1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00
Files
openshift-docs/modules/ossm-config-mtls-min-max.adoc
2025-10-07 12:26:32 -04:00

59 lines
1.7 KiB
Plaintext

:_mod-docs-content-type: PROCEDURE
[id="ossm-security-min-max-tls_{context}"]
== Setting the minimum and maximum protocol versions
If your environment has specific requirements for encrypted traffic in your service mesh, you can control the cryptographic functions that are allowed by setting the `spec.security.controlPlane.tls.minProtocolVersion` or `spec.security.controlPlane.tls.maxProtocolVersion` in your `ServiceMeshControlPlane` resource. Those values, configured in your {SMProductShortName} control plane resource, define the minimum and maximum TLS version used by mesh components when communicating securely over TLS.
The default is `TLS_AUTO` and does not specify a version of TLS.
.Valid values
|===
|Value|Description
|`TLS_AUTO`
| default
|`TLSv1_0`
|TLS version 1.0
|`TLSv1_1`
|TLS version 1.1
|`TLSv1_2`
|TLS version 1.2
|`TLSv1_3`
|TLS version 1.3
|===
.Procedure
. Log in to the web console.
. Click the *Project* menu and select the project where you installed the {SMProductShortName} control plane, for example *istio-system*.
. Click *Ecosystem* -> *Installed Operators*.
. Click *Service Mesh Control Plane* under *Provided APIs*.
. Click the name of your `ServiceMeshControlPlane` resource, for example, `basic`.
. Click the *YAML* tab.
. Insert the following code snippet in the YAML editor. Replace the value in the `minProtocolVersion` with the TLS version value. In this example, the minimum TLS version is set to `TLSv1_2`.
+
.ServiceMeshControlPlane snippet
[source,yaml]
----
kind: ServiceMeshControlPlane
spec:
security:
controlPlane:
tls:
minProtocolVersion: TLSv1_2
----
. Click *Save*.
. Click *Refresh* to verify that the changes updated correctly.