Make HTTPS Requests from Sources Outside the Management Kubernetes Cluster

Clients lying outside the system’s management cluster need to trust the Certificate Authority (CA) certificate or host certificate in order to make requests to a non-compute node (NCN). Getting the client system to trust the CA certificate depends on the operating system.

This procedure shows an example of how to have a client trust the system’s CA certificate on a Mac OS X system.

Updating the default certificates and password of the Keycloak master administrator is not supported.

Prerequisites

This procedure assumes that it is being carried out on a Mac OS X system.

Procedure

  1. (mac$) Retrieve the CA public certificate file.

    The scp command is used in the following example to copy the CA public certificate file to the current directory.

    scp jones-ncn-m001.us.cray.com:/etc/pki/trust/anchors/platform-ca-certs.crt .
    

    Example output:

    certificate_authority.crt                 100%  989     1.4MB/s   00:00
    

    Troubleshooting: Request a copy of the certificate file from a system administrator if it is not possible to log on to the NCN.

  2. Use Finder to locate the .crt file.

    Keychain Access

  3. Double-click the .crt file to add it to the system keychain.

    The .crt file might still not be trusted; start up the Keychain Access utility to mark it as trusted for SSL.

    CA Certificate Settings

  4. Double-click the untrusted certificate.

  5. Expand the Trust menu item to set Change Secure Sockets Layer (SSL) to Always Trust.

  6. Quit Keychain Access.

  7. (mac$) Make secure requests to any NCN as needed.

    Making a secure request to an NCN requires users to pass an authentication token. See Retrieve an Authentication Token in order to set the $TOKEN variable used in the example below.

    For example:

    curl -k -H "Authorization: Bearer ${TOKEN}" https://api-gw-service-nmn.local/apis/smd/hsm/v2/service/ready
    

    Example output:

    {"code":0,"message":"HSM is healthy"}