-
Notifications
You must be signed in to change notification settings - Fork 120
/
_oss_xfcc_router.html.md.erb
21 lines (14 loc) · 1.34 KB
/
_oss_xfcc_router.html.md.erb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
#### <a id="xfcc_router_tls"></a> Terminating TLS for the First Time at the Gorouter
If the Gorouter is the first component to stop TLS, such that it receives the certificate of the originating client in the mutual TLS handshake, you must configure the Gorouter to strip any instances of the XFCC header from client requests, set the value of the header to the base64-encoded bytes of the client certificate received in the mutual handshake, and forward the header upstream to the application.
This mode is activated when <code>router.forwarded\_client\_cert: sanitize\_set</code>.
If TLS stops for the first time at Gorouter, the Gorouter must be configured to trust the root certificate authority used to sign the Diego intermediate certificate authority, which in turn is used to sign certificates generated for each Diego container. This trust activates mutual authentication between applications that are running on Cloud Foundry. You must configure the <code>router.ca_certs</code> property for the Gorouter job with the root certificate authority in their BOSH deployment manifest.
<pre>
jobs:
properties:
router:
ca_certs:
-----BEGIN CERTIFICATE-----
(contents of certificate)
-----END CERTIFICATE-----
</pre>
The <code>router.ca_certs</code> property is a string of concatenated certificate authorities in PEM format.