diff --git a/content/chef_client_security.md b/content/chef_client_security.md index 9bb5745c98..004500c8c1 100644 --- a/content/chef_client_security.md +++ b/content/chef_client_security.md @@ -1,5 +1,5 @@ +++ -title = "Chef Infra Client Security" +title = "Chef Infra Client security" draft = false gh_repo = "chef-web-docs" @@ -8,7 +8,7 @@ aliases = ["/chef_client_security.html", "/auth.html"] [menu] [menu.infra] - title = "Chef Infra Client Security" + title = "Chef Infra Client security" identifier = "chef_infra/security/chef_client_security.md Security" parent = "chef_infra/security" weight = 10 @@ -27,21 +27,21 @@ aliases = ["/chef_client_security.html", "/auth.html"] {{< readfile file="content/reusable/md/security_chef_validator_context.md" >}} -## SSL Certificates +## SSL certificates {{< readfile file="content/server/reusable/md/server_security_ssl_cert_client.md" >}} -### trusted_certs Directory +### trusted_certs directory -Your organization may use a private Certificate Authority (CA) to generate SSL Certificates or they may create self-signed SSL certificates to use on internal networks or during software development and testing. +You can use use a private certificate authority (CA) to generate SSL certificates or they may create self-signed SSL certificates to use on internal networks or during software development and testing. -The `trusted_certs` directory on Chef Workstation and in Chef Infra Client works as a trusted certificate store for all communication in the Chef Infra system. Chef Infra trusts all SSL certificates stored in this directory--including certificates that aren't issued by a trusted Certificate Authority (CA). +The `trusted_certs` directory on Chef Workstation and in Chef Infra Client works as a trusted certificate store for all communication in the Chef Infra system. Chef Infra trusts all SSL certificates stored in this directory---including certificates that aren't issued by a trusted certificate authority (CA). Place private and self-signed certificates in the `trusted_certs` directory to use them within Chef Infra Client and Workstation tools. -Use the [chef_client_trusted_certificate]({{< relref "/resources/chef_client_trusted_certificate" >}}) Chef Infra Client resource to manage these certificates continuously. +Use the [`chef_client_trusted_certificate`]({{< relref "/resources/chef_client_trusted_certificate" >}}) Chef Infra Client resource to manage these certificates continuously. -#### trusted_certs Locations +#### trusted_certs directory locations ##### Chef Workstation @@ -50,7 +50,7 @@ When you install Chef Workstation, it creates a `trusted_certs` directory locate - Windows: `C:\.chef\trusted_certs` - All other systems: `~/.chef/trusted_certs` -##### Chef Infra Client Nodes +##### Chef Infra Client nodes When you bootstrap a node, the Chef Infra Client copies the SSL certificates for the Chef Infra Server onto the node. The `trusted_certs` directory on the node is located at: @@ -68,70 +68,65 @@ A value for `SSL_CERT_FILE` isn't set by default. Unless updated, the locations To use a custom CA bundle, update the environment variable to specify the path to the custom CA bundle. The first step to troubleshoot a failing SSL certificate is to verify the location of the `SSL_CERT_FILE`. -### client.rb Settings - -Use following client.rb settings to manage SSL certificate preferences: - -
| Setting | -Description | -
|---|---|
local_key_generation |
-Whether the Chef Infra Server or Chef Infra Client generates the private/public key pair. When true, Chef Infra Client generates the key pair, and then sends the public key to the Chef Infra Server. Default value: true. |
-
ssl_ca_file |
-The file for the OpenSSL key. Chef Infra Client generates this setting automatically. | -
ssl_ca_path |
-The location of the OpenSSL key file. Chef Infra Client generates this setting automatically. | -
ssl_client_cert |
-The OpenSSL X.509 certificate for mutual certificate validation. Required for mutual certificate validation on the Chef Infra Server. Default value: nil. |
-
ssl_client_key |
-The OpenSSL X.509 key used for mutual certificate validation. Required for mutual certificate validation on the Chef Infra Server. Default value: nil. |
-
|
-Set the verification mode for HTTPS requests. The recommended setting is
|
-
verify_api_cert |
-Verify the SSL certificate on the Chef Infra Server. Set to true, Chef Infra Client always verifies the SSL certificate. Set to false, Chef Infra Client uses ssl_verify_mode to determine if the SSL certificate requires verification. Default value: false. |
-