September 28, 2015 | by Veer Muchandi
In this new demo video, Veer Muchandi explains the different options that developers have to use SSL with OpenShift.
Link to the architecture that explains these concepts: Secured Routes
Create a keystore:
keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -storepass supersecret -validity 360 -keysize 2048
Convert key to pkcs12 format:
keytool -importkeystore -srckeystore keystore.jks -destkeystore keystore.p12 -srcstoretype jks -deststoretype pkcs12
Get cert and private key from this file:
openssl pkcs12 -in keystore.p12 -nodes -password pass:supersecret
Create a keystore:
keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -storepass supersecret -validity 360 -keysize 2048
Add a secret:
oc secrets new eap-app-secret keystore.jks
Add a service account to use the above secret:
echo '{
"apiVersion": "v1",
"kind": "ServiceAccount",
"metadata": {
"name": "eap-service-account"
},
"secrets": [
{
"name": "eap-app-secret"
}
]
}' | oc create -f -
Special thanks go to Ram Ranganathan(ramr@redhat.com) for helping with keytool commands.
View the Entire OpenShift 3 Demo Playlist
For the latest information on OpenShift 3, please visit enterprise.openshift.com.
Categories
March 20, 2023
March 17, 2023
March 16, 2023