You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ROOT/pages/backup-restore/online-backup.adoc
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -309,8 +309,9 @@ For more information on how to configure SSL in Neo4j, see xref:security/ssl-fra
309
309
310
310
Configuration for the backup server should be added to the _neo4j.conf_ file and configuration for backup client to the _neo4j-admin.conf_ file.
311
311
The easiest way to ensure compatibility is to use the same SSL policy configuration for both the server and the client.
312
-
However, this approach is not recommended for production environments, where it is better to use Certificate Authorities (CAs) to sign the certificates used by both the server and the client.
313
-
For details, see xref:security/ssl-framework.adoc[SSL framework].
312
+
For production environments, it is recommended to use Certificate Authorities (CAs) to sign certificates rather than self-signed certificates.
313
+
314
+
314
315
315
316
The default backup port is 6362, configured with key `server.backup.listen_address`.
316
317
The SSL configuration policy has the key of `dbms.ssl.policy.backup`.
@@ -323,7 +324,7 @@ As an example, add the following content to your _neo4j.conf_ and _neo4j-admin.c
Copy file name to clipboardExpand all lines: modules/ROOT/pages/security/ssl-framework.adoc
+18-12Lines changed: 18 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -846,15 +846,21 @@ However, if your backup communication uses a different port, you need to enable
846
846
847
847
When setting up SSL for backup communication, you can choose between two options for certificates:
848
848
849
-
* self-signed certificates -- This is typically the case where the system is fully internal (not internet-facing), you control both ends of the connection, and the distribution of certificates can be automated and secured.
850
-
* certificates signed by a certificate authority (CA) -- This is typically the case where at least one end of the connection is internet-facing, and you want to use certificates signed by a trusted CA to avoid security flaws associated with self-signed certificates.
849
+
* self-signed certificates -- This is typically the case where you control both ends of the connection, and the distribution of certificates can be automated and secured.
850
+
However, self-signed certificates do not verify the identity of the server, so they cannot be trusted by clients and are vulnerable to man-in-the-middle attacks.
851
+
* certificates signed by a certificate authority (CA) -- more secure option, because a known trusted authority verifies the identity of the server, ensuring authenticity and preventing impersonation.
851
852
852
-
There are three possible approaches to set up SSL for backup communication:
853
853
854
-
* Use the same self-signed certificates in the _trusted_dir_ on both the backup server and client.
855
-
* Mirror the self-signed certificates if you want mutual TLS.
856
-
This means, the server has the client's certificates in its _trusted_dir_, and the client has the server's certificates in its _trusted_dir_.
857
-
* Use a certificate authority (CA) to signs both the client's and server's certificates.
854
+
You can configure SSL for backup communication in one of the following ways:
855
+
856
+
* Use the same certificates in the _trusted_dir_ on both the backup server and client. +
857
+
This approach is simpler to configure but less secure, as both ends share the same identity and trust the same certificate.
858
+
859
+
* Mirror the certificates on the backup server and client to achieve mutual authentication. +
860
+
Add the server certificate to the client's _trusted_dir_ and the client certificate to the server's _trusted_dir_.
861
+
This way, the server validates the client's certificate in addition to the typical normal TLS where only the client validates the server's certificate.
862
+
863
+
* Use a certificate authority (CA) to sign both the client's and server's certificates.
858
864
In this case, the _trusted_dir_ must contain only the CA or intermediate certificates.
0 commit comments