Skip to content

Commit dcbb1bb

Browse files
committed
DOC-10245 Add reference to Enforcing TLS in setting-security doc
Change-Id: If30d0c3481097894e49453e781460ccbdc5c806b Reviewed-on: https://review.couchbase.org/c/couchbase-cli/+/178393 Tested-by: Build Bot <build@couchbase.com> Well-Formed: Restriction Checker Reviewed-by: James Lee <james.lee@couchbase.com>
1 parent 52c564b commit dcbb1bb

1 file changed

Lines changed: 4 additions & 1 deletion

File tree

docs/modules/cli/pages/cbcli/couchbase-cli-setting-security.adoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ include::{partialsdir}/cbcli/part-common-options.adoc[]
4646
endpoint but will not disable access to the `http://<addr>:8091/logs` endpoint
4747
since it is used by the REST API and not Web UI). If your goal is to disable
4848
non-local http access completely, you should use the `--cluster-encryption-level`
49-
flag and set it's value to "strict".
49+
flag and set its value to "strict".
5050

5151
--disable-www-authenticate <0|1>::
5252
Specifies whether Couchbase Server will respond with WWW-Authenticate to
@@ -62,6 +62,9 @@ include::{partialsdir}/cbcli/part-common-options.adoc[]
6262
be sent encrypted. If the level is "strict" it is the same as having the
6363
level "all" but all non-TLS ports on non-loopback interfaces will be closed.
6464
By default when cluster encryption is turned on, the level will be "control".
65+
Before setting the level to "strict" you will need to perform a number of
66+
important actions, see
67+
https://docs.couchbase.com/server/current/manage/manage-security/manage-tls.html#enforcing-tls[Enforcing TLS].
6568

6669
--tls-min-version <tlsv1|tlsv1.1|tlsv1.2>::
6770
Specify the minimum TLS protocol version to be used across all of the

0 commit comments

Comments
 (0)