Chapter 3. Internal certificate authority rotation for RHACS


Certificate authority (CA) rotation is important in Red Hat Advanced Cluster Security for Kubernetes (RHACS) to ensure that Central and secured clusters can communicate. RHACS includes an internal CA that is valid for 5 years. Central and secured cluster service certificates depend on this CA. If the CA expires, RHACS stops working.

Previously, if the internal CA expired, you had to delete the central-tls secret and manually re-register all the secured clusters. Starting with RHACS 4.9, the Operator manages CA rotation. Central simultaneously trusts two CAs, enabling overlap and providing a smoother migration.

The following table shows the level of certificate authority (CA) rotation support based on the installation method you use for Central and secured clusters:

Expand
Table 3.1. Installation methods and CA rotation support
ComponentInstallation methodCA rotation supportNotes

Central

Operator-installed

Full support

Migration is fully automated.

Central

Helm or manifest

Not supported

Use the Operator for automatic CA rotation.

Secured cluster

Operator-installed

Full support

Migration is fully automated if the connected Central instance is also Operator-installed.

Secured cluster

Helm or manifest

Partial support

Connect to Central that has rotated its CA, but cannot rotate its own service certificates to the new CA. Manual re-registration is required before the old CA expires.

3.2. Preparing for deployments and upgrades

The following table lists the actions you must take for each deployment scenario during certificate authority (CA) rotation or upgrades:

Expand
Table 3.2. Required user actions
Deployment scenarioWhat you must do

Operator-managed secured clusters

No action is needed if Central is also Operator-managed. The Operator automates rotation.

Helm-managed secured clusters

Remove the cluster and re-register it with a new cluster registration secret (CRS) or init bundle before the 5-year CA expires. Follow these steps:

  1. Delete the cluster from Central.
  2. Remove the Secured Cluster CR (or delete all the tls-cert-* certificates and redeploy the cluster.
  3. Register the secured cluster with a new CRS.

Upgrading a Central instance older than 4 years to Red Hat Advanced Cluster Security for Kubernetes (RHACS) 4.9

Note

Central switches to certificates signed by the new CA and secured clusters older than version 4.9 cannot trust the certificates.

You can do any of the following tasks:

  • Upgrade all secured clusters to RHACS 4.9.
  • Re-register any secured clusters that you cannot upgrade.

Secured clusters for RHACS 4.9 and later versions automatically trust the new CA if the old CA is still valid.

Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat Documentation

Legal Notice

Theme

© 2026 Red Hat
Back to top