Search Options

Results per page
Sort
Preferred Languages
Advance

Results 81 - 90 of 268 for MTLS (0.23 sec)

  1. pkg/test/datasets/validation/dataset/security-v1-PeerAuthentication.yaml

    apiVersion: security.istio.io/v1
    kind: PeerAuthentication
    metadata:
      name: valid-peer-authentication
    spec:
      selector:
        matchLabels:
          app: httpbin
          version: v1
      mtls:
        mode: PERMISSIVE
      portLevelMtls:
        8080:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Apr 01 14:30:12 UTC 2024
    - 249 bytes
    - Viewed (0)
  2. pilot/pkg/simulation/traffic.go

    	}
    
    	mTLSSecretConfigName := "default"
    	if input.MtlsSecretConfigName != "" {
    		mTLSSecretConfigName = input.MtlsSecretConfigName
    	}
    
    	// mTLS listener will only accept mTLS traffic
    	if fc.TransportSocket != nil && sim.requiresMTLS(fc, mTLSSecretConfigName) != (input.TLS == MTLS) {
    		// If there is no tls inspector, then
    		result.Error = ErrMTLSError
    		return
    	}
    
    	if len(input.CustomListenerValidations) > 0 {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 01:56:28 UTC 2024
    - 19.4K bytes
    - Viewed (0)
  3. pkg/config/analysis/analyzers/testdata/destinationrule-mutual-port.yaml

    # No caCertificates when mode is mutual at port level
    apiVersion: networking.istio.io/v1alpha3
    kind: DestinationRule
    metadata:
      name: db-mtls
    spec:
      host: mydbserver.prod.svc.cluster.local
      trafficPolicy:
        portLevelSettings:
          - port:
              number: 443
            tls:
              mode: MUTUAL
              clientCertificate: /etc/certs/myclientcert.pem
              privateKey: /etc/certs/client_private_key.pem
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Nov 17 12:28:05 UTC 2021
    - 472 bytes
    - Viewed (0)
  4. tests/integration/security/testdata/reachability/workload-peer-authn.yaml.tmpl

    apiVersion: security.istio.io/v1beta1
    kind: PeerAuthentication
    metadata:
      name: {{ .To.ServiceName }}
    spec:
      selector:
        matchLabels:
          app: {{ .To.ServiceName }}
      mtls:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jul 06 18:43:28 UTC 2022
    - 205 bytes
    - Viewed (0)
  5. releasenotes/notes/40680.yaml

    apiVersion: release-notes/v2
    kind: bug-fix
    area: traffic-management
    issue:
      - 40680
    releaseNotes:
      - |
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Aug 12 11:01:45 UTC 2023
    - 169 bytes
    - Viewed (0)
  6. tests/testdata/config/authn.yaml

    apiVersion: security.istio.io/v1beta1
    kind: PeerAuthentication
    metadata:
      name: default
      namespace: default
    spec:
      mtls:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 11 00:53:03 UTC 2020
    - 145 bytes
    - Viewed (0)
  7. docs/config/README.md

    path_prefix      (path)      namespace prefix to isolate tenants e.g. "customer1/"
    coredns_path     (path)      shared bucket DNS records, default is "/skydns"
    client_cert      (path)      client cert for mTLS authentication
    client_cert_key  (path)      client cert key for mTLS authentication
    comment          (sentence)  optionally add a comment to this setting
    ```
    
    or environment variables
    
    ```
    KEY:
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon Sep 11 21:48:54 UTC 2023
    - 17.7K bytes
    - Viewed (0)
  8. pilot/pkg/networking/grpcgen/lds.go

    	mode := checker.GetMutualTLSModeForPort(si.Port.TargetPort)
    
    	// auto-mtls label is set - clients will attempt to connect using mtls, and
    	// gRPC doesn't support permissive.
    	if node.Labels[label.SecurityTlsMode.Name] == "istio" && mode == model.MTLSPermissive {
    		mode = model.MTLSStrict
    	}
    
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 14.6K bytes
    - Viewed (0)
  9. releasenotes/notes/34118.yaml

    apiVersion: release-notes/v2
    kind: feature
    area: security
    issue:
      - 33809
    releaseNotes:
      - |
        **Added** Auto mTLS support for workload level peer authentication. You no longer need to configure destination rule when servers are configured with workload level peer authentication policy. This can be disabled by setting ENABLE_AUTO_MTLS_CHECK_POLICIES to "false". 
    docs:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jul 21 19:02:56 UTC 2021
    - 480 bytes
    - Viewed (0)
  10. tests/integration/security/testdata/reachability/automtls-passthrough.yaml.tmpl

    # Otherwise, the eastwest gateway will be impacted
    apiVersion: networking.istio.io/v1beta1
    kind: DestinationRule
    metadata:
      name: "eastwest-opt-out"
      annotations:
        test-suite: "beta-mtls-on"
    spec:
      exportTo: [.]
      host: "*"
      trafficPolicy:
        loadBalancer:
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Jul 06 18:43:28 UTC 2022
    - 530 bytes
    - Viewed (0)
Back to top