|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * microshift_configurig/microshift_tls-config.adoc |
| 4 | + |
| 5 | +:_mod-docs-content-type: PROCEDURE |
| 6 | +[id="microshift-tls-config-proc_{context}"] |
| 7 | += Configuring TLS for {microshift-short} |
| 8 | + |
| 9 | +You can choose to use either the TLS 1.2 or TLS 1.3 security profiles with {microshift-short} for system hardening. |
| 10 | + |
| 11 | +.Prerequisites |
| 12 | + |
| 13 | +* You have access to the cluster as a root user. |
| 14 | +* {microshift-short} has either not started for the first time, or is stopped. |
| 15 | +* The OpenShift CLI (`oc`) is installed. |
| 16 | +* The certificate authority has issued the custom certificates (CAs). |
| 17 | +
|
| 18 | +.Procedure |
| 19 | + |
| 20 | +. Make a copy of the provided `config.yaml.default` file in the `/etc/microshift/` directory, renaming it `config.yaml`. |
| 21 | + |
| 22 | +. Keep the new {microshift-short} `config.yaml` in the `/etc/microshift/` directory. Your `config.yaml` file is read every time the {microshift-short} service starts. |
| 23 | ++ |
| 24 | +[NOTE] |
| 25 | +==== |
| 26 | +After you create it, the `config.yaml` file takes precedence over built-in settings. |
| 27 | +==== |
| 28 | + |
| 29 | +. Optional: Use a configuration snippet if you are using an existing {microshift-short} YAML. See "Using configuration snippets" in the Additional resources section for more information. |
| 30 | + |
| 31 | +. Replace the default values in the `tls` section of the {microshift-short} YAML with your valid values. |
| 32 | ++ |
| 33 | +.Example TLS 1.2 configuration |
| 34 | +[source,yaml] |
| 35 | +---- |
| 36 | +apiServer: |
| 37 | +# ... |
| 38 | + tls: |
| 39 | + cipherSuites: # <1> |
| 40 | + - <cipher_suite_1> # <2> |
| 41 | + - ... |
| 42 | + minVersion: VersionTLS12 # <3> |
| 43 | +# ... |
| 44 | +---- |
| 45 | +<1> Defaults to the suites of the configured `minVersion`. If `minVersion` is not configured, the default value is TLS 1.2. |
| 46 | +<2> Specify the cipher suites you want to use from the list of supported cipher suites. If you do not configure this list, all of the supported cipher suites are used. All clients connecting to the API server must support the configured cipher suites or the connections fail during the TLS handshake phase. Be sure to add the CA certificate bundle to the list of CA certificates that the TLS client or server trusts. |
| 47 | +<3> Specify `VersionTLS12` or `VersionTLS13`. |
| 48 | ++ |
| 49 | +[IMPORTANT] |
| 50 | +==== |
| 51 | +When you choose TLS 1.3 as the minimum TLS version, only the default {microshift-short} cipher suites can be used. Additional cipher suites are not configurable. If other cipher suites to use with TLS 1.3 are configured, those suites are ignored and overwritten by the {microshift-short} defaults. |
| 52 | +==== |
| 53 | + |
| 54 | +. Complete any other additional configurations that you require, then restart {microshift-short} by running the following command: |
| 55 | ++ |
| 56 | +[source,terminal] |
| 57 | +---- |
| 58 | +$ sudo systemctl restart microshift |
| 59 | +---- |
0 commit comments