This is unreleased documentation for Policy Manager 1.29-next. |
Using custom certificate authorities
Custom Certificate Authorities for Policy registries
It’s possible to specify and configure the Certificate Authorities that a
PolicyServer uses when pulling the ClusterAdmissionPolicy artifacts from the
policy registry. The following spec
fields configure the deployed
policy-server
executable to that effect.
Insecure sources
The default behavior of |
To configure the PolicyServer to accept insecure connections to specific
registries, use the spec.insecureSources
field of PolicyServer. This field
accepts a list of insecure URIs. For example:
spec:
insecureSources:
- localhost:5000
- host.k3d.internal:5000
See Custom Certificates
Authority for more information on how the policy-server
executable treats
insecure URIs.
Custom Certificate Authorities
You can configure the PolicyServer with a custom certificate chain of 1 or more
certificates for a specific URI. To do this you use the field
spec.sourceAuthorities
.
This field is a map of URIs, each with its own list of strings that contain Privacy Enhanced Mail (PEM) encoded certificates. For example:
spec:
sourceAuthorities:
"registry-pre.example.com":
- |
-----BEGIN CERTIFICATE-----
ca-pre1-1 PEM cert
-----END CERTIFICATE-----
- |
-----BEGIN CERTIFICATE-----
ca-pre1-2 PEM cert
-----END CERTIFICATE-----
"registry-pre2.example.com:5500":
- |
-----BEGIN CERTIFICATE-----
ca-pre2 PEM cert
-----END CERTIFICATE-----
See Custom Certificate
Authorities for more information on how the policy-server
executable treats
them.