You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/reference/access-authn-authz/certificate-signing-requests.md
+42-38Lines changed: 42 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,54 +104,54 @@ Kubernetes provides built-in signers that each have a well-known `signerName`:
104
104
105
105
1.`kubernetes.io/kube-apiserver-client`: signs certificates that will be honored as client certificates by the API server.
106
106
Never auto-approved by {{< glossary_tooltip term_id="kube-controller-manager" >}}.
107
-
1. Trust distribution: signed certificates must be honored as client certificates by the API server. The CA bundle is not distributed by any other means.
108
-
1. Permitted subjects - no subject restrictions, but approvers and signers may choose not to approve or sign.
109
-
Certain subjects like cluster-admin level users or groups vary between distributions and installations,
110
-
but deserve additional scrutiny before approval and signing.
111
-
The `CertificateSubjectRestriction` admission plugin is enabled by default to restrict `system:masters`,
112
-
but it is often not the only cluster-admin subject in a cluster.
113
-
1. Permitted x509 extensions - honors subjectAltName and key usage extensions and discards other extensions.
114
-
1. Permitted key usages - must include `["client auth"]`. Must not include key usages beyond `["digital signature", "key encipherment", "client auth"]`.
115
-
1. Expiration/certificate lifetime - for the kube-controller-manager implementation of this signer, set to the minimum
116
-
of the `--cluster-signing-duration` option or, if specified, the `spec.expirationSeconds` field of the CSR object.
117
-
1. CA bit allowed/disallowed - not allowed.
107
+
1. Trust distribution: signed certificates must be honored as client certificates by the API server. The CA bundle is not distributed by any other means.
108
+
1. Permitted subjects - no subject restrictions, but approvers and signers may choose not to approve or sign.
109
+
Certain subjects like cluster-admin level users or groups vary between distributions and installations,
110
+
but deserve additional scrutiny before approval and signing.
111
+
The `CertificateSubjectRestriction` admission plugin is enabled by default to restrict `system:masters`,
112
+
but it is often not the only cluster-admin subject in a cluster.
113
+
1. Permitted x509 extensions - honors subjectAltName and key usage extensions and discards other extensions.
114
+
1. Permitted key usages - must include `["client auth"]`. Must not include key usages beyond `["digital signature", "key encipherment", "client auth"]`.
115
+
1. Expiration/certificate lifetime - for the kube-controller-manager implementation of this signer, set to the minimum
116
+
of the `--cluster-signing-duration` option or, if specified, the `spec.expirationSeconds` field of the CSR object.
117
+
1. CA bit allowed/disallowed - not allowed.
118
118
119
119
1.`kubernetes.io/kube-apiserver-client-kubelet`: signs client certificates that will be honored as client certificates by the
120
120
API server.
121
121
May be auto-approved by {{< glossary_tooltip term_id="kube-controller-manager" >}}.
122
-
1. Trust distribution: signed certificates must be honored as client certificates by the API server. The CA bundle
123
-
is not distributed by any other means.
124
-
1. Permitted subjects - organizations are exactly `["system:nodes"]`, common name starts with "`system:node:`".
125
-
1. Permitted x509 extensions - honors key usage extensions, forbids subjectAltName extensions and drops other extensions.
0 commit comments