mscb402 commented on code in PR #8915:
URL: https://github.com/apache/apisix/pull/8915#discussion_r1119506932
##########
docs/en/latest/FAQ.md:
##########
@@ -704,6 +704,14 @@ Another solution is to switch to an experimental
gRPC-based configuration synchr
prefix: "/apisix"
```
+## What is the difference between SSLS and tls.client_cert in upstream
configurations, and ssl_trusted_certificate in config-default.yaml?
+
+The `ssls` is managed through the `/apisix/admin/ssls` API. If APISIX needs to
receive HTTPS requests from the Internet, the certificate stored here is used
for handshake. Multiple certificates can be configured in SSLS, and APISIX uses
Server Name Indication (SNI) to differentiate between certificates of different
domains.
+
+The `tls.client_cert`, `tls.client_key`, and `tls.client_cert_id` in upstream
are actually certificates for the client, used in cases where mTLS
communication is required with the upstream.
+
+The `ssl_trusted_certificate` in config-default.yaml configures a trusted root
certificate. It is only used for accessing services with self-signed
certificates (such as Keycloak) within APISIX, to avoid prompting that the
certificate of the other party is invalid. Note that it is not used to trust
the certificates of APISIX upstream, because APISIX does not verify the
legality of the upstream certificates. Therefore, even if the upstream uses an
invalid TLS certificate, it can still be accessed without configuring a root
certificate.
Review Comment:
Fixed
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: [email protected]
For queries about this service, please contact Infrastructure at:
[email protected]