You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/webhooks/03-Mutual-TLS.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,10 +21,10 @@ These steps assume you already have server authentication setup.
21
21
22
22
In general, there are five steps needed to turn on client authentication for your server:
23
23
24
-
1. Download the PEM version of the [DigiCert Global Root CA](https://cacerts.digicert.com/DigiCertGlobalRootCA.crt.pem) certificate.
24
+
1. Download the PEM version of the DigiCert Root certificate from our [Public Certificates Page](../../docs/webhooks/08-Certificates.md).
25
25
2. Turn on client certificate verification.
26
26
3. Specify the CA certificate from step 1 as trusted.
27
-
4. Set the verification depth to 2 since our PagerDuty certificate is actually signed by the [DigiCert SHA2 Secure Server CA](https://dl.cacerts.digicert.com/DigiCertSHA2SecureServerCA.crt) which is an intermediate CA under DigiCert Global Root CA.
27
+
4. Set the verification depth to 2 since our PagerDuty certificate is actually signed by an intermediate.
28
28
5. Verify the client certificate is actually from PagerDuty by inspecting its Subject Domain Name.
29
29
30
30
Now we will go over sample server configurations for NGINX and Apache.
0 commit comments