Console terminology: In the Maverics Console, Orchestrator instances and
configuration delivery are managed through Deployments. When working directly
with YAML, configuration is managed as files delivered via the
-config flag or
MAVERICS_CONFIG environment variable.What Is TLS?
TLS (Transport Layer Security) is the protocol that encrypts data as it travels between two systems over a network. When you see “HTTPS” in a browser URL, that is HTTP running over TLS — meaning the connection between the browser and the server is encrypted so that no one in between can read or tamper with the data. For the Maverics Orchestrator, TLS matters in two places. First, the connection between your users’ browsers and the Orchestrator — this is called TLS termination because the Orchestrator accepts the encrypted HTTPS connection and decrypts it. Second, the connection between the Orchestrator and your upstream applications — this is called backend TLS and is optional but recommended in production environments where the Orchestrator and your apps are on different networks.Prerequisites
- A running Maverics Orchestrator — If you have not installed it yet, follow the Quick Start guide first.
- A TLS certificate and private key — You can use a certificate from a certificate authority (CA) like Let’s Encrypt, your organization’s internal CA, or a self-signed certificate for testing. The certificate should be in PEM format.
Configure TLS
Define a TLS profile
The Orchestrator uses named TLS profiles to manage certificates. Each profile is a named entry under the 
tls top-level key, and can be referenced by the HTTP listener, connectors, and cache connections. This design allows multiple TLS configurations for different purposes — one for the HTTP listener, another for upstream IdP connections, and another for Redis cache connections.A TLS certificate is a file that proves your server’s identity to clients. It comes in a pair: a certificate file (the public part, often ending in .crt or .pem) and a private key file (the secret part, often ending in .key). The certificate authority that issued your certificate vouches that it belongs to your domain.For production deployments, use a certificate from a trusted certificate authority. Let’s Encrypt provides free certificates that are trusted by all major browsers. Your organization may also have an internal CA that issues certificates for internal services.- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Enable HTTPS on the Orchestrator
With your TLS profile defined, bind it to the Orchestrator’s HTTP listener. This is where TLS termination happens — the Orchestrator accepts encrypted connections from clients and decrypts them internally.Set 
See the Transport Layer Security (TLS) Reference for the complete set of TLS configuration options — including cipher suite selection, minimum TLS version, and client certificate authentication.
http.tls to the name of the TLS profile you defined in the previous step. This is the critical wiring step that connects your certificate to the HTTP server.- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Configure backend TLS
Backend TLS secures the connection between the Orchestrator and your upstream applications. This step is optional — if the Orchestrator and your apps run on the same host or in a trusted private network, you may not need it. But if traffic crosses network boundaries or your compliance requirements mandate encryption everywhere, backend TLS ensures data stays encrypted for the entire journey.When you enable backend TLS, the Orchestrator connects to your upstream application over HTTPS instead of HTTP. If your upstream uses a self-signed certificate or an internal CA, you will need to provide the CA certificate so the Orchestrator can verify the connection.
- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Verify TLS is working
With TLS configured, restart the Orchestrator and verify that HTTPS connections are working correctly. A simple test confirms that the certificate is being served and the connection is encrypted.Start (or restart) the Orchestrator to pick up your TLS configuration:Test the HTTPS endpoint with curl:The You can also verify the certificate details with
-v (verbose) flag shows the TLS handshake details. Look for lines showing the certificate subject, issuer, and that the handshake completed successfully. If you are using a self-signed certificate for testing, add the -k flag to skip certificate verification:openssl:Success! Your Orchestrator is serving traffic over HTTPS with TLS
encryption. Client connections are encrypted, and if you configured
backend TLS, the connection to your upstream applications is encrypted
too.
Troubleshooting
Certificate not found
Certificate not found
The Orchestrator logs an error at startup if it cannot find the certificate
or key file at the configured path. Verify that the file paths in your
configuration are absolute paths (not relative) and that the files are
readable by the user running the Orchestrator. Common causes include typos
in the file path, incorrect file permissions, or the certificate being
stored in a different directory than expected.
TLS handshake failure
TLS handshake failure
A TLS handshake failure means the client and server could not agree on how
to encrypt the connection. This can happen when the certificate does not
match the domain the client is connecting to (a hostname mismatch), when
the certificate has expired, or when the client and server do not support
any common TLS versions or cipher suites. Check the Orchestrator logs for
the specific handshake error and verify that your certificate’s Common Name
(CN) or Subject Alternative Name (SAN) matches the domain you are
connecting to.
Certificate chain incomplete
Certificate chain incomplete
Browsers and clients need the full certificate chain — your certificate
plus any intermediate certificates from the CA — to verify trust. If
clients see a “certificate not trusted” error even though your certificate
is valid, you may be missing intermediate certificates. Concatenate your
certificate and the intermediate certificate(s) into a single PEM file,
with your certificate first and the intermediates following in order.
Related Pages
Security Overview
Return to the Security guides hub for TLS, secrets, policies, and compliance
Transport Layer Security (TLS) Reference
Complete configuration reference for TLS profiles, cipher suites, mTLS, OCSP, and CRL settings
Deploy to Production
Production deployment guide including TLS best practices and high availability
Manage Secrets
Store TLS private keys and other credentials in an external secret provider