Skip to content

Mudpuppy12/docker-cfssl

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Docker PKI server using cfssl

I needed a way to generate client certificates from an internal CA on demand. I was sick of generating openssl csr's, then signing them with a multi-step process of commands I always have to look up.

This process is much quicker. A client certificate is requested from the docker-cfssl PKI server. The client can be anywhere on the network, provided it can talk to the pki server. The client submits a csr and The PKI server will then return a signed certificate back to the client.. provided it passes the correct API-KEY in the config_client.json

Notes

You will need the cfssl and cfssljson binaries on your client to talk to the api-server. Head over to https://github.com/cloudflare/cfssl to install. Stick the binaries into a artifactory, or use fpm https://github.com/jordansissel/fpm and make an rpm for your internal repos.

Use ansible to grab the client, then create certs during service installs. That's my attack plan

You will want to fix up the docker-compose.yml with the correct file paths to the certificates.

The example shell scripts should give you an idea how to use this setup.

You should change the API-KEY, if you planning on using these configs.

Updates

05/06 - After reading https://www.mikenewswanger.com/posts/2018/kubernetes-pki/ I am now changing this to use multirootca server for TLS and limited API endpoints

About

Docker cfssl serve

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published