Skip to content

Commit 704506e

Browse files
Merge pull request #115132 from Nickomang/master
Updated certificate acquisition requirements
2 parents b0f9e09 + caf44a5 commit 704506e

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

articles/service-fabric/service-fabric-windows-cluster-x509-security.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -243,10 +243,22 @@ If you are using issuer stores, then no config upgrade needs to be performed for
243243
## Acquire the X.509 certificates
244244
To secure communication within the cluster, you first need to obtain X.509 certificates for your cluster nodes. Additionally, to limit connection to this cluster to authorized machines/users, you need to obtain and install certificates for the client machines.
245245

246-
For clusters that are running production workloads, use a [certificate authority (CA)](https://en.wikipedia.org/wiki/Certificate_authority)-signed X.509 certificate to secure the cluster. For more information on how to obtain these certificates, see [How to obtain a certificate](https://msdn.microsoft.com/library/aa702761.aspx).
246+
For clusters that are running production workloads, use a [certificate authority (CA)](https://en.wikipedia.org/wiki/Certificate_authority)-signed X.509 certificate to secure the cluster. For more information on how to obtain these certificates, see [How to obtain a certificate](https://msdn.microsoft.com/library/aa702761.aspx).
247+
248+
There are a number of properties that the certificate must have in order to function properly:
249+
250+
* The certificate's provider must be **Microsoft Enhanced RSA and AES Cryptographic Provider**
251+
252+
* When creating an RSA key, make sure the key is **2048 bits**.
253+
254+
* The Key Usage extension has a value of **Digital Signature, Key Encipherment (a0)**
255+
256+
* The Enhanced Key Usage extension has values of **Server Authentication** (OID: 1.3.6.1.5.5.7.3.1) and **Client Authentication** (OID: 1.3.6.1.5.5.7.3.2)
247257

248258
For clusters that you use for test purposes, you can choose to use a self-signed certificate.
249259

260+
For additional questions, consult [frequently asked certificate questions](https://docs.microsoft.com/azure/service-fabric/cluster-security-certificate-management#troubleshooting-and-frequently-asked-questions).
261+
250262
## Optional: Create a self-signed certificate
251263
One way to create a self-signed certificate that can be secured correctly is to use the CertSetup.ps1 script in the Service Fabric SDK folder in the directory C:\Program Files\Microsoft SDKs\Service Fabric\ClusterSetup\Secure. Edit this file to change the default name of the certificate. (Look for the value CN=ServiceFabricDevClusterCert.) Run this script as `.\CertSetup.ps1 -Install`.
252264

0 commit comments

Comments
 (0)