Add_workflow_for_techpubs | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Available_since | ||||
---|---|---|---|---|
|
Excerpt | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
The Transport Layer Security (TLS) certificates secure the communication between components within the cluster. The TLS offers trust, data integrity, and encryption, preventing unauthorized access to and tampering with sensitive data. As the number of cloud-native workloads and applications increases in modern communication environments, managing the TLS certificates for each application exposed to the SBC and SBC-RAMP deployment workloads is challenging since security is a high-priority concern for organizations. Possessing a tool that makes certificate management easier is critical to operationalizing TLS implementation in cloud-native applications. The Mutual Transport Layer installs the certificate Security (mTLS) between the pods and protects workloads against attacks from within. The SBC exposes the certificates to the pod in two ways:
To resolve these issues, the SBC CNe is enhanced to support centralized certificate management. The Cert Manager and the CSI Driver bring solutions to mitigate these issues and improve security management. Cert-Manager The Cert-Manager is a Kubernetes or OpenShift add-on designed to assist in creating and managing TLS X.509 certificates. It issues certificates from various certificate issuers, including Let's Encrypt, HashiCorp Vault, and Venafi. The Cert-Manager adds certificates and certificate issuers as resource types in the Kubernetes cluster, simplifying obtaining, renewing, and using those certificates. It ensures certificates are valid and up to date and attempts to renew certificates at a configured time before the expiry date. CSI Driver The Container Storage Interface (CSI) is a standard for exposing arbitrary block and file storage systems to containerized workloads on Container Orchestration Systems (COs) such as Kubernetes. The CSI-driver is a plugin designed for Kubernetes that works alongside the cert-manager. The Pods that mount the cert-manager CSI-driver request certificates from the cert-manager without a requirement to create a certificate resource. These certificates are mounted directly into the Pod without creating an intermediate secret. For more information, refer to https://cert-manager.io/docs/usage/csi-driver/. Certificate Object Configure the Certificate Object for certificate requests. Once this is configured, every deployment (For example, SC, SLB, OAM, and so on) will hold its own certificate, and all the replicas (Pods of that deployment) will share that certificate. For more information, refer to https://cert-manager.io/docs/usage/certificate/#creating-certificate-resources.
User Provided Secret The user can use third-party certificates to place inside a Kubernetes secret and configure it (The Cert-Manager is not involved in this scenario).
|