Skip to content

Commit aa2839f

Browse files
kuniseneedugon
andauthored
Clarify adminconsole certs (#2754)
## Description To address issue: #2747 Two main edits: * To generate RSA private key, it needs to have `-----BEGIN RSA PRIVATE KEY-----` (openssl with `-traditional` option but not default one) and must not be `-----BEGIN PRIVATE KEY-----`, otherwise user will get `cert.invalid_cert_chain` error. * (I discussed this with @geekpete and @mailahmeduk for quite in-depth about how to get around of this issue so I'd like to explicitly call this out) * Add the doc part for `Adminconsole` cert added in ECE 3.8 (maybe @eedugon I need to raise issue in our internal cloud repo and back port it to 3.8?) ## Reviewers * Requested @AlexP-Elastic or @beiske for your review as you are the reporter of this adminconsole cert issue internally ([this](https://elasticco.atlassian.net/browse/CP-11302) and [this](https://elasticco.atlassian.net/browse/CP-11126)) * Also, docs team, please help review from docs perspective 🙏 ## Preview * Before PR merge: [deploy-manage/security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2754/deploy-manage/security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates) * After PR merge: https://www.elastic.co/docs/deploy-manage/security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates --- Thank you! --------- Co-authored-by: Edu González de la Herrán <[email protected]>
1 parent 4c93dd9 commit aa2839f

File tree

1 file changed

+34
-0
lines changed

1 file changed

+34
-0
lines changed

deploy-manage/security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,8 @@ Proxy certificate
3131

3232
After the certificates have been installed, connecting securely to {{es}}, {{kib}}, and the Cloud UI or making secure RESTful API calls to ECE should not result in any security warnings or errors.
3333

34+
Adminconsole certificate
35+
: This certificate facilitates a secure connection to an alternative API port, which can be used in rare scenarios where the UI is unavailable. We recommend using the same certificate as the one configured for the Cloud UI.
3436

3537

3638
## Before you begin [ece_before_you_begin_7]
@@ -60,6 +62,19 @@ The PEM file should be structured like this:
6062

6163
Each key and certificate would be generated by you or your IT team.
6264

65+
::::{note}
66+
{{ece}} requires the private key to begin with the header `-----BEGIN RSA PRIVATE KEY-----`. If your key instead starts with a different header, such as `-----BEGIN PRIVATE KEY-----` (without `RSA`), an error occurs:
67+
68+
```json
69+
{
70+
"code" : "cert.invalid_cert_chain",
71+
"message" : "Certificate chain was invalid [Invalid Entry: expected unencrypted rsa private key (is start of file corrupted?)]"
72+
}
73+
```
74+
75+
Review the documentation for your certificate generation tool to determine how to obtain the private key header expected by {{ece}}. For example, with OpenSSL you can add the `-traditional` option when generating the key.
76+
::::
77+
6378

6479
## Get existing ECE security certificates [ece-existing-security-certificates]
6580

@@ -295,6 +310,25 @@ To add a proxy certificate from the command line:
295310
openssl s_client -CAfile CA_CERTIFICATE_FILENAME -showcerts -connect HOSTNAME_OR_IP:9343 < /dev/zero
296311
```
297312
313+
## Add an Adminconsole certificate [ece-tls-adminconsole]
314+
315+
::::{note}
316+
In {{ece}}, this certificate is treated identically to the [Cloud UI certificate](#ece-tls-ui). You can use the same certificate bundle generated for Cloud UI.
317+
::::
318+
319+
To add an Adminconsole certificate from the Cloud UI:
320+
321+
1. [Log into the Cloud UI](../../deploy/cloud-enterprise/log-into-cloud-ui.md).
322+
2. From the **Platform** menu, select **Settings**.
323+
3. Under **TLS settings** for the Adminconsole, choose **Upload new certificate** and select a concatenated file containing your RSA private key, server certificate, and CA certificate. Upload the selected file.
324+
325+
To get the details of the certificate you added, select **Show certificate chain**.
326+
327+
You can verify the new certificate chain by using the openssl command:
328+
329+
```
330+
openssl s_client -CAfile CA_CERTIFICATE_FILENAME -showcerts -connect containerhost:12343 < /dev/zero
331+
```
298332
299333
300334
## Limitations [ece-tls-limitations]

0 commit comments

Comments
 (0)