You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
`.jks` files are password-protected, so you need to provide the password to open the keystore.
297
332
Also, they can include more than one certificate and private key.
298
333
If this is the case:
299
-
334
+
300
335
* Provide and configure the alias of the certificate and the private key you want to use:
301
336
+
302
337
[source,properties]
@@ -317,12 +352,12 @@ Server Name Indication (SNI) is a TLS extension that makes it possible for a cli
317
352
SNI enables a server to present different TLS certificates for multiple domains on a single IP address, which facilitates secure communication for virtual hosting scenarios.
318
353
319
354
To enable SNI:
320
-
355
+
321
356
[source,properties]
322
357
----
323
358
quarkus.tls.key-store.sni=true # Disabled by default
324
359
----
325
-
360
+
326
361
With SNI enabled, the client indicates the server name during the TLS handshake, which allows the server to select the appropriate certificate:
327
362
328
363
* When configuring the keystore with PEM files, multiple certificate (CRT) and key files must be provided.
TlsConfiguration named = certificates.get("name").orElseThrow();
573
608
//...
574
609
----
575
-
610
+
576
611
The `TlsConfiguration` object contains the keystores, truststores, cipher suites, protocols, and other properties.
577
612
It also provides a way to create an `SSLContext` from the configuration.
578
613
@@ -591,9 +626,9 @@ To register a certificate in the TLS registry by using the extension, the _proce
591
626
TlsCertificateBuildItem item = new TlsCertificateBuildItem("named",
592
627
new MyCertificateSupplier());
593
628
----
594
-
629
+
595
630
The certificate supplier is a runtime object generally retrieved by using a recorder method.
596
-
631
+
597
632
.An example of a certificate supplier:
598
633
[source,java]
599
634
----
@@ -937,7 +972,7 @@ Ensure that the path matches the one used in the configuration (here `/etc/tls`)
937
972
. Deploy your application to use the certificate generated by OpenShift.
938
973
This will make the service available over HTTPS.
939
974
940
-
[NOTE]
975
+
[NOTE]
941
976
====
942
977
By setting the `quarkus.tls.key-store.pem.acme.cert` and `quarkus.tls.key-store.pem.acme.key` variables or their environment variable variant, the TLS registry will use the certificate and private key from the secret.
943
978
@@ -1209,7 +1244,7 @@ Even if the Quarkus Development CA is installed, you can generate a self-signed
0 commit comments