http://tomcat.apache.org/tomcat-6.0-doc/config/http.html
Attribute
Description
algorithm |
The certificate encoding algorithm to be used. This defaults toKeyManagerFactory.getDefaultAlgorithm() which returns SunX509 for Sun JVMs. IBM JVMs return IbmX509 . For other vendors, consult the JVM documentation for the default value.
|
clientAuth |
Set to true if you want the SSL stack to require a valid certificate chain from the client before accepting a connection. Set to want if you want the SSL stack to request a client Certificate, but not fail if one isn't presented. A false value (which is the default) will not require a certificate chain unless the client requests a resource protected by a security constraint that uses CLIENT-CERT authentication. See theSSL HowTo for an example.
|
clientCertProvider |
When client certificate information is presented in a form other than instances ofjava.security.cert.X509Certificate it needs to be converted before it can be used and this property controls which JSSE provider is used to perform the conversion. For example it is used with the AJP connectors, the HTTP APR connector and with the org.apache.catalina.valves.SSLValve. If not specified, the default provider will be used.
|
keystoreFile |
The pathname of the keystore file where you have stored the server certificate to be loaded. By default, the pathname is the file ".keystore " in the operating system home directory of the user that is running Tomcat. If your keystoreType doesn't need a file use "" (empty string) for this parameter.
|
keystorePass |
The password used to access the server certificate from the specified keystore file. The default value is "changeit ".
|
keystoreType |
The type of keystore file to be used for the server certificate. If not specified, the default value is "JKS ".
|
keystoreProvider |
The name of the keystore provider to be used for the server certificate. If not specified, the list of registered providers is traversed in preference order and the first provider that supports thekeystoreType is used.
|
sslProtocol |
The version of the SSL protocol to use. If not specified, the default is "TLS ".
|
ciphers |
The comma separated list of encryption ciphers that this socket is allowed to use. By default, the default ciphers for the JVM will be used. Note that this usually means that the weak export grade ciphers will be included in the list of available ciphers. The ciphers are specified using the JSSE cipher naming convention.
|
keyAlias |
The alias used to for the server certificate in the keystore. If not specified the first key read in the keystore will be used.
|
trustManagerClassName |
The name of a custom trust manager class to use to validate client certificates. The class must have a zero argument constructor and must also implement javax.net.ssl.X509TrustManager . If this attribute is set, the trust store attributes may be ignored.
|
truststoreFile |
The trust store file to use to validate client certificates. The default is the value of thejavax.net.ssl.trustStore system property. If neither this attribute nor the default system property is set, no trust store will be configured.
|
truststorePass |
The password to access the trust store. The default is the value of thejavax.net.ssl.trustStorePassword system property. If that property is null, the value ofkeystorePass is used as the default. If an invalid trust store password is specified, a warning will be logged and an attempt will be made to access the trust store without a password which will skip validation of the trust store contents. If the trust store password is defined as "" then no password will be used to access the store which will also skip validation of the trust store contents.
|
truststoreType |
The type of key store used for the trust store. The default is the value of thejavax.net.ssl.trustStoreType system property. If that property is null, the value ofkeystoreType is used as the default.
|
truststoreProvider |
The name of the truststore provider to be used for the server certificate. The default is the value of thejavax.net.ssl.trustStoreProvider system property. If that property is null, the value ofkeystoreProvider is used as the default. If neither this attribute, the default system property norkeystoreProvider is set, the list of registered providers is traversed in preference order and the first provider that supports the truststoreType is used.
|
sessionCacheSize |
The number of SSL sessions to maintain in the session cache. Use 0 to specify an unlimited cache size. If not specified, a default of 0 is used.
|
sessionTimeout |
The time, in seconds, after the creation of an SSL session that it will timeout. Use 0 to specify an unlimited timeout. If not specified, a default of 86400 (24 hours) is used.
|
crlFile |
The certificate revocation list file to use to validate client certificates.
|
allowUnsafeLegacyRenegotiation |
Is unsafe legacy TLS renegotiation allowed which is likely to expose users to CVE-2009-3555, a man-in-the-middle vulnerability in the TLS protocol that allows an attacker to inject arbitrary data into the user's request. If not specified, a default of false is used. This attribute only has an effect if the JVM does not support RFC 5746 as indicated by the presence of the pseudo-ciphersuite TLS_EMPTY_RENEGOTIATION_INFO_SCSV. This is available JRE/JDK 6 update 22 onwards. Where RFC 5746 is supported the renegotiation - including support for unsafe legacy renegotiation - is controlled by the JVM configuration.
|
分享到:
相关推荐
mysql-connector-java-8.0.11 MySQL Server 8.0 Loading class `...
对于 Tomcat 服务器来说,配置 SSL 通常涉及修改 `conf/server.xml` 文件中的 `<Connector>` 元素。以下是一个示例配置: ```xml <Connector port="8443" protocol="org.apache.coyote.http11.Http11NioProtocol" ...
Jboss和Tomcat都是流行的Java应用服务器,它们都支持SSL配置以启用HTTPS协议。 在Jboss和Tomcat服务器上配置SSL的过程主要包括以下几个步骤: 1. **生成证书**: - 对于测试或内部环境,可以使用Java自带的`...
3. **SSL/TLS Support**:提供安全的加密连接,保护数据在传输过程中的安全。 4. **Authentication Plugins**:支持多种认证插件,包括SHA256密码散列,增强了账户安全。 5. **Performance Enhancements**:包括多...
8. **SSL加密**: 提供安全的网络连接,保护数据传输过程中的隐私和安全。 9. **存储过程调用**: 支持执行MySQL的存储过程,实现更复杂的业务逻辑。 10. **Error and Exception Handling**: 提供详细的错误信息,帮助...
* Supports HTTPS (HTTP over SSL) * Supports SMTPS (SMTP over SSL) and SMTP-STARTTLS * Supports POPS (POP over SSL) Scalability * Fully multi-threaded design with per-request Resource instances to...
3. **HTTPS Connector配置**:在`server.xml`文件中添加HTTPS Connector配置,使得Tomcat能够处理HTTPS请求。这对于CAS单点登录功能而言至关重要。 4. **CAS服务器配置修改**:通过修改`deployerConfigContext.xml`...
- 错误仅在使用Connector/NET(MySQL ADO.NET Driver)时出现,而不涉及JDBC驱动。 - 多台应用服务器中,只有一台报错,表明问题可能出在特定客户端或配置上。 - 错误出现具有随机性,重启服务器或IIS可暂时解决...
- 编辑Tomcat的`conf/server.xml`,添加一个使用SSL的Connector配置,如下: ```xml <Connector port="8443" maxHttpHeaderSize="8192" maxThreads="150" minSpareThreads="25" maxSpareThreads="75" ...
| SSL Support | Java SSL | Java SSL | OpenSSL | | SSL Handshake | Blocking | Non blocking | Blocking | | Max Connections | maxConnections | maxConnections | maxConnections | 从上表可以看到,三个模式...
<Connector acceptCount="100" clientAuth="false" disableUploadTimeout="true" enableLookups="false" maxHttpHeaderSize="8192" maxSpareThreads="75" maxThreads="150" minSpareThreads="25" port="8443" scheme...
10. **安全性**:支持SSL/TLS加密,可以配置证书进行安全的HTTPS通信。此外,还可以配置角色和权限,实现基于角色的访问控制。 要使用"apache-tomcat-7.0.47.rar",你需要先下载并解压缩文件,找到bin目录下的`...
7. **Security**:Tomcat 7.0.59增强了安全特性,包括加强了对SSL/TLS的支持,以及对跨站脚本攻击(XSS)和跨站请求伪造(CSRF)的防护。 8. **Logging**:提供详细的日志记录,帮助开发者调试和监控应用性能。 9....
- 将签名后的证书导入Tomcat的`server.xml`配置文件中的`<Connector>`标签,设置`keystoreFile`和`keystorePass`属性,以启用SSL连接。 3. **CAS客户端配置**: - CAS客户端通常是你需要保护的应用程序。在你的...
1. **NIO2 Connector**:除了原有的BIO和NIO连接器,8.5版本添加了NIO2连接器,它提供了异步I/O的能力,可以提高服务器处理大量并发请求的能力。 2. **WebSocket Support**:Tomcat 8.5增加了对WebSocket协议的支持...
MySQL的驱动文件一般称为mysql-connector-java.jar,同样遵循JDBC标准,使得Java开发者可以通过编写SQL语句来操作MySQL数据库。2017年的驱动可能支持最新的MySQL 5.x或6.x版本,提供SSL加密连接和更好的兼容性。 ...
安全方面,Tomcat提供了SSL/TLS支持,可以通过修改`server.xml`中的`Connector`元素配置,启用HTTPS。同时,还可以通过`context.xml`配置访问控制和角色权限。 除此之外,Tomcat与开发工具如Eclipse、IntelliJ IDEA...
1. `cas-server-support-jdbc-4.0.0.jar`:这是CAS服务器的一个扩展模块,专门用于支持使用数据库(如MySQL)进行身份验证。这个版本4.0.0的JAR文件包含所有必要的类和库,使得CAS可以与数据库进行交互,存储和检索...
“librarybook-data-storage.pdf”可能讨论数据库连接库,如SQLite(sqlite3模块)、MySQL(pymysql或mysql-connector-python)或NoSQL数据库如MongoDB(pymongo)。 7. **邮件和新闻消息处理**: “librarybook-...