Configure Gateway
Use this section to configure how Akeyless Gateway authenticates, secures transport, protects encryption material, serves secrets during outages, and integrates with operational tooling.
Configuration is typically done after deployment and adjusted over time as security, compliance, and platform requirements evolve.
The following configuration features are available:
-
Configure identity and authorization controls in Gateway Authentication and Access.
-
Configure HTTPS behavior and certificate usage in TLS Settings.
-
Manage trusted private CAs in Certificate Store.
-
Configure encryption posture with customer fragments in Zero Knowledge.
-
Define cache and offline behavior in Gateway Caching.
-
Route audit and operational logs in Log Forwarding.
-
Integrate external hardware key management in HSM Integration.
-
Configure migration workflows in Automatic Migration.
Next Steps
- Set up monitoring and dashboards in Telemetry and Metrics.
- Prepare incident playbooks with Troubleshooting the Gateway.
Updated about 6 hours ago
