@@ -32,7 +32,7 @@ it will only connect to servers with a certificate signed by that CA.
32
32
> ** Note** : replace all instances of ` $HOST ` in the following example with the
33
33
> DNS name of your Docker daemon's host.
34
34
35
- First generate CA private and public keys:
35
+ First, on the ** Docker daemon's host machine ** , generate CA private and public keys:
36
36
37
37
$ openssl genrsa -aes256 -out ca-key.pem 4096
38
38
Generating RSA private key, 4096 bit long modulus
@@ -90,6 +90,9 @@ using `10.10.10.20` and `127.0.0.1`:
90
90
For client authentication, create a client key and certificate signing
91
91
request:
92
92
93
+ > ** Note:** for simplicity of the next couple of steps, you may perform this
94
+ > step on the Docker daemon's host machine as well.
95
+
93
96
$ openssl genrsa -out key.pem 4096
94
97
Generating RSA private key, 4096 bit long modulus
95
98
.........................................................++
@@ -138,6 +141,10 @@ providing a certificate trusted by our CA:
138
141
To be able to connect to Docker and validate its certificate, you now
139
142
need to provide your client keys, certificates and trusted CA:
140
143
144
+ > ** Note** : This step should be run on your Docker client machine. As such, you
145
+ > need to copy your CA certificate, your server certificate, and your client
146
+ > certificate to that machine.
147
+
141
148
> ** Note** : replace all instances of ` $HOST ` in the following example with the
142
149
> DNS name of your Docker daemon's host.
143
150
0 commit comments