Member-only story
Custom Certificate in OpenShift
Most of the company with an established IT system will have their own Public Key Infrastrcture (PKI) in place. In the OpenShift Container Platform, how we integrate it with the existing PKI? This paper examines how we can use the external certificate for the OCP platform or for the container application.
Trusted Certificate Authority
You may have an CA that are trusted within the Enterprise, but its self-signed. For an example, you are running a mirror registry with a certificate singed by the Enterprise CA. At the mirror registry OS, you may update the root ca cert to make it trusted by the OS and application. For an example for Redhat flavor Linux,
cp ca-bundle.pem /usr/share/pki/ca-trust-source/anchors/
update-ca-trust
The ca-bundle.pem
file could be your root CA, intermediate CA concatenated together.
Add Custom CA during Installation
By default, OpenShift only support those well known CA authorities. To bring in custom CA, during installation time you need to have the extra fields, additionalTrustBundle
, defined in your install-config.yaml
for the OCP installation,
additionalTrustBundle: |
-----BEGIN CERTIFICATE-----
MIIFSjCCAzKgAwIBAgIUQOsJUQWsa9gHCbEoL6f50XSPymYwDQYJKoZIhvcNAQEN…