File tree 1 file changed +15
-2
lines changed
1 file changed +15
-2
lines changed Original file line number Diff line number Diff line change @@ -76,19 +76,32 @@ name) matches the hostname you will use to connect to Docker:
76
76
77
77
Next, we're going to sign the public key with our CA:
78
78
79
- Since TLS connections can be made via IP address as well as DNS name, they need
80
- to be specified when creating the certificate. For example, to allow connections
79
+ Since TLS connections can be made via IP address as well as DNS name, the IP addresses
80
+ need to be specified when creating the certificate. For example, to allow connections
81
81
using ` 10.10.10.20 ` and ` 127.0.0.1 ` :
82
82
83
83
$ echo subjectAltName = DNS:$HOST,IP:10.10.10.20,IP:127.0.0.1 > extfile.cnf
84
84
85
+ Set the Docker daemon key's extended usage attributes to be used only for
86
+ server authentication:
87
+
88
+ $ echo extendedKeyUsage = serverAuth > extfile.cnf
89
+
90
+ Now, generate the key:
91
+
85
92
$ openssl x509 -req -days 365 -sha256 -in server.csr -CA ca.pem -CAkey ca-key.pem \
86
93
-CAcreateserial -out server-cert.pem -extfile extfile.cnf
87
94
Signature ok
88
95
subject=/CN=your.host.com
89
96
Getting CA Private Key
90
97
Enter pass phrase for ca-key.pem:
91
98
99
+ [ Authorization plugins] ( ../extend/plugins_authorization ) offer more
100
+ fine-grained control to supplement authentication from mutual TLS. In addition
101
+ to other information described in the above document, authorization plugins
102
+ running on a Docker daemon receive the certificate information for connecting
103
+ Docker clients.
104
+
92
105
For client authentication, create a client key and certificate signing
93
106
request:
94
107
You can’t perform that action at this time.
0 commit comments