You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/docs/configuration/vault.md
+25-22Lines changed: 25 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,10 +49,11 @@ spec:
49
49
50
50
### Accessing a Vault Server with mTLS enforced
51
51
52
-
In certain use cases, the Vault Server could be configured to enforce clients to present a
53
-
client certificates, those client certificates are just a transport layer enforcement,
52
+
In certain use cases, the [Vault Server could be configured to enforce clients to present a
53
+
client certificates](https://developer.hashicorp.com/vault/docs/configuration/listener/tcp#tls_require_and_verify_client_cert), those client certificates are just a transport layer enforcement,
54
54
it does not provide any authentication and authorization mechanism to the Vault APIs itself.
55
-
You can read more about the Vault server TCP listener [in the official documentation](https://developer.hashicorp.com/vault/docs/configuration/listener/tcp)
55
+
56
+
> 📖 Read about [configuring the Vault server TCP listener](https://developer.hashicorp.com/vault/docs/configuration/listener/tcp).
56
57
57
58
Please follow the steps below to configure Vault with mTLS enforced:
58
59
- Generate the bundle CA and the server TLS certificate:
0 commit comments