docs/doc/source/usertasks/kubernetes/issuers-in-distributed-cloud-fbc035675c0f.rst
Ron Stone 749a8b7535 Fix usertask images (pick)
Image location not readable in DS builds. Moved under kubernetes
Build cannot read image geometry metadata, causing :scale: option to fail. Removed.

Signed-off-by: Ron Stone <ronald.stone@windriver.com>
Change-Id: I526e798bc22efc7efb03b81392825bb3ea9504f0
2021-11-02 14:45:02 +00:00

53 lines
2.1 KiB
ReStructuredText
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

.. _issuers-in-distributed-cloud-fbc035675c0f:
============================
Issuers in Distributed Cloud
============================
In a Distributed Cloud environment, end-users applications have a number of
options for the cert-manager ISSUERs they use:
- (Recommended) As part of your application deployment on each subcloud,
create a cert-manager ISSUER for the External |CA| that you wish to use for
signing your certificates.
- The External |CA|-type ISSUER is configured exactly the same way for
each of your application deployments on each subcloud, and
- Your external clients need only trust a single External |CA|s public
certificate.
- As part of your application deployment on each subcloud, create a local
internal RootCA ``ca`` ISSUER for signing your certificates.
- The local internal RootCA ``ca`` ISSUER should ideally be slightly
different (e.g. a unique subject) on each deployment, and
- Your external clients need to trust each application deployments (on
each subcloud) local internal RootCA public certificate.
- This option is not ideal since this could mean 100s of RootCA
Certificates.
.. - As part of your application deployment on each subcloud, use the
|prod|s Intermediate |CA| ISSUER for that subcloud
- In a Distributed Cloud environment, |prod| manages a
hierarchy of |CAs|, anchored by a single RootCA at the
System Controller.
See below:
.. figure:: /usertasks/kubernetes/figures/figure_3_issuers_dist_cloud.png
The RootCA Certificate and Intermediate |CA| Certificates are
created/renewed automatically by |prod|.
- Your end-users application deployment on a subcloud can simply
create/sign CERTIFICATEs using the |prod|s
DC-AdminEp-Intermediate-CA on the subcloud.
- Your external clients need only trust the single |prod|
DC-AdminEp-Root-|CA|s public certificate on the system Controller.