TLS server verification
A TLS section is part of Stackable CRDs and describes how to connect to a TLS enabled system like LDAP or S3.
If the tls
attribute is set to null
(or is not specified), no TLS will be used for the connection.
A simple TLS section looks like this:
# [...]
tls:
verification:
none: {}
Verification
The parties participating via a TLS connection can be verified using certificates. At the moment the following verification methods are supported:
No verification
This example will use TLS but not perform any checks on the certificate presented by the server or present a client certificate if asked for one by the server.
tls:
verification:
none: {}
Server verification
This example will use TLS and verify the server using the ca certificates that are trusted by common web browsers. This can be useful when you e.g. use public AWS S3 or other public available services.
tls:
verification:
server:
caCert:
webPki: {}
This example will use TLS and verify the server using the provided ca certificate. For this to work you need to create a SecretClass that - at least - contains the ca certificate. Note that a SecretClass does not need to have a key but can also work with just a ca cert. So if you were provided with a ca cert but do not have access to the key you can still use this method.
tls:
verification:
server:
caCert:
secretClass: openldap-tls-ca
Mutual verification
This example will use TLS and verify both - the server and the client using certificates.
For this to work you need to create a SecretClass containing the ca certificate and a key to create new client-certificates.
The Stackable Secret Operator will automatically provide the product with a ca.crt
, tls.crt
and tls.key
so that the product can authenticate the server and it can authenticate itself at the server.
tls:
verification:
mutual:
certSecretClass: openldap-tls