

How to do this is specific to your web server and SSL certificate provider and beyond the scope of this documentation. For the sake of example, we’ll assume that you were issued an SSL certificate for the domain. Once you have your key and certificate, it’s time to run a a TLS tunnel on your own custom domain name. The instructions to set this up are identical to those described in the previous section, we will just be specifying new -host option. TLS pass-through enabled, make sure your destination '' can terminate HTTPS TLS termination After you’ve set up the custom domain, use the -host argument to connect the TLS tunnel on your own domain.įorward TLS traffic over your own custom domain relay connect -host -crypto tls-pass-through The custom domain you register should be the same as the one in your SSL certificate (). It is possible that the server you want to expose can’t terminate TLS connections.

To do this, provide -key and -crt command line options when starting a tunnel: relay connect -s demo -key tls.key -crt tls.crt -crypto tls-pass-through Auto-generating TLS certificate Webhook Relay client can terminate TLS for you, so you can have your traffic end-to-end encrypted without worrying about your local service supporting TLS. Sometimes even though you don’t have a certificate, you want your traffic to still be end-to-end encrypted.
