Skip to content

Commit

Permalink
docs(kuma-cp) permissive mTLS mode (#510)
Browse files Browse the repository at this point in the history
* docs(kuma-cp) permissive mTLS mode

Signed-off-by: Ilya Lobkov <ilya.lobkov@konghq.com>

* Update docs/docs/1.2.3/policies/mutual-tls.md

Co-authored-by: Jennifer Rondeau <Bradamant3@users.noreply.github.com>

* docs(kuma-cp) warning

Signed-off-by: Ilya Lobkov <ilya.lobkov@konghq.com>

Co-authored-by: Jennifer Rondeau <Bradamant3@users.noreply.github.com>
  • Loading branch information
lobkovilya and Bradamant3 authored Aug 25, 2021
1 parent df16fea commit c96989c
Showing 1 changed file with 45 additions and 0 deletions.
45 changes: 45 additions & 0 deletions docs/docs/1.2.3/policies/mutual-tls.md
Original file line number Diff line number Diff line change
Expand Up @@ -187,6 +187,51 @@ A few considerations:
* The `dpCert` configuration determines how often Kuma should automatically rotate the certificates assigned to every data plane proxy.
* The Secrets must exist before referencing them in a `provided` backend.

## Permissive mTLS

Kuma provides a convenient way to migrate existing workloads to the mTLS mesh with zero downtime. In order to do so
`PERMISSIVE` mode has to be enabled.

:::: tabs :options="{ useUrlFragment: false }"

::: tab "Kubernetes"
```yaml
apiVersion: kuma.io/v1alpha1
kind: Mesh
metadata:
name: default
spec:
mtls:
enabledBackend: ca-1
backends:
- name: ca-1
type: builtin
mode: PERMISSIVE # supported values: STRICT, PERMISSIVE
```
:::

::: tab "Universal"
```yaml
type: Mesh
name: default
mtls:
enabledBackend: ca-1
backends:
- name: ca-1
type: builtin
mode: PERMISSIVE # supported values: STRICT, PERMISSIVE
```
:::

::::

Permissive mTLS mode encrypts outbound connections the same way as strict mTLS mode, but inbound connections on the server-side
accept both TLS and plaintext. This lets you migrate servers to an mTLS mesh before their clients. It also supports the case where the client and server already implement TLS.

::: warning
Using PERMISSIVE mode is not secure, as soon as all services will be moved to the mesh, make sure to set STRICT mode.
:::

### CA requirements

When using an arbitrary certificate and key for a `provided` backend, we must make sure that we comply with the following requirements:
Expand Down

0 comments on commit c96989c

Please sign in to comment.