Top |
The configuration for libtlssep typically resides at /etc/tlssep-decorator-api-version.cfg
.
An example configuration is shown below.
certpath = "/etc/pki/tls/certs/cert.pem"; privkeypath = "/etc/pki/tls/certs/key.pem"; verification = ( "ca" ); programs = ({ path = "/usr/bin/my-prototype"; verification = ( "ca", "self-signed" ); enough = 1; })
You might find this syntax familiar if you have studied CertShim, as CertShim provided the inspiration for libtlssep's configuration engine. The first three lines specify the global configuration parameters; in this case, the path to a certificate and private key as well as the default certificate-trust model.
The application-specific statement beginning on Line 5
overrides the configuration when
tlssep-decorator acts on behalf of /usr/bin/my-prototype
so that the program
chains two verification techniques:
the traditional CA model
and
self-signed certificates,
with the latter presumably supported for development purposes.
Here the meaning of the enough
parameter
resembles CertShim's vote
:
satisfying one of
either CA
or
self-signed verification
is sufficient for this application.
Had the administrator set enough
to 2
,
the application would require that both verifications be successful;
in the absence of an enough
parameter, tlssep-decorator will enforce
all of the specified verification techniques.
An administrator could select other trust models here without making any changes to application source code.