Add ability to specify level of TLS verification for database connections #7636
Labels
c-el
Internal Customer Reference
c-gl
Internal Customer Reference
c-hg
Internal Customer Reference
database-access
Database access related issues and PRs
feature-request
Used for new features in Teleport, improvements to current should be #enhancements
ux
Milestone
What
Currently, Teleport database service always performs full TLS certificate verification when connecting to a target database. This is most secure but inflexible - some teams use their own certificates for their databases which do not always have proper hostname encoded, which they can't replace with Teleport-issued ones. For scenarios like this we need to add an option to lax verification of certificate presented by the database.
How
Instead of introducing binary
insecure_skip_verify
flag, the proposal is to make level of TLS verification more flexible to support different customer use-cases (which have come up before).Example database configuration:
verify-full
(default) does full verification like now. Server name can be optionally overridden, otherwise the one from URI is used.verify-ca
skips hostname verification but checks CA.insecure
is analogous to Go's "insecure_skip_verify" which accepts any certificate.The text was updated successfully, but these errors were encountered: