Replies: 1 comment
-
I'm not totallly sure what your question is. Generally speaking, you This is how X509 chain works. Your client requires a CA root in order |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I was configuration transport tls with one-way authorization with CA cert. I don't want client cert authorization. so I configured as:
cert_path /mypath/fluntd.cer
private_key_path /mypath/flunetd.key
private_key_passphrase password
My question is why it doesn't work? I have to add the CA ROOT in ca_path /mypath/caroot.cert.
In the documation ca_path and client_cert_auth=true are for two-ways authorization. why I used one-way, still need ca_path
Beta Was this translation helpful? Give feedback.
All reactions