Skip to content

Commit 9b1ca7d

Browse files
committed
tls: synced the description of the client/server mutual tls auth config setup
Signed-off-by: Hofi <[email protected]>
1 parent d76380a commit 9b1ca7d

File tree

2 files changed

+19
-19
lines changed

2 files changed

+19
-19
lines changed

doc/_admin-guide/100_TLS-encrypted_message_transfer/002_Mutual_authentication_using_TLS/000_Configuring_mutual_TLS_client.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,15 @@ syslog() driver):
1717
1. Create an X.509 certificate for the {{ site.product.short_name }} client.
1818

1919
2. Copy the certificate (for example, client_cert.pem) and the
20-
matching private key (for example, client.key) to the syslog-ng
20+
matching private key (for example, client.key) to the {{ site.product.short_name }}
2121
client host, for example, into the
2222
/opt/syslog-ng/etc/syslog-ng/cert.d directory. The certificate must
23-
be a valid X.509 certificate in PEM format. If you want to use a
24-
password-protected key, see
25-
Password-protected keys.
23+
be a valid X.509 certificate in PEM format. The key must be in PEM format.
24+
If you want to use a password-protected key, see Password-protected keys.
2625

27-
3. Copy the CA certificate of the Certificate Authority (for example,
28-
cacert.pem) that issued the certificate of the {{ site.product.short_name }} server (or
29-
the self-signed certificate of the {{ site.product.short_name }} server) to the
26+
3. Copy the CA certificate (for example, cacert.pem) of the Certificate
27+
Authority that issued the certificate of the {{ site.product.short_name }} server
28+
(or the self-signed certificate of the {{ site.product.short_name }} server) to the
3029
{{ site.product.short_name }} client hosts, for example, into the
3130
/opt/syslog-ng/etc/syslog-ng/ca.d directory.
3231

@@ -49,6 +48,9 @@ syslog() driver):
4948
Include the client\'s certificate and private key in the tls()
5049
options.
5150

51+
For the details of the available tls() options, see
52+
TLS options.
53+
5254
Example: A destination statement using mutual authentication
5355

5456
The following destination encrypts the log messages using TLS and

doc/_admin-guide/100_TLS-encrypted_message_transfer/002_Mutual_authentication_using_TLS/001_Configuring_mutual_TLS_server.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,16 @@ Complete the following steps on the {{ site.product.short_name }} server:
1111

1212
## Steps
1313

14-
1. Copy the certificate (for example, syslog-ng.cert) of the syslog-ng
15-
server to the {{ site.product.short_name }} server host, for example, into the
14+
1. Create an X.509 certificate for the {{ site.product.short_name }} server.
15+
16+
2. Copy the certificate (for example, syslog-ng.cert) and the
17+
matching private key (for example, syslog-ng.key) to the {{ site.product.short_name }}
18+
server host, for example, into the
1619
/opt/syslog-ng/etc/syslog-ng/cert.d directory. The certificate must
17-
be a valid X.509 certificate in PEM format.
20+
be a valid X.509 certificate in PEM format. The key must be in PEM format.
21+
If you want to use a password-protected key, see Password-protected keys.
1822

19-
2. Copy the CA certificate (for example, cacert.pem) of the Certificate
23+
3. Copy the CA certificate (for example, cacert.pem) of the Certificate
2024
Authority that issued the certificate of the {{ site.product.short_name }} clients to
2125
the {{ site.product.short_name }} server, for example, into the
2226
/opt/syslog-ng/etc/syslog-ng/ca.d directory.
@@ -32,17 +36,11 @@ Complete the following steps on the {{ site.product.short_name }} server:
3236

3337
`ln -s cacert.pem 6d2962a8.0`
3438

35-
3. Copy the private key (for example, syslog-ng.key) matching the
36-
certificate of the {{ site.product.short_name }} server to the {{ site.product.short_name }} server host,
37-
for example, into the /opt/syslog-ng/etc/syslog-ng/key.d directory.
38-
The key must be in PEM format. If you want to use a
39-
password-protected key, see Password-protected keys.
40-
4139
4. Add a source statement to the {{ site.product.short_name }} configuration file that uses
4240
the tls( key-file(key_file_fullpathname)
4341
cert-file(cert_file_fullpathname) ) option and specify the key and
4442
certificate files. The source must use the source driver (network()
45-
or syslog()) matching the destination driver used by the syslog-ng
43+
or syslog()) matching the destination driver used by the {{ site.product.short_name }}
4644
client. Also specify the directory storing the certificate of the CA
4745
that issued the client's certificate.
4846

@@ -52,7 +50,7 @@ Complete the following steps on the {{ site.product.short_name }} server:
5250
Example: A source statement using TLS
5351

5452
The following source receives log messages encrypted using TLS,
55-
arriving to the 1999/TCP port of any interface of the syslog-ng
53+
arriving to the 1999/TCP port of any interface of the {{ site.product.short_name }}
5654
server.
5755

5856
```config

0 commit comments

Comments
 (0)