mirror of
https://github.com/fleetdm/fleet
synced 2026-05-23 08:58:41 +00:00
Update client auth docs (#2219)
Suggest that users front Fleet with a proxy to do TLS client auth.
This commit is contained in:
parent
bf232e8b68
commit
08225f9c34
1 changed files with 1 additions and 1 deletions
|
|
@ -70,7 +70,7 @@ The value of the environment variable or content of the file should be a secret
|
|||
|
||||
If you use an environment variable for this, you can specify it with the `--enroll_secret_env` flag when you launch osqueryd. If you use a local file for this, you can specify it's path with the `--enroll_secret_path` flag.
|
||||
s
|
||||
If your organization has a robust internal public key infrastructure (PKI) and you already deploy TLS client certificates to each host to uniquely identify them, then osquery supports an advanced authentication mechanism which takes advantage of this. For assitance, please file a [Github issue](https://github.com/kolide/fleet/issues/new) or contact us on [osquery Slack](https://osquery-slack.herokuapp.com/).
|
||||
If your organization has a robust internal public key infrastructure (PKI) and you already deploy TLS client certificates to each host to uniquely identify them, then osquery supports an advanced authentication mechanism which takes advantage of this. Fleet can be fronted with a proxy that will perform the TLS client authentication.
|
||||
|
||||
#### Deploy the TLS certificate that osquery will use to communicate with Fleet
|
||||
|
||||
|
|
|
|||
Loading…
Reference in a new issue