-
Notifications
You must be signed in to change notification settings - Fork 411
How to change Java security properties
Java security settings can be customized by overriding the default security properties. This is useful when enabling legacy protocols (e.g., TLS 1.0), modifying cryptographic algorithms, or adjusting security policies.
Warning: Re-enabling deprecated security features (e.g., TLS 1.0, weak ciphers) exposes your system to known vulnerabilities. Only do this if required for compatibility with legacy systems, and consider upgrading your security infrastructure instead.
-
Create a new file, e.g.,
java_custom.secure.properties
, to override default security settings. -
Modify the required security properties. For example, to enable
TLS 1.0
(which is disabled by default), removeTLSv1
fromjdk.tls.disabledAlgorithms
value:- Default setting (TLS 1.0 is disabled):
jdk.tls.disabledAlgorithms=SSLv3, TLSv1, TLSv1.1, DTLSv1.0, RC4, DES, \ MD5withRSA, DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \ ECDH
- Updated setting (TLS 1.0 is enabled):
jdk.tls.disabledAlgorithms=SSLv3, TLSv1.1, DTLSv1.0, RC4, DES, \ MD5withRSA, DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \ ECDH
You can modify other properties in the same way.
-
Map the file in the container.
Ensure the custom file is accessible inside the container where Java runs. In a Dockerized environment, map it to a known location.
Update your
docker-compose.yml
file with the following lines to place the file inside thecloudbeaver
container:volumes: - ./java_custom.secure.properties:/location//java.secure.properties environment: - JAVA_OPTS="-Djava.security.properties=/location/with/java.secure.properties"
-
Restart the CloudBeaver to apply the changes.
-
Administration
- Server configuration
- Create Connection
- Connection Templates Management
- Access Management
-
Authentication methods
-
Local Access Authentication
- Anonymous Access Configuration
- Reverse proxy header authentication
- LDAP
-
Single Sign On
-
SAML
-
OpenID
-
AWS OpenID
-
AWS SAML
-
AWS IAM
-
AWS OpenId via Okta
-
Snowflake SSO
-
Okta OpenId
-
Cognito OpenId
-
JWT authentication
-
Kerberos authentication
-
NTLM
-
Microsoft Entra ID authentication
-
Google authentication
-
Local Access Authentication
- Database authentication methods
- Network configuration settings
- User credentials storage
- Cloud databases configuration
-
Query Manager
-
Drivers Management
-
Features
- Server configuration
-
Domain manager
- Product configuration parameters
- Command line parameters
- Local Preferences
- API
- Deployment options
- Additional setup and management