tyk.conf
and tyk_analytics.conf
files.
If you need to, generate self-signed certs first and come back.
min_version
setting is optional, you can set it to have Tyk only accept connections from TLS V1.0, 1.1, 1.2 or 1.3 respectively.
The max_version
allows you to disable specific TLS versions, for example if set to 771, you can disable TLS 1.3.
Finally, set the host_config.generate_secure_paths flag to true
in your tyk_analytics.conf
min_version
and max_version
:
TLS Version | Value to Use |
---|---|
1.0 | 769 |
1.1 | 770 |
1.2 | 771 |
1.3 | 772 |
http_server_options
config option ssl_ciphers
in tyk.conf
and tyk-analytics.conf
which takes an array of strings as its value.
ssl_ciphers
is used.
tyk.conf
:TYK_GW_HTTPSERVEROPTIONS_SSLCERTIFICATES=<cert-id>
(if you want to set multiple certificates just separate them using a comma.)Subject.CommonName
or DNSNames
.
Subject.CommonName
is deprecated and its support will be removed in Tyk V5./etc/ssl/certs
For example, if you are using a self-signed cert on the Dashboard, in order for the Gateway to trust it, add it to the Gateway’s certificate store in /etc/ssl/certs
Alternatively, you can disable the verification of SSL certs in the component configurations below. You shouln’t do this in production!
http_server_options.ssl_insecure_skip_verify
to true
in your tyk.conf to allow the use of self-signed certificates when connecting to the Gateway.
http_server_options.ssl_insecure_skip_verify
to true
in your tyk_analytics.conf to allow the use of self-signed certificates when connecting to the Dashboard.
proxy.transport.ssl_insecure_skip_verify
in an API definition to allow Tyk to an insecure HTTPS/TLS API Upstream.
certificates
field, Gateway will dynamically load this ceritficate for your custom domain, so you will not need to restart the process. You can do it from the Dashboard UI too, in the custom domain section.
my-test-tls
in the same namespace as this ApiDefinition resource httpbin
. You can provide the domain certificate in certificate_secret_names
field. Tyk Operator will help you retrieve the certificate from secret and upload it to Tyk.
buraksekili.dev
) with a TLS certificate stored in a Kubernetes secret (custom-domain-secret
).
tyk.conf
and at the API level.
ssl_force_common_name_check
to true
in your tyk.conf
file.
proxy.transport.ssl_force_common_name_check
in your API definition.