-
Notifications
You must be signed in to change notification settings - Fork 7.7k
Update docs to include PostgreSQL SSL certificate #43313
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Closes keycloak#43311 Signed-off-by: Pedro Ruivo <1492066+pruivo@users.noreply.github.com>
@ahus1 @ryanemerson, when you get a chance, please review. Thank you. |
Signed-off-by: Pedro Ruivo <1492066+pruivo@users.noreply.github.com>
<3> Specify the URL to your custom {project_name} image. If your image is optimized, set the `startOptimized` flag to `true`. | ||
<4> Enable additional features for multi-cluster support like the loadbalancer probe `/lb-check`. | ||
<5> To be able to analyze the system under load, enable the metrics endpoint. | ||
<6> Specify the `ConfigMap` name with the Amazon Aurora PostgreSQL database certificate bundle. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/with/that contains/
include::../examples/generated/keycloak.yaml[tag=keycloak] | ||
---- | ||
<1> The database connection pool initial, max and min size should be identical to allow statement caching for the database. | ||
<1> Secure database connection with `sslmode=verify-full` and `sslrootcert`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"Secure the database connection with the sslmode=verify-full
and sslrootcert
properties."
docs/guides/server/db.adoc
Outdated
Secure the connection by adding the following properties to your connection URL: | ||
* `sslmode=verify-full`: Forces TLS and verifies the server's identity against the trusted certificate. | ||
* `sslrootcert=/path/to/certificate`: The path to the server's public certificate file on the client machine. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nitpick, but should the explanation come after the example source? Same applies to the Aurora section.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for the PR. Please also update deploy-keycloak.adoc
which contains the docs for the single-cluster setup.
docs/guides/server/db.adoc
Outdated
[TIP] | ||
.Secure Your PostgreSQL Connection | ||
==== | ||
To achieve the highest level of security, you must configure your PostgreSQL server to use TLS and perform full server certificate verification from the client. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There might be other options that some people might consider more secure, like for example mTLS. So I suggest a rephrase:
To achieve the highest level of security, you must configure your PostgreSQL server to use TLS and perform full server certificate verification from the client. | |
To secure your database connection, configure your PostgreSQL server to use TLS and perform full server certificate verification on the client side. |
docs/guides/server/db.adoc
Outdated
[TIP] | ||
.Secure Your Aurora PostgreSQL Connection | ||
==== | ||
Amazon Aurora PostgreSQL **17.0+** enables TLS by default. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Amazon Aurora PostgreSQL **17.0+** enables TLS by default. | |
Amazon Aurora PostgreSQL 17.0 or later requires TLS connections by default. |
docs/guides/server/db.adoc
Outdated
==== | ||
Amazon Aurora PostgreSQL **17.0+** enables TLS by default. | ||
While this secures the connection, for the **highest level of security**, you must perform full server certificate verification. To do this: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
While this secures the connection, for the **highest level of security**, you must perform full server certificate verification. To do this: | |
While this encrypts the connection, you must still perform a full server certificate verification. To do this, perform the following steps: |
@ahus1 @ryanemerson updated. Thank you |
Closes #43311
The examples were regenerated from the Keycloak Benchmark repository.