[ 
https://issues.apache.org/jira/browse/SOLR-14141?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17004590#comment-17004590
 ] 

Kevin Risden commented on SOLR-14141:
-------------------------------------

Looked over the changes. Looks good. The only minor change to the last patch 
I'd suggest is putting back these lines in the sh/cmd scripts.

{code:java}
# Override Key/Trust Store types if necessary
SOLR_SSL_KEY_STORE_TYPE=PKCS12
SOLR_SSL_TRUST_STORE_TYPE=PKCS12
{code}

I think these were there to show you could change the type of the 
keystore/truststore. 

> eliminate JKS keystore from solr SSL docs
> -----------------------------------------
>
>                 Key: SOLR-14141
>                 URL: https://issues.apache.org/jira/browse/SOLR-14141
>             Project: Solr
>          Issue Type: Improvement
>      Security Level: Public(Default Security Level. Issues are Public) 
>            Reporter: Robert Muir
>            Priority: Major
>         Attachments: SOLR-14141.patch, SOLR-14141.patch
>
>
> On the "Enabling SSL" page: 
> https://lucene.apache.org/solr/guide/8_3/enabling-ssl.html#enabling-ssl
> The first step is currently to create a JKS keystore. The next step 
> immediately converts the JKS keystore into PKCS12, so that openssl can then 
> be used to extract key material in PEM format for use with curl.
> Now that PKCS12 is java's default keystore format, why not omit step 1 
> entirely? What am I missing? PKCS12 is a more commonly 
> understood/standardized format.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org

Reply via email to