-
Notifications
You must be signed in to change notification settings - Fork 30
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
10 changed files
with
89 additions
and
109 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
46 changes: 46 additions & 0 deletions
46
documentation/asciidoc/topics/proc_enabling_encryption.adoc
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
[id='enabling-endpoint-encryption_{context}'] | ||
= Enabling TLS encryption | ||
|
||
[role="_abstract"] | ||
Encryption can be independently enabled for endpoint and cluster transport. | ||
|
||
.Prerequisites | ||
* A secret containing a certificate or a keystore. Endpoint and cluster should use | ||
different secrets. | ||
|
||
.Procedure | ||
|
||
.Set the secret name in the deploy configuration | ||
|
||
Provide the name of the secret containing the certificate. | ||
[source,yaml,options="nowrap",subs=attributes+] | ||
---- | ||
include::yaml/tls_secretname.yaml[] | ||
---- | ||
|
||
.Enable cluster transport TLS | ||
|
||
- Configure the keystore path in the transport realm; secret is mounted at `/etc/encrypt/transport`. The truststore must be configured | ||
with the same certificates, this allow the nodes to authenticate each other. | ||
Alias and password must be provided in case the secret contains a keystore. | ||
- Configure the transport stack to use the realm. | ||
|
||
[source,yaml,options="nowrap",subs=attributes+] | ||
---- | ||
include::yaml/transport_encryption.yaml[] | ||
---- | ||
|
||
|
||
.Enable endpoint TLS | ||
|
||
Configure the keystore path in the endpoint realm, secret is mounted at `/etc/encrypt/endpoint`. | ||
Alias and password must be provided in case the secret contains a keystore. | ||
|
||
[source,yaml,options="nowrap",subs=attributes+] | ||
---- | ||
include::yaml/endpoint_encryption.yaml[] | ||
---- | ||
|
||
[role="_additional-resources"] | ||
.Additional resources | ||
* link:{security_docs}[{brandname} Security Guide] |
31 changes: 0 additions & 31 deletions
31
documentation/asciidoc/topics/proc_enabling_endpoint_encryption.adoc
This file was deleted.
Oops, something went wrong.
33 changes: 0 additions & 33 deletions
33
documentation/asciidoc/topics/proc_enabling_transport_encryption.adoc
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
3 changes: 0 additions & 3 deletions
3
documentation/asciidoc/topics/yaml/ssl_endpoint_secretname.yaml
This file was deleted.
Oops, something went wrong.
3 changes: 0 additions & 3 deletions
3
documentation/asciidoc/topics/yaml/ssl_transport_secretname.yaml
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
deploy: | ||
ssl: | ||
endpointSecretName: "tls-secret" | ||
transportSecretName: "tls-transport-secret" |
34 changes: 16 additions & 18 deletions
34
documentation/asciidoc/topics/yaml/transport_encryption.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,21 +1,19 @@ | ||
deploy: | ||
infinispan: | ||
jgroups: | ||
stack: | ||
name: "encryption" | ||
extends: "kubernetes" | ||
SSL_KEY_EXCHANGE: | ||
"keystore_name": "/etc/encrypt/transport/cert.p12" | ||
"keystore_password": "password" | ||
"stack.combine": "INSERT_AFTER" | ||
"stack.position": "VERIFY_SUSPECT2" | ||
ASYM_ENCRYPT: | ||
"asym_algorithm": "RSA" | ||
"asym_keylength": 3072 | ||
"change_key_on_coord_leave": "false" | ||
"change_key_on_leave": "false" | ||
"use_external_key_exchange": "true" | ||
"stack.combine": "INSERT_BEFORE" | ||
"stack.position": "pbcast.NAKACK2" | ||
cacheContainer: | ||
transport: | ||
stack: encryption | ||
stack: "kubernetes" | ||
urn:infinispan:server:14.0:securityRealm: "cluster-transport" | ||
server: | ||
security: | ||
securityRealms: | ||
- name: cluster-transport | ||
serverIdentities: | ||
ssl: | ||
keystore: | ||
alias: "server" | ||
path: "/etc/encrypt/endpoint/cert.p12" | ||
password: "password" | ||
truststore: | ||
alias: "server" | ||
path: "/etc/encrypt/endpoint/cert.p12" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters