@@ -393,12 +393,12 @@ message ServerTLSSettings {
393
393
PASSTHROUGH = 0 ;
394
394
395
395
// Secure connections with standard TLS semantics. In this mode
396
- // client certificate is not requested during handshake.
396
+ // client certificate is not requested during handshake.
397
397
SIMPLE = 1 ;
398
398
399
399
// Secure connections to the downstream using mutual TLS by
400
400
// presenting server certificates for authentication.
401
- // A client certificate will also be requested during the handshake and
401
+ // A client certificate will also be requested during the handshake and
402
402
// at least one valid certificate is required to be sent by the client.
403
403
MUTUAL = 2 ;
404
404
@@ -424,9 +424,9 @@ message ServerTLSSettings {
424
424
ISTIO_MUTUAL = 4 ;
425
425
426
426
// Similar to MUTUAL mode, except that the client certificate
427
- // is optional. Unlike SIMPLE mode, A client certificate will
428
- // still be explicitly requested during handshake, but the client
429
- // is not required to send a certificate. If a client certificate
427
+ // is optional. Unlike SIMPLE mode, A client certificate will
428
+ // still be explicitly requested during handshake, but the client
429
+ // is not required to send a certificate. If a client certificate
430
430
// is presented, it will be validated. ca_certificates should
431
431
// be specified for validating client certificates.
432
432
OPTIONAL_MUTUAL = 5 ;
@@ -473,6 +473,7 @@ message ServerTLSSettings {
473
473
474
474
// A list of alternate names to verify the subject identity in the
475
475
// certificate presented by the client.
476
+ // Requires TLS mode to be set to `MUTUAL`.
476
477
repeated string subject_alt_names = 6 ;
477
478
478
479
// An optional list of base64-encoded SHA-256 hashes of the SPKIs of
0 commit comments