diff --git a/content/operate/rs/7.8/security/encryption/tls/enable-tls.md b/content/operate/rs/7.8/security/encryption/tls/enable-tls.md index 2273ab0c16..e33f55f0a7 100644 --- a/content/operate/rs/7.8/security/encryption/tls/enable-tls.md +++ b/content/operate/rs/7.8/security/encryption/tls/enable-tls.md @@ -82,9 +82,13 @@ rladmin tune db < db:id | name > mtls_allow_outdated_certs enabled ## Enable TLS for Active-Active cluster connections -You cannot enable or turn off TLS after the Active-Active database is created, but you can change the TLS configuration. +You can enable TLS for Active-Active cluster connections when you create a database using the Cluster Manager UI, [`crdb-cli`]({{}}), or the [REST API]({{}}). -To enable TLS for Active-Active cluster connections: +If you need to enable or turn off TLS after the Active-Active database is created, you must use [`crdb-cli`]({{}}) or the [REST API]({{}}). + +### Enable TLS during database creation + +To enable TLS for Active-Active cluster connections using the Cluster Manager UI: 1. During [database creation]({{}}), expand the **TLS** configuration section. @@ -96,6 +100,48 @@ To enable TLS for Active-Active cluster connections: If you also want to require TLS for client connections, you must edit the Active-Active database configuration after creation. See [Enable TLS for client connections](#client) for instructions. +### Enable TLS after database creation + +You can enable TLS for an existing Active-Active database using either `crdb-cli` or the REST API. + +{{< multitabs id="enable-tls-post-creation" +tab1="CLI" +tab2="REST API" >}} + +Run the following [`crdb-cli crdb update`]({{}}) command: + +```sh +crdb-cli crdb update --crdb-guid --encryption true +``` + +Replace `` with your Active-Active database's globally unique identifier. + +-tab-sep- + +You can use an [update database configuration]({{}}) request to enable TLS. + +To enable TLS for Active-Active database communications only: + +```sh +PUT https://:9443/v1/bdbs/ +{ + "enforce_client_authentication": "disabled", + "tls_mode": "replica_ssl" +} +``` + +To enable TLS for all communications: + +```sh +PUT https://:9443/v1/bdbs/ +{ + "enforce_client_authentication": "disabled", + "tls_mode": "enabled" +} +``` + +{{< /multitabs >}} + ## Enable TLS for Replica Of cluster connections {{}} diff --git a/content/operate/rs/security/encryption/tls/enable-tls.md b/content/operate/rs/security/encryption/tls/enable-tls.md index 4c9a10dffc..8441d21584 100644 --- a/content/operate/rs/security/encryption/tls/enable-tls.md +++ b/content/operate/rs/security/encryption/tls/enable-tls.md @@ -81,9 +81,13 @@ rladmin tune db < db:id | name > mtls_allow_outdated_certs enabled ## Enable TLS for Active-Active cluster connections -You cannot enable or turn off TLS after the Active-Active database is created, but you can change the TLS configuration. +You can enable TLS for Active-Active cluster connections when you create a database using the Cluster Manager UI, [`crdb-cli`]({{}}), or the [REST API]({{}}). -To enable TLS for Active-Active cluster connections: +If you need to enable or turn off TLS after the Active-Active database is created, you must use [`crdb-cli`]({{}}) or the [REST API]({{}}). + +### Enable TLS during database creation + +To enable TLS for Active-Active cluster connections using the Cluster Manager UI: 1. During [database creation]({{}}), expand the **TLS** configuration section. @@ -95,6 +99,48 @@ To enable TLS for Active-Active cluster connections: If you also want to require TLS for client connections, you must edit the Active-Active database configuration after creation. See [Enable TLS for client connections](#client) for instructions. +### Enable TLS after database creation + +You can enable TLS for an existing Active-Active database using either `crdb-cli` or the REST API. + +{{< multitabs id="enable-tls-post-creation" +tab1="CLI" +tab2="REST API" >}} + +Run the following [`crdb-cli crdb update`]({{}}) command: + +```sh +crdb-cli crdb update --crdb-guid --encryption true +``` + +Replace `` with your Active-Active database's globally unique identifier. + +-tab-sep- + +You can use an [update database configuration]({{}}) request to enable TLS. + +To enable TLS for Active-Active database communications only: + +```sh +PUT https://:9443/v1/bdbs/ +{ + "enforce_client_authentication": "disabled", + "tls_mode": "replica_ssl" +} +``` + +To enable TLS for all communications: + +```sh +PUT https://:9443/v1/bdbs/ +{ + "enforce_client_authentication": "disabled", + "tls_mode": "enabled" +} +``` + +{{< /multitabs >}} + ## Enable TLS for Replica Of cluster connections {{}}