. It must be either jks
or PKCS12
. If the
file name ends in ".p12", ".pfx" or "pkcs12", the default is PKCS12
.
Otherwise, it defaults to jks
.
end::ssl-truststore-type[]
tag::ssl-truststore-type-pkcs11[]
The format of the truststore file. For the Java keystore format, use jks
. For
PKCS#12 files, use PKCS12
. For a PKCS#11 token, use PKCS11
. The default is
jks
.
end::ssl-truststore-type-pkcs11[]
tag::ssl-verification-mode-values[] Controls the verification of certificates.
+ Valid values are:
-
full
, which verifies that the provided certificate is signed by a trusted authority (CA) and also verifies that the server’s hostname (or IP address) matches the names identified within the certificate. -
certificate
, which verifies that the provided certificate is signed by a trusted authority (CA), but does not perform any hostname verification. -
none
, which performs no verification of the server’s certificate. This mode disables many of the security benefits of SSL/TLS and should only be used after very careful consideration. It is primarily intended as a temporary diagnostic mechanism when attempting to resolve TLS errors; its use on production clusters is strongly discouraged.The default value is
full
. end::ssl-verification-mode-values[]