Skip to content

Commit

Permalink
update documentation
Browse files Browse the repository at this point in the history
  • Loading branch information
gerardsn committed Dec 12, 2024
1 parent c7c8424 commit 23346a6
Showing 1 changed file with 1 addition and 6 deletions.
7 changes: 1 addition & 6 deletions docs/pages/deployment/certificates.rst
Original file line number Diff line number Diff line change
Expand Up @@ -24,11 +24,6 @@ In ``did:x509`` the certificates are also used in the cryptographic proofs to ob
This means the certificate chain now provides the root of trust and has stricter requirements than connection certificates.

Trust in specific certificate CAs is configured per use-case in a :ref:`Discovery <discovery>` and :ref:`Policy <policy>` definition file.
In addition, all trusted CA chains must also be added to the ``tls.truststorefile``.
All CA certificates from chains trusted per the above definition files are automatically added to the CRL checker at runtime.
For certificate chains used in ``did:x509`` the Nuts-node always uses a hard-fail strategy, i.e., the ``pki.softfail`` config value is ignored during certificate validation for ``did:x509``.
This means that the Nuts-node will not be able to verify a ``did:x509`` DID or Verifiable Credential signed by this DID Method if the CRL cannot be downloaded and the CRL in the cache is older than ``pki.maxupdatefailhours``.

.. note::

Since the configured truststore file is now used for multiple purposes, it is no longer possible for the Nuts-node to determine what certificate chain is accepted/trusted for what purpose.
This means that all incoming TLS connections (including gRPC) must be offloaded in a proxy and validated against the expected certificate chain.

0 comments on commit 23346a6

Please sign in to comment.