The SSL_ENDPOINT option is now available in the /etc/openshift/broker.conf file. In some environments, regulations may require encrypted connections between the client and the server. This new configuration setting controls whether direct SSL connections to gears are allowed, denied, or forced. By default, direct SSL connections to gears are allowed if a cartridge manifest supports it. Without this feature, the SSL connection would be terminated by the OpenShift Enterprise node web proxy. This feature allows the SSL connection to instead be terminated by the gear.