Skip to content

Commit 81cbb5b

Browse files
committed
adding a visual depiction of certificate provisioning
1 parent 6e17796 commit 81cbb5b

File tree

3 files changed

+14
-1
lines changed

3 files changed

+14
-1
lines changed

articles/service-fabric/cluster-security-certificate-management.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,18 @@ Let us quickly revisit the progression of a certificate from issuance to consump
6060
- the provisioning agent or the cluster owner is also responsible for cleaning up/deleting unused certificates
6161

6262
For our purposes, the first two steps in the sequence above are largely unrelated; the only connection is that the subject common name of the certificate is the DNS name declared in the cluster definition.
63-
63+
64+
These steps are illustrated below; note the differences in provisioning between certificates declared by thumbprint and common name, respectively.
65+
<center>
66+
67+
![Journey of certificates declared by thumbprint][Image1]
68+
<center>
69+
70+
<center>
71+
72+
![Journey of certificates declared by subject common name][Image2]
73+
<center>
74+
6475
### Certificate enrollment
6576
This topic is covered in detail in the Key Vault [documentation](../key-vault/create-certificate.md); we're including a synopsis here for continuity and easier reference. Continuing with Azure as the context, and using Azure Key Vault as the secret management service, an authorized certificate requester must have at least certificate management permissions on the vault, granted by the vault owner; the requester would then enroll into a certificate as follows:
6677
- creates a certificate policy in Azure Key Vault (AKV), which specifies the domain/subject of the certificate, the desired issuer, key type and length, intended key usage and more; see [Certificates in Azure Key Vault](../key-vault/certificate-scenarios.md) for details. For Microsoft-internal services, the list of supported issuers includes OneCert and SslAdmin.
@@ -479,3 +490,5 @@ For Microsoft-internal PKIs, the authority on, well, authorized issuers is the d
479490
Q: Are multiple PKIs supported?
480491
A: Yes; you may not declare multiple CN entries in the cluster manifest with the same value, but can list issuers from multiple PKIs corresponding to the same CN. It is not a recommended practice, and certificate transparency practices may prevent such certificates from being issued. However, as means to migrate from one PKI to another, this is an acceptable mechanism.
481492

493+
[Image1]:.media/security-cluster-certificate-mgmt/certificate-journey-thumbprint.png
494+
[Image2]:./media/security-cluster-certificate-mgmt/certificate-journey-common-name.png
51.6 KB
Loading
45.6 KB
Loading

0 commit comments

Comments
 (0)