mirror of
https://github.com/taigrr/nats.docs
synced 2025-01-18 04:03:23 -08:00
GitBook: [master] 6 pages and 10 assets modified
This commit is contained in:
committed by
gitbook-bot
parent
e52dcd9682
commit
9f2fec4dfb
@@ -101,16 +101,7 @@ gateway {
|
||||
|
||||
### TLS Entry
|
||||
|
||||
In addition to the normal TLS configuration advice, bear in mind that
|
||||
TLS keys and certificates for multiple clusters, or servers in different
|
||||
locations, rarely rotate at the exact same time and that Certificate
|
||||
Authorities do roll between multiple Intermediate certificates.
|
||||
In addition to the normal TLS configuration advice, bear in mind that TLS keys and certificates for multiple clusters, or servers in different locations, rarely rotate at the exact same time and that Certificate Authorities do roll between multiple Intermediate certificates.
|
||||
|
||||
If using a certificate bundle which accompanied the issuance of a certificate then the CA in that bundle will typically be for just that certificate. Using _only_ that CA as the CA for gateway authentication is ill-advised. You should ensure that you allow for rolling between Certificate Authorities, even if only between multiple CAs from the same organization entity, and use a separate certificate bundle for _verification_ of peers. This way when DC-B rolls before DC-A, it will not be cut off from your supercluster.
|
||||
|
||||
If using a certificate bundle which accompanied the issuance of a certificate
|
||||
then the CA in that bundle will typically be for just that certificate.
|
||||
Using _only_ that CA as the CA for gateway authentication is ill-advised.
|
||||
You should ensure that you allow for rolling between Certificate Authorities,
|
||||
even if only between multiple CAs from the same organization entity,
|
||||
and use a separate certificate bundle for _verification_ of peers.
|
||||
This way when DC-B rolls before DC-A, it will not be cut off from your
|
||||
supercluster.
|
||||
|
||||
Reference in New Issue
Block a user