Use Vault as an intermediate CA¶
In this how-to guide, we will configure Vault to act as an intermediate Certificate Authority (CA) using Vault’s PKI secrets engine. Here self-signed-certificates will be the parent CA and tls-certificates-requirer will be the charm requesting a certificate to Vault.
The certificates issued by Vault will have a validity period that is half of its intermediate CA’s, which is determined by the root provider’s configuration, in this case, the self-signed certificates.
Note
Vault PKI will only allow issuing certificates depending on how it is configured, please see pki_allow_subdomains
, pki_allowed_domains
, pki_allow_any_name
and pki_allow_wildcard_certificates
Configure Vault’s common name
juju config vault pki_ca_common_name=mydomain.com
Configure Vault PKI Engine to allow issuing certificates for subdomains
juju config vault pki_allow_subdomains=true
Deploy the parent CA
juju deploy self-signed-certificates --channel 1/stable
Integrate Vault with its parent CA
juju integrate vault:tls-certificates-pki self-signed-certificates
Deploy
tls-certificates-requirer
juju deploy tls-certificates-requirer --config common_name=demo.mydomain.com --config sans_dns=demo.mydomain.com
Integrate TLS Certificates Requirer with Vault
juju integrate tls-certificates-requirer vault:vault-pki
Retrieve the certificate
juju run tls-certificates-requirer/leader get-certificate