mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 12:46:18 +01:00
30 lines
1.3 KiB
Plaintext
30 lines
1.3 KiB
Plaintext
:_mod-docs-content-type: ASSEMBLY
|
|
[id="configuring-a-custom-pki"]
|
|
= Configuring a custom PKI
|
|
include::_attributes/common-attributes.adoc[]
|
|
:context: configuring-a-custom-pki
|
|
|
|
toc::[]
|
|
|
|
[role="_abstract"]
|
|
To ensure secure communication between internal components in your {product-title} cluster, you can add your organization's custom Certificate Authority (CA) certificates to the cluster-wide truststore.
|
|
|
|
You can add your custom CA certificates to the cluster-wide truststore in one of two ways:
|
|
|
|
* During cluster installation, by adding your CA certificate to the `install-config.yaml` file.
|
|
|
|
* On a running cluster, by creating a `ConfigMap` object that contains your CA certificate and referencing it in the cluster `Proxy` object.
|
|
|
|
[IMPORTANT]
|
|
====
|
|
The cluster Proxy object is the mechanism for managing the cluster-wide truststore. This guide focuses only on the task of adding a CA. If you also need to configure an egress proxy, refer to the "Configuring the cluster-wide proxy" chapter for detailed instructions.
|
|
====
|
|
|
|
include::modules/adding-a-custom-CA-during-cluster-installation.adoc[leveloffset=+1]
|
|
|
|
include::modules/adding-a-custom-CA-to-a-running-cluster.adoc[leveloffset=+1]
|
|
|
|
include::modules/verifying-the-custom-ca-configuration.adoc[leveloffset=+1]
|
|
|
|
include::modules/certificate-injection-using-operators.adoc[leveloffset=+1]
|