You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can use a TLS (Transport Layer Security) security profile to define which TLS ciphers are required by various {product-title} components. The {product-title} TLS security profiles are based on link:https://wiki.mozilla.org/Security/Server_Side_TLS[Mozilla recommended configurations].
9
9
10
-
You can specify one of the following TLS security profiles:
10
+
You can specify one of the following TLS security profiles for each component:
11
11
12
12
.TLS security profiles
13
13
[cols="1,2a",options="header"]
@@ -26,7 +26,7 @@ For the Ingress Controller, the minimum TLS version is converted from 1.0 to 1.1
26
26
====
27
27
28
28
|`Intermediate`
29
-
|This profile is the recommended configuration for the majority of clients. It is the default TLS security profile for the Ingress Controller, kubelet, and Kubernetes control plane. The profile is based on the link:https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29[Intermediate compatibility] recommended configuration.
29
+
|This profile is the recommended configuration for the majority of clients. It is the default TLS security profile for the Ingress Controller, kubelet, and control plane. The profile is based on the link:https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29[Intermediate compatibility] recommended configuration.
30
30
31
31
The `Intermediate` profile requires a minimum TLS version of 1.2.
32
32
@@ -52,7 +52,7 @@ Use caution when using a `Custom` profile, because invalid configurations can ca
52
52
53
53
[NOTE]
54
54
====
55
-
When using one of the predefined profile types, the effective profile configuration is subject to change between releases. For example, given a specification to use the Intermediate profile deployed on release X.Y.Z, an upgrade to release X.Y.Z+1 may cause a new profile configuration to be applied, resulting in a rollout.
55
+
When using one of the predefined profile types, the effective profile configuration is subject to change between releases. For example, given a specification to use the Intermediate profile deployed on release X.Y.Z, an upgrade to release X.Y.Z+1 might cause a new profile configuration to be applied, resulting in a rollout.
56
56
====
57
57
58
58
// TODO: Make sure all this is captured somewhere as necessary
Copy file name to clipboardExpand all lines: modules/tls-profiles-view-details.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
[id="tls-profiles-view-details_{context}"]
6
6
= Viewing TLS security profile details
7
7
8
-
You can view the minimum TLS version and ciphers for the predefined TLS security profiles for each of the following components: Ingress Controller, Kubernetes control plane, and kubelet.
8
+
You can view the minimum TLS version and ciphers for the predefined TLS security profiles for each of the following components: Ingress Controller, control plane, and kubelet.
Copy file name to clipboardExpand all lines: security/tls-security-profiles.adoc
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,8 +9,13 @@ TLS security profiles provide a way for servers to regulate which ciphers a conn
9
9
10
10
Cluster administrators can choose which TLS security profile to use for each of the following components:
11
11
12
-
* the Ingress controller
13
-
* the Kubernetes control plane (Kubernetes API server, Kubernetes controller manager, and Kubernetes scheduler)
12
+
* the Ingress Controller
13
+
* the control plane
14
+
+
15
+
This includes the Kubernetes API server, Kubernetes controller manager, Kubernetes scheduler, OpenShift API server, OpenShift OAuth API server, and OpenShift OAuth server.
16
+
+
17
+
// NOTE: etcd and OpenShift controller manager are not included
18
+
14
19
* the kubelet, when it acts as an HTTP server for the Kubernetes API server
15
20
// TODO: add links once the procedures have been added?
0 commit comments