mirror of https://github.com/istio/istio.io.git
mTLS -> mutual TLS (#3717)
This commit is contained in:
parent
6077db4e47
commit
b409371b9f
|
|
@ -595,7 +595,7 @@ to be 443. The egress gateway accepts the MongoDB traffic on the port 443, match
|
||||||
|
|
||||||
{{< tabset cookie-name="mtls" >}}
|
{{< tabset cookie-name="mtls" >}}
|
||||||
|
|
||||||
{{< tab name="mTLS enabled" cookie-value="enabled" >}}
|
{{< tab name="mutual TLS enabled" cookie-value="enabled" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl apply -f - <<EOF
|
$ kubectl apply -f - <<EOF
|
||||||
|
|
@ -676,7 +676,7 @@ to be 443. The egress gateway accepts the MongoDB traffic on the port 443, match
|
||||||
|
|
||||||
{{< /tab >}}
|
{{< /tab >}}
|
||||||
|
|
||||||
{{< tab name="mTLS disabled" cookie-value="disabled" >}}
|
{{< tab name="mutual TLS disabled" cookie-value="disabled" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl apply -f - <<EOF
|
$ kubectl apply -f - <<EOF
|
||||||
|
|
|
||||||
|
|
@ -99,7 +99,7 @@ be done by the egress gateway, as opposed to by the sidecar in the previous exam
|
||||||
|
|
||||||
{{< tabset cookie-name="mtls" >}}
|
{{< tabset cookie-name="mtls" >}}
|
||||||
|
|
||||||
{{< tab name="mTLS enabled" cookie-value="enabled" >}}
|
{{< tab name="mutual TLS enabled" cookie-value="enabled" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl apply -f - <<EOF
|
$ kubectl apply -f - <<EOF
|
||||||
|
|
@ -145,7 +145,7 @@ be done by the egress gateway, as opposed to by the sidecar in the previous exam
|
||||||
|
|
||||||
{{< /tab >}}
|
{{< /tab >}}
|
||||||
|
|
||||||
{{< tab name="mTLS disabled" cookie-value="disabled" >}}
|
{{< tab name="mutual TLS disabled" cookie-value="disabled" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl apply -f - <<EOF
|
$ kubectl apply -f - <<EOF
|
||||||
|
|
|
||||||
|
|
@ -112,7 +112,7 @@ First create a `ServiceEntry` to allow direct traffic to an external service.
|
||||||
|
|
||||||
{{< tabset cookie-name="mtls" >}}
|
{{< tabset cookie-name="mtls" >}}
|
||||||
|
|
||||||
{{< tab name="mTLS enabled" cookie-value="enabled" >}}
|
{{< tab name="mutual TLS enabled" cookie-value="enabled" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl apply -f - <<EOF
|
$ kubectl apply -f - <<EOF
|
||||||
|
|
@ -158,7 +158,7 @@ First create a `ServiceEntry` to allow direct traffic to an external service.
|
||||||
|
|
||||||
{{< /tab >}}
|
{{< /tab >}}
|
||||||
|
|
||||||
{{< tab name="mTLS disabled" cookie-value="disabled" >}}
|
{{< tab name="mutual TLS disabled" cookie-value="disabled" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl apply -f - <<EOF
|
$ kubectl apply -f - <<EOF
|
||||||
|
|
@ -320,7 +320,7 @@ You need to specify port 443 with protocol `TLS` in a corresponding `ServiceEntr
|
||||||
|
|
||||||
{{< tabset cookie-name="mtls" >}}
|
{{< tabset cookie-name="mtls" >}}
|
||||||
|
|
||||||
{{< tab name="mTLS enabled" cookie-value="enabled" >}}
|
{{< tab name="mutual TLS enabled" cookie-value="enabled" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl apply -f - <<EOF
|
$ kubectl apply -f - <<EOF
|
||||||
|
|
@ -401,7 +401,7 @@ You need to specify port 443 with protocol `TLS` in a corresponding `ServiceEntr
|
||||||
|
|
||||||
{{< /tab >}}
|
{{< /tab >}}
|
||||||
|
|
||||||
{{< tab name="mTLS disabled" cookie-value="disabled" >}}
|
{{< tab name="mutual TLS disabled" cookie-value="disabled" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl apply -f - <<EOF
|
$ kubectl apply -f - <<EOF
|
||||||
|
|
|
||||||
|
|
@ -423,7 +423,7 @@ The SNI proxy will forward the traffic to port `443`.
|
||||||
|
|
||||||
{{< tabset cookie-name="mtls" >}}
|
{{< tabset cookie-name="mtls" >}}
|
||||||
|
|
||||||
{{< tab name="mTLS enabled" cookie-value="enabled" >}}
|
{{< tab name="mutual TLS enabled" cookie-value="enabled" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl apply -f - <<EOF
|
$ kubectl apply -f - <<EOF
|
||||||
|
|
@ -540,7 +540,7 @@ The SNI proxy will forward the traffic to port `443`.
|
||||||
|
|
||||||
{{< /tab >}}
|
{{< /tab >}}
|
||||||
|
|
||||||
{{< tab name="mTLS disabled" cookie-value="disabled" >}}
|
{{< tab name="mutual TLS disabled" cookie-value="disabled" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl apply -f - <<EOF
|
$ kubectl apply -f - <<EOF
|
||||||
|
|
|
||||||
|
|
@ -41,7 +41,7 @@ This permits customization of Istio to operator specific requirements.
|
||||||
|
|
||||||
{{< tabset cookie-name="profile" >}}
|
{{< tabset cookie-name="profile" >}}
|
||||||
|
|
||||||
{{< tab name="permissive mTLS" cookie-value="permissive" >}}
|
{{< tab name="permissive mutual TLS" cookie-value="permissive" >}}
|
||||||
When using the permissive mutual TLS mode, all services accept both plain text and
|
When using the permissive mutual TLS mode, all services accept both plain text and
|
||||||
mutual TLS traffic. Clients send plain text traffic unless configured for
|
mutual TLS traffic. Clients send plain text traffic unless configured for
|
||||||
[mutual migration](/docs/tasks/security/mtls-migration/#configure-clients-to-send-mutual-tls-traffic).
|
[mutual migration](/docs/tasks/security/mtls-migration/#configure-clients-to-send-mutual-tls-traffic).
|
||||||
|
|
@ -62,7 +62,7 @@ $ kubectl apply -f install/kubernetes/istio-demo.yaml
|
||||||
|
|
||||||
{{< /tab >}}
|
{{< /tab >}}
|
||||||
|
|
||||||
{{< tab name="strict mTLS" cookie-value="strict" >}}
|
{{< tab name="strict mutual TLS" cookie-value="strict" >}}
|
||||||
This variant will enforce
|
This variant will enforce
|
||||||
[mutual TLS authentication](/docs/concepts/security/#mutual-tls-authentication) between all clients and servers.
|
[mutual TLS authentication](/docs/concepts/security/#mutual-tls-authentication) between all clients and servers.
|
||||||
|
|
||||||
|
|
@ -175,7 +175,7 @@ non-existent resources because they may have been deleted hierarchically.
|
||||||
|
|
||||||
{{< tabset cookie-name="profile" >}}
|
{{< tabset cookie-name="profile" >}}
|
||||||
|
|
||||||
{{< tab name="permissive mTLS" cookie-value="permissive" >}}
|
{{< tab name="permissive mutual TLS" cookie-value="permissive" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl delete -f install/kubernetes/istio-demo.yaml
|
$ kubectl delete -f install/kubernetes/istio-demo.yaml
|
||||||
|
|
@ -183,7 +183,7 @@ $ kubectl delete -f install/kubernetes/istio-demo.yaml
|
||||||
|
|
||||||
{{< /tab >}}
|
{{< /tab >}}
|
||||||
|
|
||||||
{{< tab name="strict mTLS" cookie-value="strict" >}}
|
{{< tab name="strict mutual TLS" cookie-value="strict" >}}
|
||||||
|
|
||||||
{{< text bash >}}
|
{{< text bash >}}
|
||||||
$ kubectl delete -f install/kubernetes/istio-demo-auth.yaml
|
$ kubectl delete -f install/kubernetes/istio-demo-auth.yaml
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue