diff --git a/src/docbkx/x509-auth-provider.xml b/src/docbkx/x509-auth-provider.xml index f990db033a..2e72d34239 100644 --- a/src/docbkx/x509-auth-provider.xml +++ b/src/docbkx/x509-auth-provider.xml @@ -60,32 +60,33 @@ then the security context will remain empty. This means that you can easily use X.509 authentication with other options such as a form-based login. - - Configuring Tomcat - There are some pre-generated certificates in the Spring Security - samples/certificate directory which you can use to enable SSL. The file + + Setting up SSL in Tomcat + There are some pre-generated certificates in the + samples/certificate directory in the Spring Security project. + You can use these to enable SSL for testing if you don't want to generate your own. The file server.jks contains the server certificate, private key and the - issuing certificate authority. There are also some client certificate files for the users from the - sample applications. You can install these in your browser to enable SSL client authentication. + issuing certificate authority certificate. There are also some client certificate files + for the users from the sample applications. You can install these in your browser to enable + SSL client authentication. - To enable SSL in tomcat server.xml file looks like this + To run tomcat with SSL support, drop the server.jks file into the + tomcat conf directory and add the following connector to the + server.xml file - ]]> + ]]> clientAuth can also be set to want if you still want SSL connections to succeed even if the client doesn't provide a certificate. - Obviously these clients won't be able to access any objects secured by Spring Security - (unless you use a non-X509 authentication mechanism, such as BASIC authentication, to - authenticate the user) + Clients which don't present a certificate won't be able to access any objects secured by + Spring Security unless you use a non-X.509 authentication mechanism, such as form authentication. +