OpenVox Server Configuration Files: ca.conf
The ca.conf file configures settings for the OpenVox Server Certificate Authority (CA) service. For an overview, see OpenVox Server Configuration.
Deprecation Note: The
authorization-requiredandclient-whitelistsettings are deprecated in favor of authorization that is configured in the newauth.conffile.
Signing settings
The allow-subject-alt-names setting in the certificate-authority section enables you to sign certs with subject alternative names. It is false by default for security reasons, but can be enabled if you need
to sign certs with subject alternative names. puppet cert sign used to allow this via a flag, but puppetserver ca sign requires it to be configured in the config file.
The allow-authorization-extensions setting in the certificate-authority section enables you to sign certs with authorization extensions. It is false by default for security reasons, but can be enabled if
you know you need to sign certs this way. puppet cert sign used to allow this via a flag, but puppetserver ca sign requires it to be configued in the config file.
Infrastructure CRL settings
OpenVox Server is able to create a separate CRL file containing only revocations of OpenVox infrastructure nodes. This behavior is turned off by default. To enable it, set certificate-authority.enable-infra-crl
to true.
Status settings (deprecated)
The certificate-status setting in ca.conf provides deprecated configuration options for access to the certificate_status and certificate_statuses HTTP endpoints. These endpoints allow certificates
to be signed, revoked, and deleted through HTTP requests, which provides full control over OpenVox’s ability to securely authorize access. Therefore, you should always restrict access to ca.conf.
The certificate-status setting takes two parameters: authorization-required and client-whitelist. If authorization-required is set to true or not set, and client-whitelist is set to an empty
list or not set, OpenVox Server uses the authorization methods and new auth.conf format to control access to the administration API endpoints.
authorization-requireddetermines whether a client certificate is required to access certificate status endpoints. If this parameter is set tofalse, all requests can access this API. If set totrue, only the clients whose certificate names are included in theclient-whitelistsetting can access the admin API. If this parameter is not specified but theclient-whitelistparameter is, this parameter’s value defaults totrue.client-whitelistcontains a list of client certificate names that are whitelisted for access to the certificate status endpoints. OpenVox Server denies access to requests at these endpoints that do not present a valid client certificate named in this list.
Example (Deprecated)
If you are using the deprecated authorization methods, follow this structure to configure certificate_status and certificate_statuses endpoint access in ca.conf, whitelisting a client named host1:
certificate-authority: {
# deprecated in favor of auth.conf
certificate-status: {
authorization-required: true
client-whitelist: [host1]
}
}