Hi Shiv,

I confirm the connection router processes the incoming secure connections
after the SSL handshake.
You could use the trust store to reject incoming secure connections during
the SSL handshake.
I mean your trust store could include only the certificates to trust the
allowed-ssl-users.

Regards,
Domenico

On Wed, 7 May 2025 at 17:28, Shiv Kumar Dixit
<shivkumar.di...@it.eurofinseu.com.invalid> wrote:

> Hi Domenico,
> Thanks for information and raising JIRA.
>
> I tried using ROLE_NAME (of authenticated cert-based users) with latest
> artemis 2.41.0 and it works fine. It was not working earlier with 2.237.0
> due to bug which got fixed in 2.41.0.
>
> One quick question regarding USRE_NAME/ROLE_NAME - both keys only work for
> the authenticated users right?
>
> Is there any way to first check if the incoming connection is using valid
> certificate or not by matching against static certificate values defined in
> cert-users.properties? If they are present, then broker initiates SSL
> authentication process else they are rejected? I am looking for some sort
> of pre-authentication process to avoid SSL handshake error from misbehaving
> clients.
>
> Best Regards
> Shiv
>
> -----Original Message-----
> From: Domenico Francesco Bruscino <bruscin...@gmail.com>
> Sent: 07 May 2025 08:31 PM
> To: users@activemq.apache.org
> Subject: Re: Connection router for filtering certificate based users
>
>
>
> Unverified Sender: The sender of this email has not been verified. Review
> the content of the message carefully and verify the identity of the sender
> before acting on this email: replying, opening attachments or clicking
> links.
>
>
> Hi Shiv,
>
> the connection router doesn't resolve the USER_NAME key when the
> connection is authenticated with the TextFileCertificateLoginModule, this
> is a bug, I created the following issue:
> https://issues.apache.org/jira/browse/ARTEMIS-5465
>
> Regards,
> Domenico
>
> On Tue, 6 May 2025 at 16:22, Shiv Kumar Dixit
> <shivkumar.di...@it.eurofinseu.com.invalid> wrote:
>
> > Hi Domenico
> > I am exploring how to restrict users (specially certificate based) for
> > connecting based on certain conditions. I came across
> > https://list/
> > s.apache.org%2Fthread%2Fnot2kzq23vx60zjvsl9ffrx7rfps6wzs&data=05%7C02%
> > 7C%7C503260782dfc4c7d847e08dd8d781255%7C1a1dce2021b14beaa9d2130e9f1f6e
> >
> 2f%7C0%7C0%7C638822269015650737%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=5r2NLnUe%2Bn%2BAGp9cIo1QjWOfl0LtiNXaarpol%2FthIO0%3D&reserved=0.
> I tried to use USER_NAME key for filtering and it worked fine for basic
> authentication users. Can we use this USER_NAME key also to filter
> certificate-based users as well?
> >
> > We define the certificate username and role in e.g.
> > cert-users.properties and cert-roles.properties. Can we use username
> > defined in cert-users.properties file E.g. user1=CN=My_Test_App in
> connection router?
> >
> > <connection-routers>
> >                <connection-router name="allowed-ssl-users">
> >                               <key-type>USER_NAME</key-type>
> >
> > <local-target-filter>user1</local-target-filter>
> >                </connection-router>
> > </connection-routers>
> >
> > <acceptor
> > name="ssl">tcp://0.0.0.0:9876?.........;router=allowed-ssl-users
> > </acceptor>
> >
> > Thanks
> > Shiv
> >
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@activemq.apache.org
> For additional commands, e-mail: users-h...@activemq.apache.org
> For further information, visit: https://activemq.apache.org/contact
>
>
>

Reply via email to