# rabbitmq-auth-mechanism-ssl **Repository Path**: skmust2010/rabbitmq-auth-mechanism-ssl ## Basic Information - **Project Name**: rabbitmq-auth-mechanism-ssl - **Description**: No description available - **Primary Language**: Unknown - **License**: MPL-2.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-04-30 - **Last Updated**: 2024-06-01 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # x509 (TLS/SSL) certificate Authentication Mechanism for RabbitMQ ## This was migrated to https://github.com/rabbitmq/rabbitmq-server This repository has been moved to the main unified RabbitMQ "monorepo", including all open issues. You can find the source under [/deps/rabbitmq_auth_mechanism_ssl](https://github.com/rabbitmq/rabbitmq-server/tree/master/deps/rabbitmq_auth_mechanism_ssl). All issues have been transferred. ## Overview This plugin allows RabbitMQ clients authenticate using x509 certificates and TLS (PKI) [peer verification mechanism](https://tools.ietf.org/html/rfc5280#section-6) instead of credentials (username/password pairs). ## How it Works When a client connects and performs TLS upgrade, the username is obtained from the client's TLS (x509) certificate. The user's password is not checked. In order to use this mechanism the client must connect with TLS enabled, and present a client certificate. ## Usage This mechanism must also be enabled in RabbitMQ's configuration file, see [Authentication Mechanisms](https://www.rabbitmq.com/authentication.html) and [Configuration](https://www.rabbitmq.com/configure.html) guides for more details. A couple of examples: ``` ini auth_mechanisms.1 = PLAIN auth_mechanisms.1 = AMQPLAIN auth_mechanisms.1 = EXTERNAL ``` to allow this mechanism in addition to the defaults, or: ``` ini auth_mechanisms.1 = EXTERNAL ``` to allow only this mechanism and prohibit connections that use username and passwords. For safety the server must be configured with the SSL option 'verify' set to 'verify_peer', to ensure that if an SSL client presents a certificate, it gets verified. ### Username Extraction from Certificate #### Distinguished Name By default this will set the username to an [RFC 4514](https://tools.ietf.org/html/rfc4514)-ish string form of the certificate's subject's Distinguished Name, similar to that produced by OpenSSL's "-nameopt [RFC 2253"](https://tools.ietf.org/html/rfc2253) option. You can obtain this string form from a certificate with a command like: ``` openssl x509 -in path/to/cert.pem -nameopt RFC2253 -subject -noout ``` or from an existing amqps connection with commands like: ``` bash rabbitmqctl list_connections peer_cert_subject ``` #### Common Name To use the Common Name instead, set `rabbit.ssl_cert_login_from` to `common_name`: ``` ini auth_mechanisms.1 = EXTERNAL ssl_cert_login_from = common_name ``` Note that the authenticated user will then be looked up in the [configured authentication / authorisation backend(s)](https://www.rabbitmq.com/access-control.html). This will be the internal node database by default but could include other backends if so configured. ## Copyright & License (c) 2007-2020 VMware, Inc. or its affiliates. Released under the same license as RabbitMQ.