I can live with it.  I still feel like there should be a way to bypass the
validation, but I don't have a compelling reason for that right now.  Maybe
when I get my hands on this new code I will, but that can be a different
discussion.

Thanks for the follow through Rawlin, it is much appreciated.

On Fri, Nov 30, 2018 at 12:56 PM Hank Beatty <[email protected]> wrote:

> +1
>
> On 11/30/2018 02:43 PM, Rawlin Peters wrote:
> > If you want your self-signed certs to be fully validated by the API,
> > you will need to create an internal signing authority, sign your
> > created certs using that internal signing authority, and install the
> > internal signing authority certs on your TO servers. This is what I
> > would recommend as it provides full verification of your "self-signed"
> > certs because they will appear to be "real" certs and won't emit a
> > warning from the API. That exercise is left up to the administrator.
>
> I know that this is outside Traffic Control but, do you know where I
> could find some documentation on doing what you describe above?
>
> Thanks,
> Hank
>
  • ... Eric Friedrich -X (efriedri - TRITON UK BIDCO LIMITED c/o Alter Domus (UK) Limited -OBO at Cisco)
    • ... Dave Neuman
    • ... Jeremy Mitchell
      • ... Gray, Jonathan
        • ... Rawlin Peters
          • ... Gray, Jonathan
            • ... Jeremy Mitchell
  • ... Hank Beatty
    • ... Rawlin Peters
      • ... Hank Beatty
        • ... Dave Neuman
        • ... Rawlin Peters
          • ... Gray, Jonathan
            • ... Dave Neuman
              • ... John Rushford

Reply via email to