Skip to content

Commit 876bdfe

Browse files
tych0Misty Stanley-Jones
authored and
Misty Stanley-Jones
committed
add two little auth docs blurbs (docker#4405)
1 parent 6918195 commit 876bdfe

File tree

1 file changed

+15
-2
lines changed

1 file changed

+15
-2
lines changed

engine/security/https.md

+15-2
Original file line numberDiff line numberDiff line change
@@ -76,19 +76,32 @@ name) matches the hostname you will use to connect to Docker:
7676

7777
Next, we're going to sign the public key with our CA:
7878

79-
Since TLS connections can be made via IP address as well as DNS name, they need
80-
to be specified when creating the certificate. For example, to allow connections
79+
Since TLS connections can be made via IP address as well as DNS name, the IP addresses
80+
need to be specified when creating the certificate. For example, to allow connections
8181
using `10.10.10.20` and `127.0.0.1`:
8282

8383
$ echo subjectAltName = DNS:$HOST,IP:10.10.10.20,IP:127.0.0.1 > extfile.cnf
8484

85+
Set the Docker daemon key's extended usage attributes to be used only for
86+
server authentication:
87+
88+
$ echo extendedKeyUsage = serverAuth > extfile.cnf
89+
90+
Now, generate the key:
91+
8592
$ openssl x509 -req -days 365 -sha256 -in server.csr -CA ca.pem -CAkey ca-key.pem \
8693
-CAcreateserial -out server-cert.pem -extfile extfile.cnf
8794
Signature ok
8895
subject=/CN=your.host.com
8996
Getting CA Private Key
9097
Enter pass phrase for ca-key.pem:
9198

99+
[Authorization plugins](../extend/plugins_authorization) offer more
100+
fine-grained control to supplement authentication from mutual TLS. In addition
101+
to other information described in the above document, authorization plugins
102+
running on a Docker daemon receive the certificate information for connecting
103+
Docker clients.
104+
92105
For client authentication, create a client key and certificate signing
93106
request:
94107

0 commit comments

Comments
 (0)