When deploying Red Hat Single Sign On for a test or PoC, most users will choose to use a self-signed certificate as explained in the official documentation. The setup instructions are straightforward but this self-signed certificate will trigger certificate error messages in your web browser and can also prevent some clients such as Postman from working properly. This guide explains how to get a public certificate for Red Hat Single Sign On.
A simple and effective way to know if you are using a public certificate is to use curl.
$ curl https://sso.example.test/auth/realms/master
curl: (60) SSL certificate problem: self signed certificate in certificate chain
More details here: https://curl.haxx.se/docs/sslcerts.html
curl performs SSL certificate verification by default, using a "bundle"
of Certificate Authority (CA) public keys (CA certs). If the default
bundle file isn't adequate, you can specify an alternate file
using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
the bundle, the certificate verification probably failed due to a
problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
the -k (or --insecure) option.
HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.
If you get this output from curl, you are using a self-signed certificate that will cause you headaches later. Continue reading to learn fixing this !
During the rest of this article, we will focus on a Red Hat Single Sign On 7.2 installation on OpenShift. We assume Red Hat Single Sign On has been installed as explained in the official documentation
First, move to the project in which you installed Red Hat SSO.
oc project sso
We will retrieve a public certificate from a Certification Authority named Let's Encrypt. Lego is a client that can speak with Let's Encrypt, it has several advantages such as: ease of use, packaged as a container image, etc.
Install Lego in the current project.
oc new-app --name lego xenolf/lego:2.2.0
oc patch dc lego --type=json -p '[{"op": "add", "path": "/spec/template/spec/containers/0/command", "value": ["/bin/sh", "-c", "while :; do sleep 1; done" ]}]'
oc expose dc/lego --port=8080
To get a public certificate for your Red Hat Single Sign On instance, we need to find the hostname of that instance. The hostname is a property of the OpenShift route that has been created as part of the Red Hat SSO installation.
oc get route sso
Query the hostname of your Red Hat SSO's route.
hostname=$(oc get route sso -o jsonpath='{.spec.host}')
This route to your Red Hat SSO instance needs to be replaced by a temporary route to Lego so that Let's Encrypt can perform the HTTP challenge. The easiest way to do so, is to delete your existing route and create a new one with the same hostname.
oc delete route sso
oc expose service lego --hostname="$hostname" --name=sso --port=8080
You can now trigger the certificate request from the running Lego pod:
The lego pod needs root permissions so you may need to add the following to the dc
:
securityContext:
privileged: true
-p '{
"spec": {
"template": {
"spec": {
"containers": [
{
"name": "name-container",
"securityContext": {
"privileged": true
}
}
]
}
}
}
}'
pod=$(oc get pods -o name -l app=lego |head -n1)
oc rsh $pod lego --path /tmp/.lego --http.port :8080 --email [email protected] -k rsa2048 -d "$hostname" --accept-tos run
The first command gets the name of the pod running Lego and sets a shell variable accordingly. The second command runs the lego
command from the Lego container. This command has several switches:
--path /tmp/.lego
will store the generated certificates in/tmp
--http.port :8080
asks Lego to listen on port 8080 to receive the ACME HTTP challenge--email
provides a valid email address for let's encrypt to verify the requester's authenticity and a key will be generated as a result-k rsa2048
sets the certificate to be generated to the standard RSA format as OpenShift doesn't understand the default EC format from Let's Encrypt-d "$hostname"
sets the hostname of our SSO instance in the certificate request--accept-tos
means you read and accepted the Let's Encrypt Terms of Servicerun
triggers the certificate request
If you did everything correctly, you should see something like this:
2019/01/22 12:03:55 [INFO] [hostname] acme: Obtaining bundled SAN certificate
2019/01/22 12:03:56 [INFO] [hostname] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz/[redacted]
2019/01/22 12:03:56 [INFO] [hostname] acme: Could not find solver for: tls-alpn-01
2019/01/22 12:03:56 [INFO] [hostname] acme: Trying to solve HTTP-01
2019/01/22 12:03:56 [INFO] [hostname] Served key authentication
2019/01/22 12:04:01 [INFO] [hostname] The server validated our request
2019/01/22 12:04:01 accept tcp [::]:8080: use of closed network connection
2019/01/22 12:04:01 [INFO] [hostname] acme: Validations succeeded; requesting certificates
2019/01/22 12:04:03 [INFO] [hostname] Server responded with a certificate.
Congratulations, you just issued your first public certificate !
Retrieve the freshly issued certificate from the Lego container and store it somewhere safe:
oc rsync $pod:/tmp/.lego ~/
You should now have the certificate stored in your home folder on your workstation.
$ find ~/.lego/certificates
/Users/redhat/.lego/certificates
/Users/redhat/.lego/certificates/<hostname>.key
/Users/redhat/.lego/certificates/<hostname>.issuer.crt
/Users/redhat/.lego/certificates/<hostname>.json
/Users/redhat/.lego/certificates/<hostname>.crt
You can now delete the temporary route and replace it with a new to route to the SSO pod.
oc delete route sso
oc create -f - <<EOF
apiVersion: v1
kind: Route
metadata:
name: sso
spec:
host: $hostname
to:
kind: Service
name: sso
tls:
termination: reencrypt
key: |-
$(sed 's/^/ /' ~/.lego/certificates/$hostname.key)
certificate: |-
$(sed 's/^/ /' ~/.lego/certificates/$hostname.crt)
caCertificate: |-
$(sed 's/^/ /' ~/.lego/certificates/$hostname.issuer.crt)
EOF
Confirm that your SSO instance is now using a public certificate by running again the curl
command.
curl https://$hostname/auth/realms/master
If you are using your SSO service within the same cluster that uses that SSO service then the Let's Encrypt certificate will need to be added to the master's CA bundle (for each master node) to be presented to the SSO service.
cat /var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt
Add this to the route of the SSO service's CA bundle and to that of each of the master node's CA bundle.
Remember to restart the master API master-restart api
and the controllers master-restart controllers
.
Lego does not need to run continuously, so between certificate renewals (every 90 days), you can scale it down.
oc scale dc/lego --replicas=0
Self-signed certificates are always a headache when delivering a proof of concept or a workshop. In this article we presented a very practical way to get a valid public certificate for your Red Hat Single Sign On instance.
Some aspects would need improvements to be used on longer periods or in production environments. For instance, we would need to use the proper Kubernetes concepts, Job and Cron to run Lego, handle the certificate renewal, use the DNS validation challenge (which requires a more complex setup but does not involves deleting the sso
route).
Also, this article is about getting public certificates for your SSO instance that is publicly deployed on the Internet. If your SSO instance is deployed on your laptop for development purposes, the mkcert
project can help you generate proper certificates and make them trusted in your web browser.
Nevertheless I hope this article will give you ideas and entice you to use public certificates for your SSO setups.