Skip to content

Commit e1c41c5

Browse files
author
Brice Fallon-Freeman
authored
Merge pull request #3267 from php-coder/document_oadm_ca_expire_days_option
Document --expire-days and --signer-expire-days options
2 parents 9c13912 + 95a6f4d commit e1c41c5

File tree

6 files changed

+45
-0
lines changed

6 files changed

+45
-0
lines changed

install_config/advanced_ldap_configuration/sssd_for_ldap_failover.adoc

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,15 @@ in this topic they are kept separate.
6767
[[sssd-phase-1-certificate-generation]]
6868
== Phase 1: Certificate Generation
6969

70+
[NOTE]
71+
====
72+
The undermentioned commands generate certificate files that will be valid for 2
73+
years (and 5 years for Certification authority (CA) certificate). These
74+
periods can be altered with `--expire-days` and `--signer-expire-days` options
75+
but by security reasons it is strongly recommended to not make them greater
76+
than these values.
77+
====
78+
7079
. To ensure that communication between the authenticating proxy and
7180
{product-title} is trustworthy, create a set of Transport Layer Security (TLS)
7281
certificates to use during the other phases of this setup. In the

install_config/configuring_authentication.adoc

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -756,6 +756,11 @@ xref:requestheader-master-ca-config[master's identity provider configuration].
756756
--serial='/etc/origin/master/proxyca.serial.txt'
757757
----
758758
759+
[NOTE]
760+
`oadm ca create-signer-cert` generates a certificate that is valid for 5 years.
761+
This period can be altered with `*--expire-days*` option but by security
762+
reasons it is strongly recommended to not make it greater than this value.
763+
759764
Generate a client certificate for the proxy. This can be done using any x509
760765
certificate tooling. For convenience, the `oadm` CLI can be used:
761766
@@ -787,6 +792,11 @@ must be included in the `X509v3 Subject Alternative Name` in the certificate
787792
that is specified for `*SSLCertificateFile*`. If a new certificate needs to be
788793
created, the `oadm ca create-server-cert` command can be used.
789794
795+
[NOTE]
796+
`oadm create-api-client-config` generates a certificate that is valid for 2 years.
797+
This period can be altered with `*--expire-days*` option but by security
798+
reasons it is strongly recommended to not make it greater than this value.
799+
790800
*Configuring Apache*
791801
792802
Unlike OpenShift Enterprise 2, this proxy does not need to reside on the same

install_config/master_node_configuration.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -939,6 +939,11 @@ The following commands write the relevant launch configuration file(s),
939939
certificate files, and any other necessary files to the specified
940940
`--write-config` or `--node-dir` directory.
941941

942+
Generated certificate files will be valid for 2 years. Certification authority
943+
(CA) certificate will be valid for 5 years. These periods can be altered with
944+
`--expire-days` and `--signer-expire-days` options but by security reasons
945+
it is strongly recommended to not make them greater than these values.
946+
942947
To create configuration files for an all-in-one server (a master and a node on
943948
the same host) in the specified directory:
944949

install_config/registry/securing_and_exposing_registry.adoc

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,13 @@ $ oadm ca create-server-cert \
5353
--key=/etc/secrets/registry.key
5454
----
5555
+
56+
[NOTE]
57+
====
58+
`oadm ca create-server-cert` generates a certificate that is valid for 2 years.
59+
This period can be altered with `*--expire-days*` option but by security
60+
reasons it is strongly recommended to not make it greater than this value.
61+
====
62+
+
5663
. Create the secret for the registry certificates:
5764
+
5865
----

install_config/router/default_haproxy_router.adoc

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -718,6 +718,13 @@ $ oadm ca create-server-cert --signer-cert=$CA/ca.crt \
718718
----
719719
====
720720

721+
[NOTE]
722+
====
723+
`oadm ca create-server-cert` generates a certificate that is valid for 2 years.
724+
This period can be altered with `*--expire-days*` option but by security
725+
reasons it is strongly recommended to not make it greater than this value.
726+
====
727+
721728
The router expects the certificate and key to be in PEM format in a single
722729
file:
723730

registry_quickstart/administrators/system_configuration.adoc

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,13 @@ $ exit
141141
----
142142
====
143143
+
144+
[NOTE]
145+
====
146+
`oadm ca create-server-cert` generates a certificate that is valid for 2 years.
147+
This period can be altered with `*--expire-days*` option but by security
148+
reasons it is strongly recommended to not make it greater than this value.
149+
====
150+
+
144151
. Copy the generated files to the registry directory and change ownership so the
145152
atomic-registry service can read the files.
146153
+

0 commit comments

Comments
 (0)