2020-05-13 21:29:40 +00:00
---
layout: docs
page_title: 'Configuration Entry Kind: Terminating Gateway'
description: >-
The `terminating-gateway` config entry kind allows for configuring terminating gateways
to proxy traffic from services in the Consul service mesh to services outside the mesh.
---
2020-06-18 21:27:06 +00:00
# Terminating Gateway
2020-05-13 21:29:40 +00:00
2021-02-15 13:54:40 +00:00
-> **v1.8.4+:** On Kubernetes, the `TerminatingGateway` custom resource is supported in Consul versions 1.8.4+.<br />
2020-12-16 16:57:43 +00:00
**v1.8.0+:** On other platforms, this config entry is supported in Consul versions 1.8.0+.
2020-05-13 21:29:40 +00:00
2020-12-16 16:57:43 +00:00
The `terminating-gateway` config entry kind (`TerminatingGateway` on Kubernetes) allows you to configure terminating gateways
2020-07-08 23:09:00 +00:00
to proxy traffic from services in the Consul service mesh to services registered with Consul that do not have a
[Connect service sidecar proxy](/docs/connect/proxies). The configuration is associated with the name of a gateway service
and will apply to all instances of the gateway with that name.
2020-05-13 21:29:40 +00:00
~> [Configuration entries](/docs/agent/config-entries) are global in scope. A configuration entry for a gateway name applies
2020-07-08 23:09:00 +00:00
across all federated Consul datacenters. If terminating gateways in different Consul datacenters need to route to different
sets of services within their datacenter then the terminating gateways **must** be registered with different names.
2020-05-13 21:29:40 +00:00
2022-01-10 23:36:16 +00:00
See [Terminating Gateway](/docs/connect/gateways/terminating-gateway) for more information.
2020-05-13 21:29:40 +00:00
## TLS Origination
2021-01-13 20:48:48 +00:00
By specifying a path to a [CA file](/docs/connect/config-entries/terminating-gateway#cafile) connections
2020-07-08 23:09:00 +00:00
from the terminating gateway will be encrypted using one-way TLS authentication. If a path to a
2021-01-13 20:48:48 +00:00
[client certificate](/docs/connect/config-entries/terminating-gateway#certfile)
and [private key](/docs/connect/config-entries/terminating-gateway#keyfile) are also specified connections
2020-07-08 23:09:00 +00:00
from the terminating gateway will be encrypted using mutual TLS authentication.
2022-03-31 19:19:16 +00:00
~> Setting the `SNI` field is strongly recommended when enabling TLS to a service. If this field is not set,
Consul will not attempt to verify the Subject Alternative Name fields in the service's certificate.
2020-07-08 23:09:00 +00:00
If none of these are provided, Consul will **only** encrypt connections to the gateway and not
from the gateway to the destination service.
2020-05-13 21:29:40 +00:00
## Wildcard service specification
2020-07-08 23:09:00 +00:00
Terminating gateways can optionally target all services within a Consul namespace by specifying a wildcard "\*"
as the service name. Configuration options set on the wildcard act as defaults that can be overridden
by options set on a specific service name.
2020-05-13 21:29:40 +00:00
2020-07-08 23:09:00 +00:00
Note that if the wildcard specifier is used, and some services in that namespace have a Connect sidecar proxy,
traffic from the mesh to those services will be evenly load-balanced between the gateway and their sidecars.
2020-05-13 21:29:40 +00:00
## Sample Config Entries
2021-06-13 00:53:50 +00:00
### Access an external service
2021-01-07 00:45:35 +00:00
<Tabs>
<Tab heading="Consul OSS">
2020-06-24 22:10:46 +00:00
2021-06-13 00:53:50 +00:00
Link gateway named "us-west-gateway" with the billing service.
Connections to the external service will be unencrypted.
<CodeTabs tabs={[ "HCL", "Kubernetes YAML", "JSON" ]}>
2020-05-13 21:29:40 +00:00
```hcl
Kind = "terminating-gateway"
Name = "us-west-gateway"
2020-06-24 22:10:46 +00:00
2020-05-13 21:29:40 +00:00
Services = [
{
Name = "billing"
}
]
```
2021-06-13 00:53:50 +00:00
```yaml
apiVersion: consul.hashicorp.com/v1alpha1
kind: TerminatingGateway
metadata:
name: us-west-gateway
spec:
services:
- name: billing
```
```json
{
"Kind": "terminating-gateway",
"Name": "us-west-gateway",
"Services": [
{
"Name": "billing"
}
]
}
```
</CodeTabs>
2020-06-24 22:10:46 +00:00
</Tab>
2021-01-07 00:45:35 +00:00
<Tab heading="Consul Enterprise">
2020-06-24 22:10:46 +00:00
2021-06-13 00:53:50 +00:00
Link gateway named "us-west-gateway" in the default namespace with the billing service in the finance namespace.
Connections to the external service will be unencrypted.
<CodeTabs tabs={[ "HCL", "Kubernetes YAML", "JSON" ]}>
2020-06-24 22:10:46 +00:00
```hcl
Kind = "terminating-gateway"
Name = "us-west-gateway"
Namespace = "default"
Services = [
{
Namespace = "finance"
Name = "billing"
}
]
```
2020-12-16 16:57:43 +00:00
```yaml
apiVersion: consul.hashicorp.com/v1alpha1
kind: TerminatingGateway
metadata:
name: us-west-gateway
spec:
services:
- name: billing
namespace: finance
```
2020-06-24 22:10:46 +00:00
```json
{
"Kind": "terminating-gateway",
"Name": "us-west-gateway",
"Namespace": "default",
"Services": [
{
"Namespace": "finance",
"Name": "billing"
}
]
}
```
2021-06-13 00:53:50 +00:00
</CodeTabs>
2020-06-24 22:10:46 +00:00
</Tab>
</Tabs>
2021-06-13 00:53:50 +00:00
### Access an external service over TLS
2021-01-07 00:45:35 +00:00
<Tabs>
<Tab heading="Consul OSS">
2020-06-24 22:10:46 +00:00
2021-06-13 00:53:50 +00:00
Link gateway named "us-west-gateway" with the billing service, and specify a CA
file to be used for one-way TLS authentication.
2022-08-19 20:51:11 +00:00
-> **Note**: When not using destinations in transparent proxy mode, you must specify the `CAFile` parameter
and point to a valid CA bundle in order to properly initiate a TLS
connection to the destination service. For more information about configuring a gateway for destinations, refer to [Register an External Service as a Destination](/docs/k8s/connect/terminating-gateways#register-an-external-service-as-a-destination).
2021-06-13 00:53:50 +00:00
<CodeTabs tabs={[ "HCL", "Kubernetes YAML", "JSON" ]}>
2020-05-13 21:29:40 +00:00
```hcl
Kind = "terminating-gateway"
Name = "us-west-gateway"
2020-06-24 22:10:46 +00:00
2020-05-13 21:29:40 +00:00
Services = [
{
2020-06-24 22:10:46 +00:00
Name = "billing"
CAFile = "/etc/certs/ca-chain.cert.pem"
2022-03-31 20:46:14 +00:00
SNI = "billing.service.com"
2020-06-24 22:10:46 +00:00
}
]
```
2021-06-13 00:53:50 +00:00
```yaml
apiVersion: consul.hashicorp.com/v1alpha1
kind: TerminatingGateway
metadata:
name: us-west-gateway
spec:
services:
- name: billing
caFile: /etc/certs/ca-chain.cert.pem
2022-03-31 20:46:14 +00:00
sni: billing.service.com
2021-06-13 00:53:50 +00:00
```
```json
{
"Kind": "terminating-gateway",
"Name": "us-west-gateway",
"Services": [
{
"Name": "billing",
"CAFile": "/etc/certs/ca-chain.cert.pem"
2022-03-31 20:46:14 +00:00
"SNI": "billing.service.com"
2021-06-13 00:53:50 +00:00
}
]
}
```
</CodeTabs>
2020-06-24 22:10:46 +00:00
</Tab>
2021-01-07 00:45:35 +00:00
<Tab heading="Consul Enterprise">
2020-06-24 22:10:46 +00:00
Link gateway named "us-west-gateway" in the default namespace with the billing service in the finance namespace,
2021-06-13 00:53:50 +00:00
and specify a CA file to be used for one-way TLS authentication.
-> **Note**: The `CAFile` parameter must be specified _and_ point to a valid CA
bundle in order to properly initiate a TLS connection to the destination service.
<CodeTabs tabs={[ "HCL", "Kubernetes YAML", "JSON" ]}>
2020-06-24 22:10:46 +00:00
```hcl
Kind = "terminating-gateway"
Name = "us-west-gateway"
Namespace = "default"
Services = [
{
Namespace = "finance"
Name = "billing"
2020-05-13 21:29:40 +00:00
CAFile = "/etc/certs/ca-chain.cert.pem"
2022-03-31 20:46:14 +00:00
SNI = "billing.service.com"
2020-05-13 21:29:40 +00:00
}
]
```
2020-12-16 16:57:43 +00:00
```yaml
apiVersion: consul.hashicorp.com/v1alpha1
kind: TerminatingGateway
metadata:
name: us-west-gateway
spec:
services:
- name: billing
namespace: finance
caFile: /etc/certs/ca-chain.cert.pem
2022-03-31 20:46:14 +00:00
sni: billing.service.com
2020-12-16 16:57:43 +00:00
```
2020-06-24 22:10:46 +00:00
```json
{
"Kind": "terminating-gateway",
"Name": "us-west-gateway",
"Namespace": "default",
"Services": [
{
"Namespace": "finance",
"Name": "billing",
2022-03-31 20:46:14 +00:00
"CAFile": "/etc/certs/ca-chain.cert.pem",
"SNI": "billing.service.com"
2020-06-24 22:10:46 +00:00
}
]
}
```
2021-06-13 00:53:50 +00:00
</CodeTabs>
2020-06-24 22:10:46 +00:00
</Tab>
</Tabs>
2021-06-13 00:53:50 +00:00
### Access an external service over mutual TLS
2021-01-07 00:45:35 +00:00
<Tabs>
<Tab heading="Consul OSS">
2020-06-24 22:10:46 +00:00
2021-06-13 00:53:50 +00:00
Link gateway named "us-west-gateway" with the billing service, and specify a CA
file, key file, and cert file to be used for mutual TLS authentication.
-> **Note**: The `CAFile` parameter must be specified _and_ point to a valid CA
bundle in order to properly initiate a TLS connection to the destination service.
<CodeTabs tabs={[ "HCL", "Kubernetes YAML", "JSON" ]}>
2020-05-13 21:29:40 +00:00
```hcl
Kind = "terminating-gateway"
Name = "us-west-gateway"
2020-06-24 22:10:46 +00:00
2020-05-13 21:29:40 +00:00
Services = [
{
2020-06-24 22:10:46 +00:00
Name = "billing"
CAFile = "/etc/certs/ca-chain.cert.pem"
KeyFile = "/etc/certs/gateway.key.pem"
CertFile = "/etc/certs/gateway.cert.pem"
2022-03-31 20:46:14 +00:00
SNI = "billing.service.com"
2020-06-24 22:10:46 +00:00
}
]
```
2021-06-13 00:53:50 +00:00
```yaml
apiVersion: consul.hashicorp.com/v1alpha1
kind: TerminatingGateway
metadata:
name: us-west-gateway
spec:
services:
- name: billing
caFile: /etc/certs/ca-chain.cert.pem
keyFile: /etc/certs/gateway.key.pem
certFile: /etc/certs/gateway.cert.pem
2022-03-31 20:46:14 +00:00
sni: billing.service.com
2021-06-13 00:53:50 +00:00
```
```json
{
"Kind": "terminating-gateway",
"Name": "us-west-gateway",
"Services": [
{
"Name": "billing",
"CAFile": "/etc/certs/ca-chain.cert.pem",
"KeyFile": "/etc/certs/gateway.key.pem",
2022-03-31 20:46:14 +00:00
"CertFile": "/etc/certs/gateway.cert.pem",
"SNI": "billing.service.com"
2021-06-13 00:53:50 +00:00
}
]
}
```
</CodeTabs>
2020-06-24 22:10:46 +00:00
</Tab>
2021-01-07 00:45:35 +00:00
<Tab heading="Consul Enterprise">
2020-06-24 22:10:46 +00:00
2021-06-13 00:53:50 +00:00
Link gateway named "us-west-gateway" in the default namespace with the billing service in the finance namespace.
Also specify a CA file, key file, and cert file to be used for mutual TLS authentication.
-> **Note**: The `CAFile` parameter must be specified _and_ point to a valid CA
bundle in order to properly initiate a TLS connection to the destination service.
<CodeTabs tabs={[ "HCL", "Kubernetes YAML", "JSON" ]}>
2020-06-24 22:10:46 +00:00
```hcl
Kind = "terminating-gateway"
Name = "us-west-gateway"
Namespace = "default"
Services = [
{
Namespace = "finance"
Name = "billing"
2020-05-13 21:29:40 +00:00
CAFile = "/etc/certs/ca-chain.cert.pem"
KeyFile = "/etc/certs/gateway.key.pem"
CertFile = "/etc/certs/gateway.cert.pem"
2022-03-31 20:46:14 +00:00
SNI = "billing.service.com"
2020-05-13 21:29:40 +00:00
}
]
```
2020-12-16 16:57:43 +00:00
```yaml
apiVersion: consul.hashicorp.com/v1alpha1
kind: TerminatingGateway
metadata:
name: us-west-gateway
spec:
services:
- name: billing
namespace: finance
caFile: /etc/certs/ca-chain.cert.pem
keyFile: /etc/certs/gateway.key.pem
certFile: /etc/certs/gateway.cert.pem
2022-03-31 20:46:14 +00:00
sni: billing.service.com
2020-12-16 16:57:43 +00:00
```
2020-06-24 22:10:46 +00:00
```json
{
"Kind": "terminating-gateway",
"Name": "us-west-gateway",
"Namespace": "default",
"Services": [
{
"Namespace": "finance",
"Name": "billing",
"CAFile": "/etc/certs/ca-chain.cert.pem",
"KeyFile": "/etc/certs/gateway.key.pem",
2022-03-31 20:46:14 +00:00
"CertFile": "/etc/certs/gateway.cert.pem",
"SNI": "billing.service.com"
2020-06-24 22:10:46 +00:00
}
]
}
```
2021-06-13 00:53:50 +00:00
</CodeTabs>
2020-06-24 22:10:46 +00:00
</Tab>
</Tabs>
2021-06-13 00:53:50 +00:00
### Override connection parameters for a specific service
2021-01-07 00:45:35 +00:00
<Tabs>
<Tab heading="Consul OSS">
2020-06-24 22:10:46 +00:00
Link gateway named "us-west-gateway" with all services in the datacenter, and configure default certificates for mutual TLS.
2021-06-13 00:53:50 +00:00
Override the SNI and CA file used for connections to the billing service.
<CodeTabs tabs={[ "HCL", "Kubernetes YAML", "JSON" ]}>
<CodeBlockConfig highlight="11-15">
2020-05-13 21:29:40 +00:00
2020-06-24 22:10:46 +00:00
```hcl
Kind = "terminating-gateway"
Name = "us-west-gateway"
Services = [
{
Name = "*"
CAFile = "/etc/common-certs/ca-chain.cert.pem"
KeyFile = "/etc/common-certs/gateway.key.pem"
CertFile = "/etc/common-certs/gateway.cert.pem"
},
{
Name = "billing"
2022-03-31 20:46:14 +00:00
CAFile = "/etc/billing-ca/ca-chain.cert.pem"
2020-06-24 22:10:46 +00:00
SNI = "billing.service.com"
}
]
```
2021-06-13 00:53:50 +00:00
</CodeBlockConfig>
<CodeBlockConfig highlight="11-13">
```yaml
apiVersion: consul.hashicorp.com/v1alpha1
kind: TerminatingGateway
metadata:
name: us-west-gateway
spec:
services:
- name: '*'
caFile: /etc/common-certs/ca-chain.cert.pem
keyFile: /etc/common-certs/gateway.key.pem
certFile: /etc/common-certs/gateway.cert.pem
- name: billing
caFile: /etc/billing-ca/ca-chain.cert.pem
sni: billing.service.com
```
</CodeBlockConfig>
<CodeBlockConfig highlight="11-15">
```json
{
"Kind": "terminating-gateway",
"Name": "us-west-gateway",
"Services": [
{
"Name": "*",
"CAFile": "/etc/common-certs/ca-chain.cert.pem",
"KeyFile": "/etc/common-certs/gateway.key.pem",
"CertFile": "/etc/common-certs/gateway.cert.pem"
},
{
"Name": "billing",
"CAFile": "/etc/billing-ca/ca-chain.cert.pem",
"SNI": "billing.service.com"
}
]
}
```
</CodeBlockConfig>
</CodeTabs>
2020-06-24 22:10:46 +00:00
</Tab>
2021-01-07 00:45:35 +00:00
<Tab heading="Consul Enterprise">
2020-06-24 22:10:46 +00:00
2020-07-08 23:09:00 +00:00
Link gateway named "us-west-gateway" in the default namespace with all services in the finance namespace,
2021-06-13 00:53:50 +00:00
and configure default certificates for mutual TLS.
Override the SNI and CA file used for connections to the billing service:
<CodeTabs tabs={[ "HCL", "Kubernetes YAML", "JSON" ]}>
<CodeBlockConfig highlight="13-18">
2020-06-24 22:10:46 +00:00
2020-05-13 21:29:40 +00:00
```hcl
Kind = "terminating-gateway"
Name = "us-west-gateway"
Namespace = "default"
2020-06-24 22:10:46 +00:00
2020-05-13 21:29:40 +00:00
Services = [
{
Namespace = "finance"
Name = "*"
CAFile = "/etc/common-certs/ca-chain.cert.pem"
KeyFile = "/etc/common-certs/gateway.key.pem"
CertFile = "/etc/common-certs/gateway.cert.pem"
},
{
Namespace = "finance"
Name = "billing"
2021-06-13 00:53:50 +00:00
CAFile = "/etc/billing-ca/ca-chain.cert.pem"
2020-06-24 22:10:46 +00:00
SNI = "billing.service.com"
2020-05-13 21:29:40 +00:00
}
]
```
2021-06-13 00:53:50 +00:00
</CodeBlockConfig>
2020-12-16 16:57:43 +00:00
2021-06-13 00:53:50 +00:00
<CodeBlockConfig highlight="12-15">
2020-12-16 16:57:43 +00:00
```yaml
apiVersion: consul.hashicorp.com/v1alpha1
kind: TerminatingGateway
metadata:
name: us-west-gateway
spec:
services:
- name: '*'
namespace: finance
caFile: /etc/common-certs/ca-chain.cert.pem
keyFile: /etc/common-certs/gateway.key.pem
certFile: /etc/common-certs/gateway.cert.pem
- name: billing
namespace: finance
caFile: /etc/billing-ca/ca-chain.cert.pem
sni: billing.service.com
```
2021-06-13 00:53:50 +00:00
</CodeBlockConfig>
2020-06-24 22:10:46 +00:00
2021-06-13 00:53:50 +00:00
<CodeBlockConfig highlight="13-18">
2020-06-24 22:10:46 +00:00
```json
{
"Kind": "terminating-gateway",
"Name": "us-west-gateway",
"Namespace": "default",
"Services": [
2020-07-08 23:09:00 +00:00
{
2020-06-24 22:10:46 +00:00
"Namespace": "finance",
"Name": "*",
2021-06-13 00:53:50 +00:00
"CAFile": "/etc/common-certs/ca-chain.cert.pem",
"KeyFile": "/etc/common-certs/gateway.key.pem",
"CertFile": "/etc/common-certs/gateway.cert.pem"
2020-06-24 22:10:46 +00:00
},
2020-07-08 23:09:00 +00:00
{
2020-06-24 22:10:46 +00:00
"Namespace": "finance",
"Name": "billing",
"CAFile": "/etc/billing-ca/ca-chain.cert.pem",
2020-07-08 23:09:00 +00:00
"SNI": "billing.service.com"
2020-06-24 22:10:46 +00:00
}
]
}
```
2021-06-13 00:53:50 +00:00
</CodeBlockConfig>
</CodeTabs>
2020-06-24 22:10:46 +00:00
</Tab>
</Tabs>
2020-05-13 21:29:40 +00:00
## Available Fields
2020-12-16 16:57:43 +00:00
<ConfigEntryReference
keys={[
{
name: 'apiVersion',
description: 'Must be set to `consul.hashicorp.com/v1alpha1`',
hcl: false,
},
{
name: 'Kind',
description: {
hcl: 'Must be set to `terminating-gateway`',
yaml: 'Must be set to `TerminatingGateway`',
},
},
{
name: 'Name',
description: 'Set to the name of the gateway being configured.',
type: 'string: <required>',
yaml: false,
},
{
name: 'Namespace',
type: `string: "default"`,
enterprise: true,
description:
2021-12-21 00:30:39 +00:00
'Specifies the namespace to which the configuration entry will apply. This must match the namespace in which the gateway is registered.' +
2022-03-30 21:16:26 +00:00
' If omitted, the namespace will be inherited from [the request](/api-docs/config#ns)' +
2020-12-16 16:57:43 +00:00
' or will default to the `default` namespace.',
yaml: false,
},
2021-12-21 00:30:39 +00:00
{
name: 'Partition',
type: `string: "default"`,
enterprise: true,
description:
'Specifies the admin partition to which the configuration entry will apply. This must match the partition in which the gateway is registered.' +
2022-03-30 21:16:26 +00:00
' If omitted, the partition will be inherited from [the request](/api-docs/config)' +
2021-12-21 00:30:39 +00:00
' or will default to the `default` partition.',
yaml: false,
},
2020-12-16 16:57:43 +00:00
{
name: 'Meta',
type: 'map<string|string>: nil',
description:
'Specifies arbitrary KV metadata pairs. Added in Consul 1.8.4.',
yaml: false,
},
{
name: 'metadata',
children: [
{
name: 'name',
description: 'Set to the name of the gateway being configured.',
},
2021-01-07 19:22:06 +00:00
{
name: 'namespace',
description:
'If running Consul Open Source, the namespace is ignored (see [Kubernetes Namespaces in Consul OSS](/docs/k8s/crds#consul-oss)). If running Consul Enterprise see [Kubernetes Namespaces in Consul Enterprise](/docs/k8s/crds#consul-enterprise) for more details.',
},
2020-12-16 16:57:43 +00:00
],
hcl: false,
},
{
name: 'Services',
type: 'array<LinkedService>: <optional>',
2022-08-08 20:28:37 +00:00
description: `A list of services or destinations to link
2020-12-16 16:57:43 +00:00
with the gateway. The gateway will proxy traffic to these services. These linked services
must be registered with Consul for the gateway to discover their addresses. They must also
2022-08-08 20:28:37 +00:00
be registered in the same Consul datacenter as the terminating gateway.
Destinations are an exception to this requirement, and only need to be defined as a service-defaults configuration entry in the same datacenter.
If Consul ACLs are enabled, the Terminating Gateway's ACL token must grant <code>service:write</code> for all linked services.`,
2020-12-16 16:57:43 +00:00
children: [
{
name: 'Name',
type: 'string: ""',
description:
'The name of the service to link with the gateway. If the wildcard specifier, `*`, is provided, then ALL services within the namespace will be linked with the gateway.',
},
{
name: 'Namespace',
enterprise: true,
type: 'string: ""',
description:
'The namespace of the service. If omitted, the namespace will be inherited from the config entry.',
},
{
name: 'CAFile',
type: 'string: ""',
description: `A file path to a PEM-encoded certificate authority.
The file must be present on the proxy's filesystem.
The certificate authority is used to verify the authenticity of the service linked with the gateway.
It can be provided along with a CertFile and KeyFile for mutual TLS authentication, or on its own
for one-way TLS authentication. If none is provided the gateway <b>will not</b> encrypt the traffic to the destination.`,
},
{
name: 'CertFile',
type: 'string: ""',
description: {
hcl: `A file path to a PEM-encoded certificate.
The file must be present on the proxy's filesystem.
The certificate is provided servers to verify the gateway's authenticity. It must be provided if a \`KeyFile\` was specified.`,
yaml: `A file path to a PEM-encoded certificate.
The file must be present on the proxy's filesystem.
The certificate is provided servers to verify the gateway's authenticity. It must be provided if a \`keyFile\` was specified.`,
},
},
{
name: 'KeyFile',
type: 'string: ""',
description: {
hcl: `A file path to a PEM-encoded private key.
The file must be present on the proxy's filesystem.
The key is used with the certificate to verify the gateway's authenticity. It must be provided along if a \`CertFile\` was specified.`,
yaml: `A file path to a PEM-encoded private key.
The file must be present on the proxy's filesystem.
The key is used with the certificate to verify the gateway's authenticity. It must be provided along if a \`certFile\` was specified.`,
},
},
{
name: 'SNI',
type: 'string: ""',
description:
'An optional hostname or domain name to specify during the TLS handshake.',
},
],
},
]}
/>
2020-05-13 21:29:40 +00:00
## ACLs
2020-10-14 15:23:05 +00:00
Configuration entries may be protected by [ACLs](/docs/security/acl).
2020-05-13 21:29:40 +00:00
Reading a `terminating-gateway` config entry requires `service:read` on the `Name`
field of the config entry.
Creating, updating, or deleting a `terminating-gateway` config entry requires
`operator:write`.