mirror of
https://github.com/taigrr/nats.docs
synced 2025-01-18 04:03:23 -08:00
Incorporate details about mutual auth
Signed-off-by: Matthias Hanel <mh@synadia.com>
This commit is contained in:
@@ -7,7 +7,7 @@ The `cluster` configuration map has the following configuration options:
|
||||
| `host` | Interface where the gateway will listen for incoming route connections. |
|
||||
| `port` | Port where the gateway will listen for incoming route connections. |
|
||||
| `listen` | Combines `host` and `port` as `<host>:<port>`. |
|
||||
| `tls` | A [`tls` configuration map](../securing_nats/tls.md) for securing the clustering connection. |
|
||||
| `tls` | A [`tls` configuration map](../securing_nats/tls.md) for securing the clustering connection. `verify` is always enabled and `cert_file` is used for client and server. [See](../securing_nats/tls.md#Wrong-Key-Usage) for certificate pitfalls. |
|
||||
| `advertise` | Hostport `<host>:<port>` to advertise how this server can be contacted by other cluster members. This is useful in setups with NAT. |
|
||||
| `no_advertise` | When set to `true`, do not advertise this server to clients. |
|
||||
| `routes` | A list of other servers \(URLs\) to cluster with. Self-routes are ignored. Should authentication via `token` or `username`/`password` be required, specify them as part of the URL. |
|
||||
|
||||
@@ -1,9 +1,8 @@
|
||||
# TLS Authentication
|
||||
|
||||
When setting up clusters all servers in the cluster, if using TLS, will both verify the connecting endpoints and the server responses. So certificates are checked in both directions. Certificates can be configured only for the server's cluster identity, keeping client and server certificates separate from cluster formation.
|
||||
|
||||
TLS Mutual Authentication _is the recommended way_ of securing routes.
|
||||
When setting up clusters all servers in the cluster, if using TLS, will both verify the connecting endpoints and the server responses. So certificates are checked in [both directions](../securing_nats/tls.md#Wrong-Key-Usage). Certificates can be configured only for the server's cluster identity, keeping client and server certificates separate from cluster formation.
|
||||
|
||||
TLS Mutual Authentication _is the only way_ of securing routes.
|
||||
```text
|
||||
cluster {
|
||||
listen: 127.0.0.1:4244
|
||||
|
||||
Reference in New Issue
Block a user