Skip to content

Commit

Permalink
docs(policies) external service SNI (#494)
Browse files Browse the repository at this point in the history
Signed-off-by: Jakub Dyszkiewicz <jakub.dyszkiewicz@gmail.com>
Signed-off-by: Jennifer Rondeau <jennifer.rondeau@konghq.com>
  • Loading branch information
jakubdyszkiewicz authored and Jennifer Rondeau committed Aug 25, 2021
1 parent 7f0a4ee commit 93ec2b3
Showing 1 changed file with 3 additions and 0 deletions.
3 changes: 3 additions & 0 deletions docs/docs/1.2.3/policies/external-services.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@ spec:
tls: # optional
enabled: true
allowRenegotiation: false
sni: httpbin.org # optional
caCert: # one of inline, inlineString, secret
inline: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0t... # Base64 encoded cert
clientCert: # one of inline, inlineString, secret
Expand All @@ -51,6 +52,7 @@ networking:
tls:
enabled: true
allowRenegotiation: false
sni: httpbin.org # optional
caCert: # one of inline, inlineString, secret
inline: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0t... # Base64 encoded cert
clientCert: # one of inline, inlineString, secret
Expand Down Expand Up @@ -106,6 +108,7 @@ The first approach has an advantage that we can apply HTTP based policies, becau
* `enabled` turns on and off the TLS origination.
* `allowRenegotiation` turns on and off TLS renegotiation. It's not recommended enabling this for [security reasons](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/transport_sockets/tls/v3/tls.proto).
However, some servers require this setting to fetch client certificate after TLS handshake. TLS renegotiation is not available in TLS v1.3.
* `sni` overrides the default Server Name Indication. Set this value to empty string to disable SNI.
* `caCert` the CA certificate for the external service TLS verification
* `clientCert` the client certificate for mTLS
* `clientKey` the client key for mTLS
Expand Down

0 comments on commit 93ec2b3

Please sign in to comment.