Use the following Docker command to run the CA Gateway container in SSL/TLS secure mode.
docker run -d -p <CAGW_HOST_PORT>:<server.port> -p <MONITOR_HOST_PORT>:<management.server.port> -v <HOST_CONFIG>:/etc/cagw/config -h <HOST> cagw/api:latest --cap-drop ALLIf the host system uses SELinux, append a Z to the volume mount string. For example:
docker run -d -p 8444:8080 -p 9444:9090 -v /home/myuser/cagw/config:/etc/cagw/config:Z -h myserver cagw/api:latest --cap-drop ALLSee the following sections for a description of each option.
--cap-drop ALL
Drop all Linux capabilities from the Docker container.
-d
Launch the container in the background. Remove this option to see the CA Gateway log output while running, although it might terminate CA Gateway when closing the terminal.
-h <HOST>
Use <HOST> when logging the active URL, where <HOST> is the hostname of the CA Gateway server. When omitting this option, the active URL recorded in the logs displays a random hostname. For example:
Active URL: http//f719b61263fa:8444/cagw/swagger-ui/index.html-p <CAGW_HOST_PORT>:<server.port>
Map the following ports.
- The
<CAGW_HOST_PORT>user-selected port to expose CA Gateway on the host machine. - The
<server.port>value of the server port configuration parameter in theapplication.ymlfile.
-p <MONITOR_HOST_PORT>:<management.server.port>
Map the following ports:
- The
<MONITOR_HOST_PORT>user-selected port to expose the monitoring service on the host machine. - The
<management.server.port>value of the management server port configuration parameter in theapplication.ymlfile.
See Checking the CA Gateway health for how to check the health check and monitoring service.
-v <HOST_CONFIG>:/etc/cagw/config
Map the following folders.
- The
<HOST_CONFIG>configuration folder described in Creating the host configuration folder. - The
/etc/cagw/configconfiguration folder in the Docker container.
Alternatively, you can add several -v flags to map different files and folders. For example:
-v /home/myuser/cagw/config/application.yml:/etc/cagw/config/application.yml:ro -v /home/myuser/cagw/config/tls/cagw-tls.p12:/etc/cagw/config/cagw-tls.p12:roThe ro option sets the read-only mode for the mapped file.
-e JAVA_OPTS="-Dcagw.enable.crldp.checking=true"
Enable CRL checking. This command adds the following option to the JAVA_OPTS environment variable passed to the CA Gateway.
-Dcagw.enable.crldp.checking=trueWhen the revocation checking is enabled, all client certificates must include a CDP extension pointing to an up-to-date CRL. Handshakes will not complete if the client certificate does not include a CDP extension or the URL in this extension is unavailable.