You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: app/gateway/ssl-certificates.md
+15-1Lines changed: 15 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -127,7 +127,7 @@ rows:
127
127
128
128
## Configuring SSL connections through kong.conf
129
129
130
-
You can directly upload certificates and keys to {{site.base_gateway}} through configuration in `kong.conf`.
130
+
You can directly upload certificates and keys to {{site.base_gateway}} through [configuration in `kong.conf`](/gateway/configuration/).
131
131
132
132
All of the following parameters can also be set via [environment variables](/gateway/manage-kong-conf/).
133
133
@@ -145,6 +145,7 @@ config:
145
145
- name: status_ssl_cert
146
146
- name: status_ssl_cert_key
147
147
- name: lua_ssl_trusted_certificate
148
+
- name: tls_certificate_verify
148
149
directives:
149
150
- name: nginx_proxy_proxy_ssl_trusted_certificate
150
151
description: |
@@ -153,3 +154,16 @@ directives:
153
154
<!--vale on-->
154
155
155
156
{{site.base_gateway}} also provides many customization settings for SSL connections. See the [Kong Configuration Reference](/gateway/configuration/) for all available options.
You can set [`tls_certificate_verify`](/gateway/configuration/#tls_certificate_verify) to `true` to enforce global certificate verification when connecting to secure endpoints. When this setting is enabled, configurations containing Services or plugins where `tls_verify` is set to `off` will fail to be inserted or updated. You will need to manually update each Service or plugin instance to resolve this error.
161
+
162
+
When certificate verification is enforced:
163
+
164
+
***Traditional deployments** will fail to start if {{site.base_gateway}} detects insecure configurations. This happens when an upstream is configured to use a secure protocol (such as HTTPS) but certificate verification is disabled.
165
+
***Hybrid deployments** will fail to push such insecure configurations to Data Planes that start with this option enabled.
166
+
167
+
This feature is designed primarily for **highly federated environments**, where platform operators need to guarantee that all teams and users deploying configuration through {{site.base_gateway}} adhere to certificate-verification requirements.
168
+
169
+
Keep in mind that enabling certificate verification does not change how {{site.base_gateway}} validates certificates themselves. If you configure Services or system components (such as Postgres or Redis) with certificates that are invalid or self-signed without an appropriate trusted CA, {{site.base_gateway}} will be unable to establish those connections. This behavior is not new. However, enabling global enforcement may surface misconfigurations that were previously unnoticed.
0 commit comments