Generating custom certificates manually
Generate custom certificates for API Connect without using cert-manager.
About this task
Note: If you want to customize only your user-facing endpoint certificates, then you do not need to
configure them at installation. Install API Connect normally and
then update the certificates following the steps in Customizing user-facing certificates.
If you choose to create your certificates manually, then you lose some of the management features of cert-manager. For example, you must manually update your certificates before they expire.
Requirements for manually created certificates:
- Extended Key Usage (EKU) must be either
serverAuth
orclientAuth
depending upon the type of certificate. Certificates of the type Server must have an Extended Key Usage withserverAuth
purpose. Certificates of the type Client must have an Extended Key Usage withclientAuth
purpose. - Subject Alternative Name (SAN) for the required hosts.
- If a certificate is signed by an internal or custom CA, include the full chain in the end
certificate. If you omit the full chain, then a user who uses OpenSSL to access the endpoint gets
the following error:
error:num=20:unable to get local issuer certificate
The following example shows the full chain for an end certificate (signed by a custom CA):-------BEGIN CERTIFICATE ----- Cert contents for end-cert --------END CERTIFICATE ---------- -------BEGIN CERTIFICATE ----- Cert contents for Intermediate-CA --------END CERTIFICATE ---------- -------BEGIN CERTIFICATE ----- Cert contents for Root CA --------END CERTIFICATE ----------
Procedure
What to do next
Configure your subsystem CR YAML files to use your custom certificates: Deploying API Connect subsystems with custom certificates.