Virtuoso Open-Source Wiki
Virtuoso Open-Source, OpenLink Data Spaces, and OpenLink Ajax Toolkit
Advanced Search
Location: / Dashboard / Main / VirtFOAFSSLCurl

Creating and Using a SPARQL-SSL based Endpoint

The following guide describes the basic steps for setting up an SSL protected and WebID based SPARQL Endpoint (SPARQL-SSL). The guide also covers the use of Virtuoso PL functions and the Virtuoso Conductor for SPARQL endpoint creation and configuration. It also covers the use of cURL for exercising the newly generated SPARQL-SSL endpoint.

  1. Setup the CA issuer and https listener
  2. Define the /sparql-ssl endpoint on an HTTPS based listener (HTTPS service endpoint), for example using Virtuoso PL:

    DB.DBA.VHOST_DEFINE ( lhost=>'', vhost=>'localhost', lpath=>'/sparql-ssl', ppath=>'/!sparql/', is_dav=>1, auth_fn=>'DB.DBA.FOAF_SSL_AUTH', vsp_user=>'dba', ses_vars=>0, auth_opts=>vector ('https_cert', 'db:https_key_localhost', 'https_key', 'db:https_key_localhost', 'https_verify', 3, 'https_cv_depth', 10), opts=>vector ('noinherit', 1), is_default_host=>0 );

  3. Setup the SPARQL-SSL endpoint and define ACLs using the Virtuoso Conductor
  4. Export your private key and its associated WebID based X.509 certificate from your Firefox browser or System's Key Manager into PEM (PKCS12) file
    1. If using Firefox use the menu path: Advanced->View Certificates, then click Backup for your certificate with name "mykey".
    2. The file "mykey.p12" will be created. To disable password protection so that you can use this file in non-interactive mode (e.g. with cURL and other HTTP clients) execute:

      openssl pkcs12 -in mykey.p12 -out mykey.pem -nodes

  5. Test the SPARQL-SSL endpoint with cURL (listening on default HTTPS 443 port):
    • Note: In this example we use the "-k / --insecure" option with cURL since we are going to be using self-signed X.509 certificates signed by self-signed root CA.
  6. Import your key it via Conductor UI:
    1. Go to Conductor -> System Admin->User Accounts

    2. Click "Edit" for your user

    3. Change "User type" to: SQL/ODBC and WebDAV

    4. Enter your ODS user WebID:


    5. Click "Save"
    6. Click again "Edit" for your user
    7. In "PKCS12 file:" click the Browse" button and select your key.
    8. Enter a local Key Name, for e.g., "cli_key"
    9. Enter key password

    10. Click "Import Key"
    11. As result the key will be stored with name for ex. cli_key

    12. Click "Save"
  7. Test the SPARQL-SSL endpoint with http_client (listening on default HTTPS 443 port).

Demo Examples


Powered By Virtuoso