Skip to content

Commit 0c4a1d5

Browse files
MichalMaleraloubyansky
authored andcommitted
TLS reference guide IDs' unification
Signed-off-by: Michal Maléř <[email protected]> (cherry picked from commit fa370b3)
1 parent 9947b27 commit 0c4a1d5

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

docs/src/main/asciidoc/tls-registry-reference.adoc

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The TLS Registry extension is automatically included in your project when you us
2525
As a result, applications that use the TLS Registry can be ready to handle secure communications out of the box.
2626
TLS Registry also provides features like automatic certificate reloading, Let's Encrypt (ACME) integration, Kubernetes Cert-Manager support, and compatibility with various keystore formats, such as PKCS12, PEM, and JKS.
2727

28-
[#using-the-tls-registry]
28+
[[using-the-tls-registry]]
2929
== Using the TLS registry
3030

3131
To configure a TLS connection, including key and truststores, use the `+quarkus.tls.*+` properties.
@@ -126,7 +126,7 @@ quarkus.grpc.server.plain-text=false
126126
+
127127
This configuration enables mTLS by ensuring that both the server and client validate each other's certificates, which provides an additional layer of security.
128128

129-
[#referencing-a-tls-configuration]
129+
[[referencing-a-tls-configuration]]
130130
== Referencing a TLS configuration
131131

132132
To reference an example _named_ configuration that you created by using the `quarkus.tls.<name>.*` properties as explained in <<using-the-tls-registry>>
@@ -257,7 +257,7 @@ quarkus.tls.key-store.jks.alias-password=my-alias-password
257257
* Alternatively, use SNI to select the appropriate certificate and private key.
258258
Note that all keys must use the same password.
259259

260-
[#sni]
260+
[[sni]]
261261
==== SNI
262262

263263
Server Name Indication (SNI) is a TLS extension that makes it possible for a client to specify the host name to which it attempts to connect during the TLS handshake.
@@ -585,7 +585,7 @@ When an application that uses the TLS extension starts, the TLS registry perform
585585

586586
If any of these checks fail, the application will not start.
587587

588-
[#reloading-certificates]
588+
[[reloading-certificates]]
589589
== Reloading certificates
590590

591591
The `TlsConfiguration` obtained from the `TLSConfigurationRegistry` includes a mechanism for reloading certificates.
@@ -1267,12 +1267,11 @@ quarkus.http.insecure-requests=redirect
12671267
12681268
====
12691269

1270-
[[lets-encrypt-prepare]]
1271-
12721270
The challenge is served from the primary HTTP interface (accessible from your DNS domain name).
12731271

12741272
IMPORTANT: Do not start your application yet.
12751273

1274+
[[lets-encrypt-prepare]]
12761275
=== Application preparation
12771276

12781277
Before you request a Let's Encrypt certificate:

0 commit comments

Comments
 (0)