Security with Mutual TLS (mTLS)
By default the TLS protocol only identifies the server to the client using an X.509 certificate, while the authentication of the client to the server is left to the application. Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time. Mutual TLS (mTLS) authentication is optional in TLS but more common in B2B applications.
TBD: use a Loopback Guestbook API and create a Java Spring Boot Web Guestbook UI in a guestbook namespace. The Bookinfo application uses global installation configuration values for global.mtls.enabled and global.controlPlaneSecurityEnabled that may conflict with the service level authentication policy and destinationrules.
Overview
To check is the Bookinfo
application and Istio installation for mTLS enablement.
Authentication policies apply to requests that a service receives. So for each service that you want to require mTLS, you need to apply an authentication policy with a peers: - mtls: {}
section.
To check what authentication policies, istioctl authn, and destination rules are used by Pilot
to config a proxy instance, and to check if TLS settings are compatible between the instances use the istioctl authn tls-check command.
The peers:
section of an Authentication Policy defines the authentication methods and associated parameters supported for transport authentication in a policy.
To get all policies for the default namespace,
To specify client-side authentication rules in mutual TLS, you need to specify the TLSSettings in the DestinationRule,
View the DestinationRule list,
To get the details for a DestinationRule,
To set the trafficPolicy for mTLS edit the DestinationRule spec,
Last updated