We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
This issue has been migrated from Redmine: https://dev.icinga.com/issues/12801
Created by bsheqa on 2016-09-26 14:18:32 +00:00
Assignee: (none) Status: Closed (closed on 2016-09-27 12:43:21 +00:00) Target Version: v0.5.0 Last Update: 2016-09-27 12:43:21 +00:00 (in Redmine)
Features with ssl support should support following settings:
ssl
pki
ssk_key_path
ssl_cert_path
ssl_cacert_path
ssl_key
ssl_cert
ssl_cacert
Relations:
The text was updated successfully, but these errors were encountered:
Updated by bsheqa on 2016-09-26 14:18:56 +00:00
Sorry, something went wrong.
Updated by bsheqa on 2016-09-26 14:19:08 +00:00
Updated by bsheqa on 2016-09-26 14:19:17 +00:00
Updated by bsheqa on 2016-09-26 14:20:52 +00:00
Updated by bsheqa on 2016-09-27 12:43:03 +00:00
Updated by bsheqa on 2016-09-27 12:43:21 +00:00
No branches or pull requests
This issue has been migrated from Redmine: https://dev.icinga.com/issues/12801
Created by bsheqa on 2016-09-26 14:18:32 +00:00
Assignee: (none)
Status: Closed (closed on 2016-09-27 12:43:21 +00:00)
Target Version: v0.5.0
Last Update: 2016-09-27 12:43:21 +00:00 (in Redmine)
Features with ssl support should support following settings:
ssl
= true, false (not for api feature)pki
= puppet, none - defaults to puppetssk_key_path
= path to key destination, defults to /etc/icinga2/pki/ssl_cert_path
= path to certificate destination, defaults to /etc/icinga2/pki/ssl_cacert_path
= path to ca destination, by default itssl_key
= key, if pki is not none this is set automatically depending on the pkissl_cert
= certificat, if not none this is set automatically depending on the pkissl_cacert
= ca certificate, if not none this is set automatically depending on the pkiRelations:
The text was updated successfully, but these errors were encountered: