You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
`.jks` files are password-protected, so you need to provide the password to open the keystore.
244
244
Also, they can include more than one certificate and private key.
245
245
If this is the case:
246
-
246
+
247
247
* Provide and configure the alias of the certificate and the private key you want to use:
248
248
+
249
249
[source,properties]
@@ -264,12 +264,12 @@ Server Name Indication (SNI) is a TLS extension that makes it possible for a cli
264
264
SNI enables a server to present different TLS certificates for multiple domains on a single IP address, which facilitates secure communication for virtual hosting scenarios.
265
265
266
266
To enable SNI:
267
-
267
+
268
268
[source,properties]
269
269
----
270
270
quarkus.tls.key-store.sni=true # Disabled by default
271
271
----
272
-
272
+
273
273
With SNI enabled, the client indicates the server name during the TLS handshake, which allows the server to select the appropriate certificate:
274
274
275
275
* When configuring the keystore with PEM files, multiple certificate (CRT) and key files must be provided.
TlsConfiguration named = certificates.get("name").orElseThrow();
520
520
//...
521
521
----
522
-
522
+
523
523
The `TlsConfiguration` object contains the keystores, truststores, cipher suites, protocols, and other properties.
524
524
It also provides a way to create an `SSLContext` from the configuration.
525
525
@@ -538,9 +538,9 @@ To register a certificate in the TLS registry by using the extension, the _proce
538
538
TlsCertificateBuildItem item = new TlsCertificateBuildItem("named",
539
539
new MyCertificateSupplier());
540
540
----
541
-
541
+
542
542
The certificate supplier is a runtime object generally retrieved by using a recorder method.
543
-
543
+
544
544
.An example of a certificate supplier:
545
545
[source,java]
546
546
----
@@ -768,7 +768,6 @@ The generated secret includes the following files:
768
768
769
769
== Working with OpenShift serving certificates
770
770
771
-
When running your application in OpenShift, you can use the link:https://docs.openshift.com/container-platform/4.16/security/certificates/service-serving-certificate.html[OpenShift serving certificates] to generate and renew TLS certificates automatically.
772
771
When running your application in OpenShift, you can use the link:https://docs.openshift.com/container-platform/4.16/security/certificates/service-serving-certificate.html[OpenShift serving certificates] to generate and renew TLS certificates automatically.
773
772
The Quarkus TLS registry can use these certificates and Certificate Authority (CA) files to handle HTTPS traffic and validate certificates securely.
774
773
@@ -876,7 +875,7 @@ Ensure that the path matches the one used in the configuration (here `/etc/tls`)
876
875
. Deploy your application to use the certificate generated by OpenShift.
877
876
This will make the service available over HTTPS.
878
877
879
-
[NOTE]
878
+
[NOTE]
880
879
====
881
880
By setting the `quarkus.tls.key-store.pem.acme.cert` and `quarkus.tls.key-store.pem.acme.key` variables or their environment variable variant, the TLS registry will use the certificate and private key from the secret.
882
881
@@ -1148,7 +1147,7 @@ Even if the Quarkus Development CA is installed, you can generate a self-signed
0 commit comments