Strimzi clients ca certificate management #5537
Unanswered
opsocomusr
asked this question in
Q&A
Replies: 1 comment 2 replies
-
TBH, I'm not sure we should support something like that. It is just overcomplicating things without any clear benefits. If you can use the Strimzi CA for some apps, why not for all of them? If you can use external CA for some users, why not use it for all of them? But having the secret partially maintained by Strimzi definitely does sounds like a bad idea TBH. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
We have added additional public certificates in the strimzi-clients-ca-cert secret and left the ca.crt as is so that,
tls
authentication for internal apps (connect, mirrormaker, streams etc.,)tls-external
authentication type for the users who wants to connect from outside of our AKS cluster.With this setting, we are able to utilize both
tls
andtls-external
authentication types without any issues since the clients-ca now trusts both the strimzi generated user certs and externally signed certs.But the problem is when Strimzi renews the ca.crt in strimzi-clients-ca-cert secret, the external public certificates are removed from the secret and it ends up not trusting the externally signed certificates which were working prior to the renewal.
Is it possible to retain the external public certificates as is in the secret and update only the ca.crt, ca.p12 and ca.password managed by Strimzi?
Beta Was this translation helpful? Give feedback.
All reactions