mirror of
https://github.com/corda/corda.git
synced 2024-12-22 06:17:55 +00:00
Removed out-of-date warnings regarding the switchover to X.500 names
This commit is contained in:
parent
dca2274bff
commit
b080d4da3f
@ -100,12 +100,9 @@ Clients attempting to connect to the node's broker fall in one of four groups:
|
|||||||
|
|
||||||
Artemis provides a feature of annotating each received message with the validated user. This allows the node's messaging
|
Artemis provides a feature of annotating each received message with the validated user. This allows the node's messaging
|
||||||
service to provide authenticated messages to the rest of the system. For the first two client types described above the
|
service to provide authenticated messages to the rest of the system. For the first two client types described above the
|
||||||
validated user is the X.500 subject DN of the client TLS certificate and we assume the common name is the legal name of
|
validated user is the X.500 subject of the client TLS certificate. This allows the flow framework to authentically determine
|
||||||
the peer. This allows the flow framework to authentically determine the ``Party`` initiating a new flow. For RPC clients
|
the ``Party`` initiating a new flow. For RPC clients the validated user is the username itself and the RPC framework uses
|
||||||
the validated user is the username itself and the RPC framework uses this to determine what permissions the user has.
|
this to determine what permissions the user has.
|
||||||
|
|
||||||
.. note:: ``Party`` lookup is currently done by the legal name. A future version will use the full X.500 name as
|
The broker also does host verification when connecting to another peer. It checks that the TLS certificate subject matches
|
||||||
it can provide additional structures for uniqueness.
|
with the advertised X.500 legal name from the network map service.
|
||||||
|
|
||||||
The broker also does host verification when connecting to another peer. It checks that the TLS certificate common name
|
|
||||||
matches with the advertised legal name from the network map service.
|
|
||||||
|
@ -15,12 +15,10 @@ Initial Registration
|
|||||||
The certificate signing request will be created based on node information obtained from the node configuration.
|
The certificate signing request will be created based on node information obtained from the node configuration.
|
||||||
The following information from the node configuration file is needed to generate the request.
|
The following information from the node configuration file is needed to generate the request.
|
||||||
|
|
||||||
:myLegalName: Your company's legal name. e.g. "Mega Corp LLC". This needs to be unique on the network. If another node
|
:myLegalName: Your company's legal name as an X.500 string. X.500 allows differentiation between entities with the same
|
||||||
has already been permissioned with this name then the permissioning server will automatically reject the request. The
|
name as the legal name needs to be unique on the network. If another node has already been permissioned with this
|
||||||
request will also be rejected if it violates legal name rules, see `Legal Name Constraints`_ for more information.
|
name then the permissioning server will automatically reject the request. The request will also be rejected if it
|
||||||
|
violates legal name rules, see `Legal Name Constraints`_ for more information.
|
||||||
.. note:: In a future version the uniqueness requirement will be relaxed to a X.500 name. This will allow differentiation
|
|
||||||
between entities with the same name.
|
|
||||||
|
|
||||||
:emailAddress: e.g. "admin@company.com"
|
:emailAddress: e.g. "admin@company.com"
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user