Skip to content

Commit 09a357b

Browse files
lena-larionovaGuarislocao
authored
feat(gateway): TLS verify support (#3629)
* tls verify support * Apply suggestions from code review Co-authored-by: Vinicius Mignot <[email protected]> * Feedback --------- Co-authored-by: Angel <[email protected]> Co-authored-by: Vinicius Mignot <[email protected]> Co-authored-by: Angel <[email protected]>
1 parent f5cb95e commit 09a357b

File tree

1 file changed

+15
-1
lines changed

1 file changed

+15
-1
lines changed

app/gateway/ssl-certificates.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ rows:
127127

128128
## Configuring SSL connections through kong.conf
129129

130-
You can directly upload certificates and keys to {{site.base_gateway}} through configuration in `kong.conf`.
130+
You can directly upload certificates and keys to {{site.base_gateway}} through [configuration in `kong.conf`](/gateway/configuration/).
131131

132132
All of the following parameters can also be set via [environment variables](/gateway/manage-kong-conf/).
133133

@@ -145,6 +145,7 @@ config:
145145
- name: status_ssl_cert
146146
- name: status_ssl_cert_key
147147
- name: lua_ssl_trusted_certificate
148+
- name: tls_certificate_verify
148149
directives:
149150
- name: nginx_proxy_proxy_ssl_trusted_certificate
150151
description: |
@@ -153,3 +154,16 @@ directives:
153154
<!--vale on-->
154155

155156
{{site.base_gateway}} also provides many customization settings for SSL connections. See the [Kong Configuration Reference](/gateway/configuration/) for all available options.
157+
158+
### Enforcing TLS verification globally {% new_in 3.13 %}
159+
160+
You can set [`tls_certificate_verify`](/gateway/configuration/#tls_certificate_verify) to `true` to enforce global certificate verification when connecting to secure endpoints. When this setting is enabled, configurations containing Services or plugins where `tls_verify` is set to `off` will fail to be inserted or updated. You will need to manually update each Service or plugin instance to resolve this error.
161+
162+
When certificate verification is enforced:
163+
164+
* **Traditional deployments** will fail to start if {{site.base_gateway}} detects insecure configurations. This happens when an upstream is configured to use a secure protocol (such as HTTPS) but certificate verification is disabled.
165+
* **Hybrid deployments** will fail to push such insecure configurations to Data Planes that start with this option enabled.
166+
167+
This feature is designed primarily for **highly federated environments**, where platform operators need to guarantee that all teams and users deploying configuration through {{site.base_gateway}} adhere to certificate-verification requirements.
168+
169+
Keep in mind that enabling certificate verification does not change how {{site.base_gateway}} validates certificates themselves. If you configure Services or system components (such as Postgres or Redis) with certificates that are invalid or self-signed without an appropriate trusted CA, {{site.base_gateway}} will be unable to establish those connections. This behavior is not new. However, enabling global enforcement may surface misconfigurations that were previously unnoticed.

0 commit comments

Comments
 (0)