Skip to content

Latest commit

 

History

History
25 lines (18 loc) · 1.31 KB

certificates.md

File metadata and controls

25 lines (18 loc) · 1.31 KB

Certificates

The certificate generation process has been revamped to produce a more secure cluster.

Previously, all nodes on the cluster had full access to the API server using the admin account. Now that RBAC is enabled, we can take advantage of more granural authorization policies, and thus further secure the cluster.

During the upgrade to v1.4.0, you will notice that new component-specific certificates will be generated. These certificates have a tighter access model than the previous node-level certificates used in the past.

More information about certificates used in the cluster can be found here

Action Required: Admin Certificate

One side effect of this change is that existing admin certificates are considered invalid. This is because the admin user must belong to the system:masters group, which is achieved by including system:masters as an organization in the certificate.

For this reason, KET will backup the existing admin certificate and generate a new one with the right organization. This will only happen if KET detects that the certificate was generated by KET. In the case that the certificate was provided to KET, you will have to remove the existing admin certificate before performing an upgrade.

KET will also regenerate a kubeconfig file with the new admin certificate.