You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Merge branch 'edburns/o-572-remove-key-vault-mentions' into 'main'
On branch edburns/o-572-remove-key-vault-mentions
See merge request weblogic-cloud/weblogic-kubernetes-operator!4999
(cherry picked from commit 4280ff6)
b8f8e22 On branch edburns/o-572-remove-key-vault-mentions
Co-authored-by: Ryan Eberhard <[email protected]>
Copy file name to clipboardExpand all lines: documentation/site/content/managing-domains/aks/_index.md
+2-54Lines changed: 2 additions & 54 deletions
Original file line number
Diff line number
Diff line change
@@ -127,9 +127,9 @@ When you are satisfied with your selections, select **Next** and open **TLS/SSL*
127
127
128
128
With the **TLS/SSL** blade, you can configure Oracle WebLogic Server Administration Console on a secure HTTPS port, with your own SSL certificate provided by a Certifying Authority (CA). See [Oracle WebLogic Server Keystores configuration](https://aka.ms/arm-oraclelinux-wls-ssl-configuration) for more information.
129
129
130
-
Select **Yes** or **No** for the option **Configure WebLogic Server Administration Console, Remote Console, and cluster to use HTTPS (Secure) ports, with your own TLS/SSL certificate.** If you select **No**, you don't have to provide any details, and can proceed by selecting **Next**. If you select **Yes**, you can choose to provide the required configuration details by either uploading existing keystores or by using keystores stored in Azure Key Vault.
130
+
Select **Yes** or **No** for the option **Configure WebLogic Server Administration Console, Remote Console, and cluster to use HTTPS (Secure) ports, with your own TLS/SSL certificate.** If you select **No**, you don't have to provide any details, and can proceed by selecting **Next**. If you select **Yes**, you must upload your existing keystores.
131
131
132
-
If you want to upload existing keystores, select **Upload existing KeyStores** for the option **How would you like to provide required configuration**, and enter the values for the fields listed in the following table.
132
+
Enter the values for the fields listed in the following table.
133
133
134
134
#### Upload existing KeyStores
135
135
@@ -147,23 +147,6 @@ If you want to upload existing keystores, select **Upload existing KeyStores** f
147
147
| Confirm password | Re-enter the value of the preceding field. |
148
148
| The Trust KeyStore type (JKS,PKCS12) | Select the type of custom trust keystore. The supported values are JKS and PKCS12. |
149
149
150
-
If you want to use keystores that are stored in Azure Key Vault, select **Use KeyStores stored in Azure Key Vault** for the option **How would you like to provide required configuration**, and enter the values for the fields listed in the following table.
151
-
152
-
#### Use KeyStores stored in Azure Key Vault
153
-
154
-
| Field | Description |
155
-
|-------|-------------|
156
-
| Resource group name in current subscription containing the Key Vault | Enter the name of the Resource Group containing the Key Vault that stores the SSL certificate and the data required for WebLogic SSL termination. |
157
-
| Name of the Azure Key Vault containing secrets for the TLS/SSL certificate | Enter the name of the Azure Key Vault that stores the SSL certificate and the data required for WebLogic SSL termination. |
158
-
| The name of the secret in the specified Key Vault whose value is the Identity KeyStore Data | Enter the name of the Azure Key Vault secret that holds the value of the identity keystore data. Follow [Store the TLS/SSL certificate in the Key Vault](#store-the-tlsssl-certificate-in-the-key-vault) to upload the certificate to Azure Key Vault. |
159
-
| The name of the secret in the specified Key Vault whose value is the passphrase for the Identity KeyStore | Enter the name of the Azure Key Vault secret that holds the value of the passphrase for the identity keystore. |
160
-
| The Identity KeyStore type (JKS,PKCS12) | Select the type of custom identity keystore. The supported values are JKS and PKCS12. |
161
-
| The name of the secret in the specified Key Vault whose value is the Private Key Alias | Enter the name of the Azure Key Vault secret that holds the value of the private key alias. |
162
-
| The name of the secret in the specified Key Vault whose value is the passphrase for the Private Key | Enter the name of the Azure Key Vault secret that holds the value of the passphrase for the private key. |
163
-
| The name of the secret in the specified Key Vault whose value is the Trust KeyStore Data | Enter the name of the Azure Key Vault secret that holds the value of the trust keystore data. Follow [Store the TLS/SSL certificate in the Key Vault](#store-the-tlsssl-certificate-in-the-key-vault) to upload the certificate to Azure Key Vault. |
164
-
| The name of the secret in the specified Key Vault whose value is the passphrase for the Trust KeyStore | Enter the name of the Azure Key Vault secret that holds the value of the the passphrase for the trust keystore. |
165
-
| The Trust KeyStore type (JKS,PKCS12) | Select the type of custom trust keystore. The supported values are JKS and PKCS12. |
166
-
167
150
When you are satisfied with your selections, select **Next** and open **Load balancing** blade.
168
151
169
152
### Load balancing
@@ -193,7 +176,6 @@ You must select one of the following three options, each described in turn.
193
176
194
177
* Generate a self-signed front-end certificate: Generate a self-signed front-end certificate and apply it during deployment.
195
178
* Upload a TLS/SSL certificate: Upload the pre-signed certificate now.
196
-
* Identify an Azure Key Vault: The Key Vault must already contain the certificate and its password stored as secrets.
197
179
198
180
**Generate a self-signed frontend certificate**
199
181
@@ -210,16 +192,6 @@ You must select one of the following three options, each described in turn.
210
192
| Confirm password | Re-enter the value of the preceding field. |
211
193
| Trusted root certificate(.cer, .cert) | A trusted root certificate is required to allow back-end instances in the application gateway. The root certificate is a Base-64 encoded X.509(.CER) format root certificate. |
212
194
213
-
**Identify an Azure Key Vault**
214
-
215
-
| Field | Description |
216
-
|-------|-------------|
217
-
| Resource group name in current subscription containing the KeyVault | Enter the name of the Resource Group containing the Key Vault that stores the application gateway SSL certificate and the data required for SSL termination. |
218
-
| Name of the Azure KeyVault containing secrets for the Certificate for SSL Termination | Enter the name of the Azure Key Vault that stores the application gateway SSL certificate and the data required for SSL termination. |
219
-
| The name of the secret in the specified Key Vault whose value is the front-end TLS/SSL certificate data | Enter the name of the Azure Key Vault secret that holds the value of the Application Gateway front-end SSL certificate data. Follow [Store the TLS/SSL certificate in the Key Vault](#store-the-tlsssl-certificate-in-the-key-vault) to upload the certificate to Azure Key Vault. |
220
-
| The name of the secret in the specified Key Vault whose value is the password for the front-end TLS/SSL certificate | Enter the name of the Azure Key Vault secret that holds the value of the password for the application gateway front-end SSL certificate. |
221
-
| The name of the secret in the specified Key Vault whose value is the trusted root certificate data | A trusted root certificate is required to allow back-end instances in the application gateway. Enter the name of the Azure Key Vault secret that holds the value of the application gateway trusted root certificate data. Follow [Store the TLS/SSL certificate in the Key Vault](#store-the-tlsssl-certificate-in-the-key-vault) to upload the certificate to Azure Key Vault. |
222
-
223
195
Regardless of how you provide the certificates, there are several other options when configuring the Application Gateway, as described next.
224
196
225
197
| Field | Description |
@@ -389,27 +361,3 @@ After clicking **Create**, you will go to the **Deployment is in progress** page
389
361
|`shellCmdtoOutputWlsImageProperties`|Shell command to display the base64 encoded string of the model properties.{{< line_break >}}Sample value:{{< line_break >}}`echo -e IyBDF...PTUK \| base64 -d > model.properties`|
390
362
|`shellCmdtoOutputWlsVersionsandPatches`| Shell command to display the base64 encoded string of the WLS version and patches.{{< line_break >}}Sample value:{{< line_break >}}`echo -e CldlY...gMS4= \| base64 -d > version.info`|
391
363
392
-
### Useful resources
393
-
394
-
Review the following useful resources.
395
-
396
-
#### Store the TLS/SSL certificate in the Key Vault
397
-
398
-
1. Base 64 encode the certificate file; omit the `-w0` for macOS:
399
-
400
-
```bash
401
-
base64 myIdentity.jks -w0 >mycert.txt
402
-
# base64 myIdentity.p12 -w0 >mycert.txt
403
-
# base64 myTrust.jks -w0 >mycert.txt
404
-
# base64 myTrust.p12 -w0 >mycert.txt
405
-
# base64 root.cert -w0 >mycert.txt
406
-
# base64 gatewayCert.pfx -w0 >mycert.txt
407
-
```
408
-
409
-
2. From the Azure portal, open your Key Vault.
410
-
3. In the Settings section, selectSecrets.
411
-
4. Select Generate/Import.
412
-
5. Under Upload options, leave the default value.
413
-
6. Under Name, enter `myIdentityCertData`, or whatever name you like.
414
-
7. Under Value, enter the content of the mycert.txt file.
415
-
8. Leave the remaining values at their defaults and selectCreate.
0 commit comments