Skip to main content

OMERO server certificate management plugin

Project description

OMERO server certificate management plugin

Actions Status

Generate self-signed certificates and configure OMERO.server.

If you prefer to configure OMERO manually see the examples in these documents:

Installation

Install openssl if it's not already on your system. Then activate your OMERO.server virtualenv and run:

pip install omero-certificates

Usage

Set the OMERODIR environment variable to the location of OMERO.server.

Run:

omero certificates
OpenSSL 1.1.1d  10 Sep 2019
Generating RSA private key, 2048 bit long modulus (2 primes)
.+++++
.............................+++++
e is 65537 (0x010001)
certificates created: /OMERO/certs/server.key /OMERO/certs/server.pem /OMERO/certs/server.p12

to update your OMERO.server configuration and to generate or update your self-signed certificates. If you already have the necessary configuration settings this plugin will not modify them, so it is safe to always run omero certificates every time you start OMERO.server. You can now start your omero server as normal.

This plugin automatically overrides the defaults for the following properties if they're not explicitly set:

  • omero.glacier2.IceSSL.Ciphers=HIGH: the default weaker ciphers may not be supported on some systems
  • omero.glacier2.IceSSL.ProtocolVersionMax=TLS1_3: Support TLS 1.2 and 1.3
  • omero.glacier2.IceSSL.Protocols=TLS1_2,TLS1_3: Support TLS 1.2 and 1.3
  • omero.glacier2.IceSSL.DH.2048=ffdhe2048.pem: use a pre-defined 2048-bit Diffie-Hellman group

The pre-defined Diffie-Hellman group is from RFC 7919. Newer versions of OpenSSL will prefer ECDHE and have their own 2048-bit or greater primes but it's safe to use this one. When RHEL 7 (OpenSSL 1.0.2) support is dropped this will be removed.

NOTE: If RHEL 7 is detected, only TLS 1.2 support will be enabled.

The original values can be found on https://docs.openmicroscopy.org/omero/5.6.0/sysadmins/config.html#glacier2

Certificates will be stored under {omero.data.dir}/certs by default. Set omero.glacier2.IceSSL.DefaultDir to change this.

If you see a warning message such as

Can't load ./.rnd into RNG

it should be safe to ignore.

For full information see the output of:

omero certificates --help

Developer notes

This project uses setuptools-scm. To release a new version just create a tag.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

omero-certificates-0.3.0.tar.gz (15.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

omero_certificates-0.3.0-py3-none-any.whl (13.2 kB view details)

Uploaded Python 3

File details

Details for the file omero-certificates-0.3.0.tar.gz.

File metadata

  • Download URL: omero-certificates-0.3.0.tar.gz
  • Upload date:
  • Size: 15.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.8.18

File hashes

Hashes for omero-certificates-0.3.0.tar.gz
Algorithm Hash digest
SHA256 4cd278d57dbd27595c3b6f9326f98e58ce8c974d8edc09d9c82b3bb8ec6b9e1d
MD5 158c5ecf11efb3b198d1a0e79906cbaf
BLAKE2b-256 9380d3543bdaa46161ff059b6c98bd0eaea0ff6e55696159e430017dd510ed16

See more details on using hashes here.

File details

Details for the file omero_certificates-0.3.0-py3-none-any.whl.

File metadata

File hashes

Hashes for omero_certificates-0.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 7e4d13b329fcb6aff642b35d9809d01ac4e4f56ba4ad47da90cdce5f397bcc14
MD5 a2851c87de06f2dfd5e0abdab669161a
BLAKE2b-256 0df7d453deb0bb982597207599092a48840f4fe91dbda3f737504e9d2eac1763

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page