-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for setting multiple DC fields to Certificate, to allow for LDAP client authentication #4424
Comments
Update: I spoke too quickly, you can already set the subject DN on the Certificate resource via the spec.subject field:
As @SpectralHiss mentioned, the DC field (domain component) is not supported on the Certificate resource: |
Issues go stale after 90d of inactivity. |
Reading through RFC5280, it seems like cert-manager only supports a subset of the DN attributes that X.509 implementations "must" support:
Here is a table with the supported attributes in cert-manager with regards to RFC5280:
|
Stale issues rot after 30d of inactivity. |
Any update on the DC field? |
Rotten issues close after 30d of inactivity. |
@jetstack-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Signed-off-by: Yong Kim <yong.kim@servicenow.com>
Signed-off-by: Yong Kim <yong.kim@servicenow.com>
Signed-off-by: Yong Kim <yong.kim@servicenow.com>
Signed-off-by: Yong Kim <yong.kim@servicenow.com>
Signed-off-by: Yong Kim <yong.kim@servicenow.com>
Signed-off-by: Yong Kim <yong.kim@servicenow.com>
Signed-off-by: Yong Kim <yong.kim@servicenow.com>
Ability to provide 'literal' certificate subject block has been released as an alpha feature in cert-manager v1.9 see release notes. |
This has been addressed in #5582 and merged, now pending release in 1.11 |
Note entirely clear if this is a feature request or bug.
Use case:
One of the methods that LDAP allows to authenticate is X509 client authentication.
Part of the access control mandates setting multiple DC fields in the certificate as well as multiple OUs potentially.
The DC field is commonly included as of the standard definition of DN
https://www.ibm.com/docs/en/ibm-mq/7.5?topic=certificates-distinguished-names
It is also mentioned within tge RFC, but only in the context of LDAP and not under the official Subject spec
https://www.rfc-editor.org/rfc/rfc5280.txt
Problem:
In the current certificate spec it is not possible to set a single DC , yet again multiple which is needed for the LDAP client certificate.
If not mistaken, setting multiple OU or DC fields would also have this bug #3203
DC doesn't feature in subject section in spec (4.1.2.6), which is probably why it doesn't appear in pkix.Name type used for the field.
That type allows setting other extra names as a contingency for these commonly used names, it would be great if we could map DCs and multiple OUs as well.
/kind feature
The text was updated successfully, but these errors were encountered: