Update website/content/docs/connect/config-entries/mesh.mdx (#12943)
Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com> Signed-off-by: Mark Anderson <manderson@hashicorp.com> Co-authored-by: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com>
This commit is contained in:
parent
f315eee98f
commit
f4c4c0e9ae
|
@ -368,9 +368,9 @@ Note that the Kubernetes example does not include a `partition` field. Configura
|
|||
name: 'SanitizeXForwardedClientCert',
|
||||
yaml: false,
|
||||
type: 'bool: <optional>',
|
||||
description: `Set the envoy \`forward_client_cert_details\` option to \`SANITIZE\` for all proxies. This
|
||||
configures Envoy to not send the \`x-forwarded-client-cert\` header to the next hop. If
|
||||
unspecified or \`false\`, the XFCC header is propagated to upstream applications.`,
|
||||
description: `If configured to \`true\`, the \`forward_client_cert_details\` option will be set to \`SANITIZE\`
|
||||
for all Envoy proxies. As a result, Consul will not include the \`x-forwarded-client-cert\` header in the next hop.
|
||||
If set to \`false\` (default), the XFCC header is propagated to upstream applications.`,
|
||||
},
|
||||
],
|
||||
},
|
||||
|
|
Loading…
Reference in New Issue