Skip to content

Commit da5aa58

Browse files
committed
OSSMDOC-405: Clarify name of default certificates generated by Service Mesh
1 parent 3a7c13a commit da5aa58

File tree

1 file changed

+2
-9
lines changed

1 file changed

+2
-9
lines changed

modules/ossm-security-cert-manage.adoc

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,15 @@ By default, {ProductName} generates a self-signed root certificate and key and u
1010
.Prerequisites
1111

1212
* Install {ProductName} with mutual TLS enabled to configure certificates.
13-
* This example uses the certificates from the link:https://github.com/maistra/istio/tree/maistra-2.0/samples/certs[Maistra repository]. For production, use your own certificates from your certificate authority.
13+
* This example uses the certificates from the link:https://github.com/maistra/istio/tree/maistra-2.1/samples/certs[Maistra repository]. For production, use your own certificates from your certificate authority.
1414
* Deploy the Bookinfo sample application to verify the results with these instructions.
1515

1616
[id="ossm-cert-manage-add-cert-key_{context}"]
1717
== Adding an existing certificate and key
1818

1919
To use an existing signing (CA) certificate and key, you must create a chain of trust file that includes the CA certificate, key, and root certificate. You must use the following exact file names for each of the corresponding certificates. The CA certificate is named `ca-cert.pem`, the key is `ca-key.pem`, and the root certificate, which signs `ca-cert.pem`, is named `root-cert.pem`. If your workload uses intermediate certificates, you must specify them in a `cert-chain.pem` file.
2020

21-
Add the certificates to {ProductShortName} by following these steps. Save the example certificates from the link:https://github.com/maistra/istio/tree/maistra-2.0/samples/certs[Maistra repository] locally and replace `<path>` with the path to your certificates.
21+
Add the certificates to {ProductShortName} by following these steps. Save the example certificates from the link:https://github.com/maistra/istio/tree/maistra-2.1/samples/certs[Maistra repository] locally and replace `<path>` with the path to your certificates.
2222

2323
. Create a secret `cacert` that includes the input files `ca-cert.pem`, `ca-key.pem`, `root-cert.pem` and `cert-chain.pem`.
2424
+
@@ -46,13 +46,6 @@ spec:
4646
privateKey:
4747
rootCADir: /etc/cacerts
4848
----
49-
+
50-
. To make sure the workloads add the new certificates promptly, delete the secrets generated by {ProductShortName}, named `istio.*`. In this example, `istio.default`. {ProductShortName} issues new certificates for the workloads.
51-
+
52-
[source,terminal]
53-
----
54-
$ oc delete secret istio.default
55-
----
5649

5750
[id="ossm-cert-manage-verify-cert_{context}"]
5851
== Verifying your certificates

0 commit comments

Comments
 (0)