Hi,
I've a domain name example.com
. I want to use *.lan.example.com
to access services behind Ziti overlay.
From the few researches I've done on the doc + on this forum, it looks like I just need to provide the certificate + key on the controller config under web.identity
where I've the edge-client
and edge-oidc
bindings.
The controller config would look like :
web:
- name: public-apis
bindPoints:
- interface: 0.0.0.0:1280
address: <FQDN>:1280
identity:
ca: "pki/root/certs/root.cert"
key: "pki/intermediate/keys/server.key"
server_cert: "pki/intermediate/certs/server.chain.pem"
cert: "pki/intermediate/certs/client.chain.pem"
#alt_server_certs: <ADD CERT + KEY HERE !!>
#- server_cert: ""
# server_key: ""
options:
idleTimeout: 5000ms
readTimeout: 5000ms
writeTimeout: 100000ms
minTLSVersion: TLS1.2
maxTLSVersion: TLS1.3
apis:
- binding: edge-oidc
options: { }
- binding: edge-client
options: { }
- name: dark-apis
bindPoints:
- interface: 0.0.0.0:1280
address: 127.0.0.1:1280
identity:
ca: "pki/root/certs/root.cert"
key: "pki/intermediate/keys/server.key"
server_cert: "pki/intermediate/certs/server.chain.pem"
cert: "pki/intermediate/certs/client.chain.pem"
options:
idleTimeout: 5000ms
readTimeout: 5000ms
writeTimeout: 100000ms
minTLSVersion: TLS1.2
maxTLSVersion: TLS1.3
apis:
- binding: edge-management
options: { }
- binding: fabric
options: { }
- binding: zac
options:
location: /ziti-console
indexFile: index.html
But I've also noticed the same commented out configs on the router config and at the top level of the controller config.
v: 3
identity:
cert: "router.cert"
server_cert: "/ziti-router/router.server.chain.cert"
key: "/ziti-router/router.key"
ca: "/ziti-router/router.cas"
#alt_server_certs:
# - server_cert: ""
# server_key: ""
Do I need to configure these aswell ?