You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
API for server-to-server call where an external system can pass some signed data package to Nivlheim, which will then verify the signature and return some information about the machine that signed it.
http redirect service
A machine makes an http request to a 3rd party server, gets a redirect to Nivlheim
Upon contacting Nivlheim, it receives a JSON Web Token and is redirected back
It contacts the 3rd party server again, this time passing along a JWT which the server uses to verify its identity
Nivlheim can share its CA certificate with other servers. This has negative security implications.
The text was updated successfully, but these errors were encountered:
Modified the client to be compatible with the legacy version of the
server software.
The client generates an additional file with the certificate key
in PKCS8 format. This helps #32.
Modified the client cron job to run every 5 minutes, and the client
will exit if less than an hour since last successful run. Fixes#20.
Moved approve/deny web gui to the settings page.
Improved the webdesign/look on the settings page.
The solution for this issue relies on how #27 is solved. Perhaps Nivlheim should share a bundle with all its active CA certificates (which should normally consist of the current + the previous).
This PR takes care of 2 issues:
- It automates the upgrading process of the client CA certificate,
making it easy to upgrade, and "documenting" (in the form of code)
how to do it. #27
- It publishes a bundle with the currently active CA certificates on
the web server, facilitating 3rd party use. #32
See also: https://github.com/usit-gd/nivlheim/wiki/Client-certificates
There are many ways to do this:
The text was updated successfully, but these errors were encountered: