Skip to content

Commit 0ec4707

Browse files
committed
removing dSTS endpoint; adding a clarification for introducing CN-declared certs as secondaries prior to conversion
1 parent 311ff51 commit 0ec4707

File tree

1 file changed

+11
-8
lines changed

1 file changed

+11
-8
lines changed

articles/service-fabric/cluster-security-certificate-management.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -62,11 +62,14 @@ Let us quickly revisit the progression of a certificate from issuance to consump
6262
For our purposes, the first two steps in the sequence above are largely unrelated; the only connection is that the subject common name of the certificate is the DNS name declared in the cluster definition.
6363

6464
These steps are illustrated below; note the differences in provisioning between certificates declared by thumbprint and common name, respectively.
65+
66+
Issuance and provisioning flow of certificates declared by thumbprint.
6567
<center>
6668

6769
![Provisioning certificates declared by thumbprint][Image1]
6870
<center>
6971

72+
Issuance and provisioning flow of certificates declared by subject common name.
7073
<center>
7174

7275
![Provisioning certificates declared by subject common name][Image2]
@@ -476,19 +479,19 @@ A: For Microsoft-internal clients:
476479
Get-AzKeyVaultCertificateOperation -VaultName $clusterVault -Name $clusterCertVaultName
477480
```
478481

479-
Q: What happens when a certificate is issued by an undeclared/unspecified issuer? Where can I obtain the exhaustive list of active issuers of a given PKI?
480-
A: If the certificate declaration specifies issuer thumbprints, and the direct issuer of the certificate is not included in the list of pinned issuers, the certificate will be considered invalid - irrespective of whether or not its root is trusted by the client. Therefore it is critical to ensure the list of issuers is current/up to date. The introduction of a new issuer is a rare event, and should be widely publicized prior to it beginning to issue certificates.
482+
*Q*: What happens when a certificate is issued by an undeclared/unspecified issuer? Where can I obtain the exhaustive list of active issuers of a given PKI?
483+
*A*: If the certificate declaration specifies issuer thumbprints, and the direct issuer of the certificate is not included in the list of pinned issuers, the certificate will be considered invalid - irrespective of whether or not its root is trusted by the client. Therefore it is critical to ensure the list of issuers is current/up to date. The introduction of a new issuer is a rare event, and should be widely publicized prior to it beginning to issue certificates.
481484

482485
In general, a PKI will publish and maintain a certification practice statement, in accordance with IETF [RFC 7382](https://tools.ietf.org/html/rfc7382). Among other information, it will include all active issuers. Retrieving this list programmatically may differ from a PKI to another.
483486

484-
For Microsoft-internal PKIs, the authority on, well, authorized issuers is the dSMS GetIssuers v2 SDK/endpoint (see links below); it is the cluster owner's responsibility to probe this list periodically, and ensure their cluster definition includes *all* expected issuers.
487+
For Microsoft-internal PKIs, the authority on, well, authorized issuers is the dSMS GetIssuers v2 SDK/endpoint (inquire internally); it is the cluster owner's responsibility to probe this list periodically, and ensure their cluster definition includes *all* expected issuers.
485488

486-
AME issuers: https://global-dsms.dsms.core.windows.net/dsms/issuercertificates?getissuersv2&caName=ame&appType=clientauth
487-
MSIT TLS issuers (SslAdmin): https://global-dsms.dsms.core.windows.net/dsms/issuercertificates?getissuersv2&caName=SslAdmin&type=ssl
488-
489+
*Q*: Are multiple PKIs supported?
490+
*A*: Yes; you may not declare multiple CN entries in the cluster manifest with the same value, but can list issuers from multiple PKIs corresponding to the same CN. It is not a recommended practice, and certificate transparency practices may prevent such certificates from being issued. However, as means to migrate from one PKI to another, this is an acceptable mechanism.
489491

490-
Q: Are multiple PKIs supported?
491-
A: Yes; you may not declare multiple CN entries in the cluster manifest with the same value, but can list issuers from multiple PKIs corresponding to the same CN. It is not a recommended practice, and certificate transparency practices may prevent such certificates from being issued. However, as means to migrate from one PKI to another, this is an acceptable mechanism.
492+
*Q*: What if the current cluster certificate is not CA-issued, or does not have the intended subject?
493+
*A*: Obtain a certificate with the intended subject, and add it to the cluster's definition as a secondary, by thumbprint. Once the upgrade completed successfully, initiate another cluster configuration upgrade to convert the certificate declaration to common name.
492494

493495
[Image1]:./media/security-cluster-certificate-mgmt/certificate-journey-thumbprint.png
494496
[Image2]:./media/security-cluster-certificate-mgmt/certificate-journey-common-name.png
497+

0 commit comments

Comments
 (0)