Hi,
I have a gitblit GO 1.6.0 running fine, with LDAP authentication to a back-end. I use web.enforceHttpBasicAuthentication=true to make it use BasicAuth. So far so good, it works fine, on both HTTP and HTTPS.
Now I want to configure a reverse-proxy in front of it. That proxy contains a SSO framework that generate the needed BasicAuth. If I do proxy-pass HTTPS to HTTP this way, it works:
ProxyPass /gitblit/ http://giti.back:8080/gitblit/
ProxyPassReverse /gitblit/ http://giti.back:8080/gitblit/
But if I do proxy HTTPS to HTTPS this way it fails:
ProxyPass /gitblit/ https://giti.back:8443/gitblit/
ProxyPassReverse /gitblit/ https://giti.back:8443/gitblit/
In the log of the Apache reverse-proxy instance, I see this:
I think the reason is the "requireClientCertificates behavior" mentioned in gitblit.properties :
# If serving over https (recommended) you might consider requiring clients to
# authenticate with ssl certificates. If enabled, only https clients with the
# a valid client certificate will be able to access Gitblit.
#
# If disabled, client certificate authentication is optional and will be tried
# first before falling-back to form authentication or basic authentication.
#
# Requiring client certificates to access any of Gitblit may be too extreme,
# consider this carefully.
#
# SINCE 1.2.0
# RESTART REQUIRED
server.requireClientCertificates = false
So how can either:
- configure my reverse-proxy to ignore giblit's request for a client-cert
- or better, configure gitblit never to ask for client cert ?
TIA,
Charles