Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 12. TLS-e for DCN


You can enable TLS (transport layer security) on clouds designed for distributed compute node infrastructure. You have the option of either enabling TLS for public access only, or enabling TLS on every network with TLS-e, which allows for encryption on all internal and external dataflows.

You cannot enable public access on edge stacks as edge sites do not have public endpoints. For more information on TLS for public access, see Enabling SSL/TLS on Overcloud Public Endpoints.

When you configure TLS-e on Red Hat OpenStack Platform (RHOSP) distributed compute node architecture with Red Hat Identity Manager (IdM), take the following actions based on the version of Red Hat Enterprise Linux deployed for Red Hat Identity Manager.

Note

Due to differences in design between the central and edge locations, do not include the following files in edge stacks:

tls-everywhere-endpoints-dns.yaml
This file is ignored at edge sites, the endpoints that it sets are overridden by the endpoints exported from the central stack.
haproxy-public-tls-certmonger.yaml
This file causes a failed deployment as there are no public endpoints at the edge.

Procedure

  • If you are running Red Hat Enterprise Linux (RHEL) 8.2, you must upgrade RHEL to version 8.4, and then follow the directions for RHEL 8.4
  • If you are running RHEL 8.4, modify the ipa-ext.conf and ipa-options-ext.conf files:

    1. Add trusted subnets to the access control list (ACL) in the ipa-ext.conf file:

       acl "trusted_network" {
         localnets;
         localhost;
         192.168.24.0/24;
         192.168.25.0/24;
       };
      Copy to Clipboard Toggle word wrap
    2. Allow recursion and query cache in the /etc/named/ipa-options-ext.conf file:

      allow-recursion { trusted_network; };
      allow-query-cache { trusted_network; };
      Copy to Clipboard Toggle word wrap
    3. Restart the `named-pkcs11 service:

      systemctl restart named-pkcs11
      Copy to Clipboard Toggle word wrap
  • If you are running a version of RHEL 7, you must add an access control instruction for your domain manually.

    1. Run the following commands on Red Hat Identity Manager to configure the ACI.

      ADMIN_PASSWORD=<redhat_01>
      DOMAIN_LEVEL_1=<local>
      DOMAIN_LEVEL_2=<redhat>
      
      cat << EOF | ldapmodify -x -D "cn=Directory Manager" -w ${ADMIN_PASSWORD}
      dn: cn=dns,dc=${DOMAIN_LEVEL_2},dc=${DOMAIN_LEVEL_1}
      changetype: modify
      add: aci
      aci: (targetattr = "aaaarecord || arecord || cnamerecord || idnsname || objectclass || ptrrecord")(targetfilter = "(&(objectclass=idnsrecord)(|(aaaarecord=)(arecord=)(cnamerecord=)(ptrrecord=)(idnsZoneActive=TRUE)))")(version 3.0; acl "Allow hosts to read DNS A/AAA/CNAME/PTR records"; allow (read,search,compare) userdn = "ldap:///fqdn=*,cn=computers,cn=accounts,dc=${DOMAIN_LEVEL_2},dc=${DOMAIN_LEVEL_1}";)
      EOF
      Copy to Clipboard Toggle word wrap
  • Replace <redhat_01> with the administrative password that you want to set.
  • Replace <local> with the top-level domain.
  • Replace <redhat> with the second-level domain.

Additional resources

Retour au début
Red Hat logoGithubredditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance. Découvrez nos récentes mises à jour.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez le Blog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

Theme

© 2025 Red Hat