Table of Contents
Table of contents
Java security settings can be customized by overriding the default security properties. This is useful when enabling legacy protocols (e.g., TLS 1.0), modifying cryptographic algorithms, or adjusting security policies.
Warning
: Re-enabling deprecated security features (e.g., TLS 1.0, weak ciphers) exposes your system to known vulnerabilities. Only do this if required for compatibility with legacy systems, and consider upgrading your security infrastructure instead.
Steps to override Java security properties
-
Create a new file, e.g.,
java_custom.secure.properties, to override default security settings. -
Modify the required security properties. For example, to enable
TLS 1.0(which is disabled by default), removeTLSv1fromjdk.tls.disabledAlgorithmsvalue:- Default setting (TLS 1.0 is disabled):
jdk.tls.disabledAlgorithms=SSLv3, TLSv1, TLSv1.1, DTLSv1.0, RC4, DES, \ MD5withRSA, DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \ ECDH- Updated setting (TLS 1.0 is enabled):
jdk.tls.disabledAlgorithms=SSLv3, TLSv1.1, DTLSv1.0, RC4, DES, \ MD5withRSA, DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \ ECDHYou can modify other properties in the same way.
-
Map the file in the container.
-
Ensure the custom file is accessible inside the container where Java runs. In a Dockerized environment, map it to a known location.
-
Update your
docker-compose.ymlfile with the following lines to place the file inside thecloudbeavercontainer:
volumes: - ./java_custom.secure.properties:/location//java.secure.properties environment: - JAVA_OPTS="-Djava.security.properties=/location/with/java.secure.properties" -
-
Restart the CloudBeaver to apply the changes.
CloudBeaver Documentation
- Getting started
- Create connection
- Connection network options
- Supported databases
- Drivers management

- Database authentication methods
- Database navigator
- Properties editor
- Data editor
- SQL editor
- Entity relation diagrams

- Cloud services
- AI Smart assistance
- Data transfer
- General user guide
- Administration
- Server configuration
- Server security and access configuration
- Authentication methods
- Access management
- Proxy configuration
- Secret management

- Logs
- Query manager
- Workspace location
- Command line parameters
- Session manager

- Deployment options
- CloudBeaver Editions
- FAQ
- Development