docs/doc/source/security/kubernetes/local-ldap-certificates-4e1df1e39341.rst
Ngairangbam Mili 93e265fbf3 Local/WAD ldap users sudo and local linux group assignment (stx 9.0)
Added "sudo" and "sys_protected" privileges support for LDAP servers accessed using SSSD service

Story: 2010589
Task: 49410

Change-Id: Ia05edc04feb465c1b59a2a1e4cff26218b144788
Signed-off-by: Ngairangbam Mili <ngairangbam.mili@windriver.com>
2024-02-28 15:30:12 +00:00

2.1 KiB

Local LDAP Certificates

The local server by default serves both HTTPS on port 636 and HTTP on port 389.

The HTTPS server certificate is issued by cert-manager ClusterIssuer system-local-ca and is managed internally by cert-manager. The certificate will be automatically renewed when the expiration date approaches. The certificate is called system-openldap-local-certificate with its secret having the same name system-openldap-local-certificate in the deployment namespace. The server certificate and private key files are stored in the /etc/ldap/certs/ system directory.

In system, the service runs only in the central cloud. Clients in the subcloud (, client tools) are configured so that they can access the services in the central cloud using HTTPS. Thus, system-local-ca ClusterIssuer's certificate is installed in the subcloud as a trusted certificate.

The insecure HTTP service is only supported for backward compatibility with subclouds running older versions of that supports only HTTP. If no such subclouds are present, the insecure HTTP service can be disabled by system service parameter.

Run the following command to disable the insecure service:

~(keystone_admin)]$ system service-parameter-add identity local-openldap insecure_service=disabled

If the service parameter already exists, run the following command:

~(keystone_admin)]$ system service-parameter-modify identity local-openldap insecure_service=disabled

The insecure service can be enabled if it has been disabled. Run the following command to enable the insecure service:

~(keystone_admin)]$ system service-parameter-modify identity local-openldap insecure_service=enabled

After disabling or enabling the insecure local-openldap service, for the change to take effect, apply the service parameter by running the following command:

~(keystone_admin)]$ system service-parameter-apply identity --section local-openldap