Skip to content

Commit

Permalink
Merge pull request openshift#3267 from php-coder/document_oadm_ca_exp…
Browse files Browse the repository at this point in the history
…ire_days_option

Document --expire-days and --signer-expire-days options
  • Loading branch information
Brice Fallon-Freeman authored Dec 16, 2016
2 parents 9c13912 + 95a6f4d commit e1c41c5
Show file tree
Hide file tree
Showing 6 changed files with 45 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,15 @@ in this topic they are kept separate.
[[sssd-phase-1-certificate-generation]]
== Phase 1: Certificate Generation

[NOTE]
====
The undermentioned commands generate certificate files that will be valid for 2
years (and 5 years for Certification authority (CA) certificate). These
periods can be altered with `--expire-days` and `--signer-expire-days` options
but by security reasons it is strongly recommended to not make them greater
than these values.
====

. To ensure that communication between the authenticating proxy and
{product-title} is trustworthy, create a set of Transport Layer Security (TLS)
certificates to use during the other phases of this setup. In the
Expand Down
10 changes: 10 additions & 0 deletions install_config/configuring_authentication.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -756,6 +756,11 @@ xref:requestheader-master-ca-config[master's identity provider configuration].
--serial='/etc/origin/master/proxyca.serial.txt'
----
[NOTE]
`oadm ca create-signer-cert` generates a certificate that is valid for 5 years.
This period can be altered with `*--expire-days*` option but by security
reasons it is strongly recommended to not make it greater than this value.
Generate a client certificate for the proxy. This can be done using any x509
certificate tooling. For convenience, the `oadm` CLI can be used:
Expand Down Expand Up @@ -787,6 +792,11 @@ must be included in the `X509v3 Subject Alternative Name` in the certificate
that is specified for `*SSLCertificateFile*`. If a new certificate needs to be
created, the `oadm ca create-server-cert` command can be used.
[NOTE]
`oadm create-api-client-config` generates a certificate that is valid for 2 years.
This period can be altered with `*--expire-days*` option but by security
reasons it is strongly recommended to not make it greater than this value.
*Configuring Apache*
Unlike OpenShift Enterprise 2, this proxy does not need to reside on the same
Expand Down
5 changes: 5 additions & 0 deletions install_config/master_node_configuration.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -939,6 +939,11 @@ The following commands write the relevant launch configuration file(s),
certificate files, and any other necessary files to the specified
`--write-config` or `--node-dir` directory.

Generated certificate files will be valid for 2 years. Certification authority
(CA) certificate will be valid for 5 years. These periods can be altered with
`--expire-days` and `--signer-expire-days` options but by security reasons
it is strongly recommended to not make them greater than these values.

To create configuration files for an all-in-one server (a master and a node on
the same host) in the specified directory:

Expand Down
7 changes: 7 additions & 0 deletions install_config/registry/securing_and_exposing_registry.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,13 @@ $ oadm ca create-server-cert \
--key=/etc/secrets/registry.key
----
+
[NOTE]
====
`oadm ca create-server-cert` generates a certificate that is valid for 2 years.
This period can be altered with `*--expire-days*` option but by security
reasons it is strongly recommended to not make it greater than this value.
====
+
. Create the secret for the registry certificates:
+
----
Expand Down
7 changes: 7 additions & 0 deletions install_config/router/default_haproxy_router.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -718,6 +718,13 @@ $ oadm ca create-server-cert --signer-cert=$CA/ca.crt \
----
====

[NOTE]
====
`oadm ca create-server-cert` generates a certificate that is valid for 2 years.
This period can be altered with `*--expire-days*` option but by security
reasons it is strongly recommended to not make it greater than this value.
====

The router expects the certificate and key to be in PEM format in a single
file:

Expand Down
7 changes: 7 additions & 0 deletions registry_quickstart/administrators/system_configuration.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -141,6 +141,13 @@ $ exit
----
====
+
[NOTE]
====
`oadm ca create-server-cert` generates a certificate that is valid for 2 years.
This period can be altered with `*--expire-days*` option but by security
reasons it is strongly recommended to not make it greater than this value.
====
+
. Copy the generated files to the registry directory and change ownership so the
atomic-registry service can read the files.
+
Expand Down

0 comments on commit e1c41c5

Please sign in to comment.