How do I update the NSP TLS certificate for remote authentication?
Purpose
The TLS certificate for LDAPS or OpenID Connect remote authentication must be current, or the remote authentication attempts fail.
Perform this procedure if the TLS certificate of the LDAPS or OpenID Connect remote authentication server is updated.
|
CAUTION Service Disruption |
Performing the procedure requires a restart of each NSP cluster, which is service-affecting.
You must perform the procedure only during a scheduled maintenance period.
Note: You must perform the procedure on each NSP cluster.
In a DR deployment, you must perform the steps first on the standby NSP cluster.
Steps
1 |
Obtain the new certificate. |
2 |
Ensure that the authentication server TLS certificate is specified in the trustedCertificates parameter in nsp-config.yml: /opt/nsp/NSP-CN-DEP-release-ID/NSP-CN-release-ID/config/nsp-config.yml Example: trustedCertificates: ["/opt/certs/ldap.pem", “/opt/certs/openid.pem”, “/opt/certs/otherCert.pem”] Where trustedCertificates specifies a comma-separated list of paths to certificate files. The above example includes the paths to the ldap.pem and openid.pem authentication server TLS certificates. |
3 |
Open a terminal session to the NSP deployer VM and log in as the root or NSP admin user. |
4 |
Enter the following to apply the certificate: # /opt/nsp/NSP-CN-DEP-release-ID/bin/nspdeployerctl install --config --deploy ↵ |
5 |
Restart the Keycloak pod.
|
6 |
Close the console window. End of steps |