@@ -2189,20 +2189,23 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
2189
2189
<sect2 id="ssl-client-certificates">
2190
2190
<title>Using Client Certificates</title>
2191
2191
2192
- <para>
2192
+ <para>
2193
2193
To require the client to supply a trusted certificate, place
2194
2194
certificates of the certificate authorities (<acronym>CA</acronym>s)
2195
2195
you trust in the file <filename>root.crt</filename> in the data
2196
2196
directory, set the parameter <xref linkend="guc-ssl-ca-file"> in
2197
2197
<filename>postgresql.conf</filename> to <literal>root.crt</literal>,
2198
- and set the <literal>clientcert</literal> parameter
2199
- to 1 on the appropriate <literal>hostssl</> line(s) in
2200
- <filename>pg_hba.conf</>.
2198
+ and add the authentication option <literal>clientcert=1</literal> to the
2199
+ appropriate <literal>hostssl</> line(s) in <filename>pg_hba.conf</>.
2201
2200
A certificate will then be requested from the client during
2202
2201
SSL connection startup. (See <xref linkend="libpq-ssl"> for a
2203
2202
description of how to set up certificates on the client.) The server will
2204
2203
verify that the client's certificate is signed by one of the trusted
2205
- certificate authorities. If intermediate <acronym>CA</>s appear in
2204
+ certificate authorities.
2205
+ </para>
2206
+
2207
+ <para>
2208
+ If intermediate <acronym>CA</>s appear in
2206
2209
<filename>root.crt</filename>, the file must also contain certificate
2207
2210
chains to their root <acronym>CA</>s. Certificate Revocation List
2208
2211
(CRL) entries
@@ -2214,12 +2217,12 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
2214
2217
</para>
2215
2218
2216
2219
<para>
2217
- The <literal>clientcert</literal> option in <filename>pg_hba.conf</> is
2218
- available for all authentication methods, but only for rows specified as
2219
- <literal>hostssl</>. When <literal>clientcert</literal> is not specified
2220
- or is set to 0, the server will still verify presented client
2221
- certificates against its CA list , if one is configured,
2222
- — but it will not insist that a client certificate be presented.
2220
+ The <literal>clientcert</literal> authentication option is available for
2221
+ all authentication methods, but only in <filename>pg_hba.conf</> lines
2222
+ specified as <literal>hostssl</>. When <literal>clientcert</literal> is
2223
+ not specified or is set to 0, the server will still verify any presented
2224
+ client certificates against its CA file , if one is configured — but
2225
+ it will not insist that a client certificate be presented.
2223
2226
</para>
2224
2227
2225
2228
<para>
@@ -2234,7 +2237,9 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
2234
2237
If you are setting up client certificates, you may wish to use
2235
2238
the <literal>cert</> authentication method, so that the certificates
2236
2239
control user authentication as well as providing connection security.
2237
- See <xref linkend="auth-cert"> for details.
2240
+ See <xref linkend="auth-cert"> for details. (It is not necessary to
2241
+ specify <literal>clientcert=1</literal> explicitly when using
2242
+ the <literal>cert</> authentication method.)
2238
2243
</para>
2239
2244
</sect2>
2240
2245
0 commit comments