From: Eric Covener When a proxy is configured to forward requests to a remote SSL
server, this directive can be used to configure certificate
-verification of the remote server. Notice that this directive can be
-used both in per-server and per-directory context. In per-server
-context it applies to the remote server authentication process used in
-the standard SSL handshake when a connection is established by the
-proxy. In per-directory context it forces a SSL renegotiation with the
-reconfigured remote server verification level after the HTTP request
-was read but before the HTTP response is sent.Description: Type of remote server Certificate verification Syntax: SSLProxyVerify level
-Default: SSLProxyVerify none
-Context: server config, virtual host, directory, .htaccess
+Override: AuthConfig Context: server config, virtual host Status: Extension Module: mod_ssl
The following levels are available for level:
SSLProxyVerifyDepth number
SSLProxyVerifyDepth 1
This directive sets how deeply mod_ssl should verify before deciding that the -remote server does not have a valid certificate. Notice that this directive can be -used both in per-server and per-directory context. In per-server context it -applies to the client authentication process used in the standard SSL -handshake when a connection is established. In per-directory context it forces -a SSL renegotiation with the reconfigured remote server verification depth after the -HTTP request was read but before the HTTP response is sent.
+remote server does not have a valid certificate.
The depth actually is the maximum number of intermediate certificate issuers,
i.e. the number of CA certificates which are max allowed to be followed while
diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml
index 33a7f1e2086..c43866402a4 100644
--- a/docs/manual/mod/mod_ssl.xml
+++ b/docs/manual/mod/mod_ssl.xml
@@ -1448,23 +1448,13 @@ SSLProxyMachineCertificateFile /usr/local/apache2/conf/ssl.crt/proxy.pem
When a proxy is configured to forward requests to a remote SSL
server, this directive can be used to configure certificate
-verification of the remote server. Notice that this directive can be
-used both in per-server and per-directory context. In per-server
-context it applies to the remote server authentication process used in
-the standard SSL handshake when a connection is established by the
-proxy. In per-directory context it forces a SSL renegotiation with the
-reconfigured remote server verification level after the HTTP request
-was read but before the HTTP response is sent.
The following levels are available for level:
This directive sets how deeply mod_ssl should verify before deciding that the -remote server does not have a valid certificate. Notice that this directive can be -used both in per-server and per-directory context. In per-server context it -applies to the client authentication process used in the standard SSL -handshake when a connection is established. In per-directory context it forces -a SSL renegotiation with the reconfigured remote server verification depth after the -HTTP request was read but before the HTTP response is sent.
+remote server does not have a valid certificate.The depth actually is the maximum number of intermediate certificate issuers, i.e. the number of CA certificates which are max allowed to be followed while