You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| sslmode | disable \| require \| verify-ca | TLS option, the default is `disable`. If `verify-ca` is set, the TLS certificate configured in the Dgraph cluster must be from a valid certificate authority. |
| sslmode | disable \| require \| verify-ca | TLS option, the default is `disable`. If `verify-ca` is set, the TLS certificate configured in the Dgraph cluster must be from a valid certificate authority. |
56
+
57
+
Note that using `sslmode=require` disables certificate validation and
58
+
significantly reduces the security of TLS. This mode should only be used in
59
+
non-production (e.g., testing or development) environments.
| sslmode | disable \| require \| verify-ca | TLS option, the default is `disable`. If `verify-ca` is set, the TLS certificate configured in the Dgraph cluster must be from a valid certificate authority. |
67
+
68
+
Note the `sslmode=require` pair is not supported and will throw an Exception if
69
+
used. Python gRPC does not support traffic over TLS that does not fully verify
70
+
the certificate and domain. Developers should use the existing stub/client
71
+
initialization steps for self-signed certs as demonstrated in tls_example.py
| dgraph://localhost:9080 | Connect to localhost, no ACL, no TLS |
80
+
| dgraph://sally:[email protected]:443?sslmode=verify-ca | Connect to remote server, use ACL and require TLS and a valid certificate from a CA |
81
+
| dgraph://foo-bar.grpc.us-west-2.aws.cloud.dgraph.io:443?sslmode=verify-ca&apikey=\<your-api-connection-key\>| Connect to a Dgraph Cloud cluster |
82
+
| dgraph://foo-bar.grpc.hypermode.com:443?sslmode=verify-ca&bearertoken=\<some access token\>| Connect to a Dgraph cluster protected by a secure gateway |
83
+
84
+
Using the `Open` function with a connection string:
85
+
86
+
```go
87
+
// open a connection to an ACL-enabled, non-TLS cluster and login as groot
0 commit comments