@@ -2189,20 +2189,23 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
21892189 <sect2 id="ssl-client-certificates">
21902190 <title>Using Client Certificates</title>
21912191
2192- <para>
2192+ <para>
21932193 To require the client to supply a trusted certificate, place
21942194 certificates of the certificate authorities (<acronym>CA</acronym>s)
21952195 you trust in the file <filename>root.crt</filename> in the data
21962196 directory, set the parameter <xref linkend="guc-ssl-ca-file"> in
21972197 <filename>postgresql.conf</filename> to <literal>root.crt</literal>,
2198- and set the <literal>clientcert</literal> parameter
2199- to 1 on the appropriate <literal>hostssl</> line(s) in
2200- <filename>pg_hba.conf</>.
2198+ and add the authentication option <literal>clientcert=1</literal> to the
2199+ appropriate <literal>hostssl</> line(s) in <filename>pg_hba.conf</>.
22012200 A certificate will then be requested from the client during
22022201 SSL connection startup. (See <xref linkend="libpq-ssl"> for a
22032202 description of how to set up certificates on the client.) The server will
22042203 verify that the client's certificate is signed by one of the trusted
2205- certificate authorities. If intermediate <acronym>CA</>s appear in
2204+ certificate authorities.
2205+ </para>
2206+
2207+ <para>
2208+ If intermediate <acronym>CA</>s appear in
22062209 <filename>root.crt</filename>, the file must also contain certificate
22072210 chains to their root <acronym>CA</>s. Certificate Revocation List
22082211 (CRL) entries
@@ -2214,12 +2217,12 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
22142217 </para>
22152218
22162219 <para>
2217- The <literal>clientcert</literal> option in <filename>pg_hba.conf</> is
2218- available for all authentication methods, but only for rows specified as
2219- <literal>hostssl</>. When <literal>clientcert</literal> is not specified
2220- or is set to 0, the server will still verify presented client
2221- certificates against its CA list , if one is configured,
2222- — but it will not insist that a client certificate be presented.
2220+ The <literal>clientcert</literal> authentication option is available for
2221+ all authentication methods, but only in <filename>pg_hba.conf</> lines
2222+ specified as <literal>hostssl</>. When <literal>clientcert</literal> is
2223+ not specified or is set to 0, the server will still verify any presented
2224+ client certificates against its CA file , if one is configured — but
2225+ it will not insist that a client certificate be presented.
22232226 </para>
22242227
22252228 <para>
@@ -2234,7 +2237,9 @@ pg_dumpall -p 5432 | psql -d postgres -p 5433
22342237 If you are setting up client certificates, you may wish to use
22352238 the <literal>cert</> authentication method, so that the certificates
22362239 control user authentication as well as providing connection security.
2237- See <xref linkend="auth-cert"> for details.
2240+ See <xref linkend="auth-cert"> for details. (It is not necessary to
2241+ specify <literal>clientcert=1</literal> explicitly when using
2242+ the <literal>cert</> authentication method.)
22382243 </para>
22392244 </sect2>
22402245
0 commit comments