Skip to content

Commit ac4d5fb

Browse files
committed
Merge branch 'edburns/o-572-remove-key-vault-mentions' into 'main'
On branch edburns/o-572-remove-key-vault-mentions See merge request weblogic-cloud/weblogic-kubernetes-operator!4999 (cherry picked from commit 4280ff6) b8f8e22 On branch edburns/o-572-remove-key-vault-mentions Co-authored-by: Ryan Eberhard <[email protected]>
1 parent eb97037 commit ac4d5fb

File tree

1 file changed

+2
-54
lines changed
  • documentation/site/content/managing-domains/aks

1 file changed

+2
-54
lines changed

documentation/site/content/managing-domains/aks/_index.md

Lines changed: 2 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -127,9 +127,9 @@ When you are satisfied with your selections, select **Next** and open **TLS/SSL*
127127

128128
With the **TLS/SSL** blade, you can configure Oracle WebLogic Server Administration Console on a secure HTTPS port, with your own SSL certificate provided by a Certifying Authority (CA). See [Oracle WebLogic Server Keystores configuration](https://aka.ms/arm-oraclelinux-wls-ssl-configuration) for more information.
129129

130-
Select **Yes** or **No** for the option **Configure WebLogic Server Administration Console, Remote Console, and cluster to use HTTPS (Secure) ports, with your own TLS/SSL certificate.** If you select **No**, you don't have to provide any details, and can proceed by selecting **Next**. If you select **Yes**, you can choose to provide the required configuration details by either uploading existing keystores or by using keystores stored in Azure Key Vault.
130+
Select **Yes** or **No** for the option **Configure WebLogic Server Administration Console, Remote Console, and cluster to use HTTPS (Secure) ports, with your own TLS/SSL certificate.** If you select **No**, you don't have to provide any details, and can proceed by selecting **Next**. If you select **Yes**, you must upload your existing keystores.
131131

132-
If you want to upload existing keystores, select **Upload existing KeyStores** for the option **How would you like to provide required configuration**, and enter the values for the fields listed in the following table.
132+
Enter the values for the fields listed in the following table.
133133

134134
#### Upload existing KeyStores
135135

@@ -147,23 +147,6 @@ If you want to upload existing keystores, select **Upload existing KeyStores** f
147147
| Confirm password | Re-enter the value of the preceding field. |
148148
| The Trust KeyStore type (JKS,PKCS12) | Select the type of custom trust keystore. The supported values are JKS and PKCS12. |
149149

150-
If you want to use keystores that are stored in Azure Key Vault, select **Use KeyStores stored in Azure Key Vault** for the option **How would you like to provide required configuration**, and enter the values for the fields listed in the following table.
151-
152-
#### Use KeyStores stored in Azure Key Vault
153-
154-
| Field | Description |
155-
|-------|-------------|
156-
| Resource group name in current subscription containing the Key Vault | Enter the name of the Resource Group containing the Key Vault that stores the SSL certificate and the data required for WebLogic SSL termination. |
157-
| Name of the Azure Key Vault containing secrets for the TLS/SSL certificate | Enter the name of the Azure Key Vault that stores the SSL certificate and the data required for WebLogic SSL termination. |
158-
| The name of the secret in the specified Key Vault whose value is the Identity KeyStore Data | Enter the name of the Azure Key Vault secret that holds the value of the identity keystore data. Follow [Store the TLS/SSL certificate in the Key Vault](#store-the-tlsssl-certificate-in-the-key-vault) to upload the certificate to Azure Key Vault. |
159-
| The name of the secret in the specified Key Vault whose value is the passphrase for the Identity KeyStore | Enter the name of the Azure Key Vault secret that holds the value of the passphrase for the identity keystore. |
160-
| The Identity KeyStore type (JKS,PKCS12) | Select the type of custom identity keystore. The supported values are JKS and PKCS12. |
161-
| The name of the secret in the specified Key Vault whose value is the Private Key Alias | Enter the name of the Azure Key Vault secret that holds the value of the private key alias. |
162-
| The name of the secret in the specified Key Vault whose value is the passphrase for the Private Key | Enter the name of the Azure Key Vault secret that holds the value of the passphrase for the private key. |
163-
| The name of the secret in the specified Key Vault whose value is the Trust KeyStore Data | Enter the name of the Azure Key Vault secret that holds the value of the trust keystore data. Follow [Store the TLS/SSL certificate in the Key Vault](#store-the-tlsssl-certificate-in-the-key-vault) to upload the certificate to Azure Key Vault. |
164-
| The name of the secret in the specified Key Vault whose value is the passphrase for the Trust KeyStore | Enter the name of the Azure Key Vault secret that holds the value of the the passphrase for the trust keystore. |
165-
| The Trust KeyStore type (JKS,PKCS12) | Select the type of custom trust keystore. The supported values are JKS and PKCS12. |
166-
167150
When you are satisfied with your selections, select **Next** and open **Load balancing** blade.
168151

169152
### Load balancing
@@ -193,7 +176,6 @@ You must select one of the following three options, each described in turn.
193176

194177
* Generate a self-signed front-end certificate: Generate a self-signed front-end certificate and apply it during deployment.
195178
* Upload a TLS/SSL certificate: Upload the pre-signed certificate now.
196-
* Identify an Azure Key Vault: The Key Vault must already contain the certificate and its password stored as secrets.
197179

198180
**Generate a self-signed frontend certificate**
199181

@@ -210,16 +192,6 @@ You must select one of the following three options, each described in turn.
210192
| Confirm password | Re-enter the value of the preceding field. |
211193
| Trusted root certificate(.cer, .cert) | A trusted root certificate is required to allow back-end instances in the application gateway. The root certificate is a Base-64 encoded X.509(.CER) format root certificate. |
212194

213-
**Identify an Azure Key Vault**
214-
215-
| Field | Description |
216-
|-------|-------------|
217-
| Resource group name in current subscription containing the KeyVault | Enter the name of the Resource Group containing the Key Vault that stores the application gateway SSL certificate and the data required for SSL termination. |
218-
| Name of the Azure KeyVault containing secrets for the Certificate for SSL Termination | Enter the name of the Azure Key Vault that stores the application gateway SSL certificate and the data required for SSL termination. |
219-
| The name of the secret in the specified Key Vault whose value is the front-end TLS/SSL certificate data | Enter the name of the Azure Key Vault secret that holds the value of the Application Gateway front-end SSL certificate data. Follow [Store the TLS/SSL certificate in the Key Vault](#store-the-tlsssl-certificate-in-the-key-vault) to upload the certificate to Azure Key Vault. |
220-
| The name of the secret in the specified Key Vault whose value is the password for the front-end TLS/SSL certificate | Enter the name of the Azure Key Vault secret that holds the value of the password for the application gateway front-end SSL certificate. |
221-
| The name of the secret in the specified Key Vault whose value is the trusted root certificate data | A trusted root certificate is required to allow back-end instances in the application gateway. Enter the name of the Azure Key Vault secret that holds the value of the application gateway trusted root certificate data. Follow [Store the TLS/SSL certificate in the Key Vault](#store-the-tlsssl-certificate-in-the-key-vault) to upload the certificate to Azure Key Vault. |
222-
223195
Regardless of how you provide the certificates, there are several other options when configuring the Application Gateway, as described next.
224196

225197
| Field | Description |
@@ -389,27 +361,3 @@ After clicking **Create**, you will go to the **Deployment is in progress** page
389361
| `shellCmdtoOutputWlsImageProperties`|Shell command to display the base64 encoded string of the model properties.{{< line_break >}}Sample value:{{< line_break >}}`echo -e IyBDF...PTUK \| base64 -d > model.properties` |
390362
| `shellCmdtoOutputWlsVersionsandPatches` | Shell command to display the base64 encoded string of the WLS version and patches.{{< line_break >}}Sample value:{{< line_break >}}`echo -e CldlY...gMS4= \| base64 -d > version.info`|
391363

392-
### Useful resources
393-
394-
Review the following useful resources.
395-
396-
#### Store the TLS/SSL certificate in the Key Vault
397-
398-
1. Base 64 encode the certificate file; omit the `-w0` for macOS:
399-
400-
```bash
401-
base64 myIdentity.jks -w0 >mycert.txt
402-
# base64 myIdentity.p12 -w0 >mycert.txt
403-
# base64 myTrust.jks -w0 >mycert.txt
404-
# base64 myTrust.p12 -w0 >mycert.txt
405-
# base64 root.cert -w0 >mycert.txt
406-
# base64 gatewayCert.pfx -w0 >mycert.txt
407-
```
408-
409-
2. From the Azure portal, open your Key Vault.
410-
3. In the Settings section, select Secrets.
411-
4. Select Generate/Import.
412-
5. Under Upload options, leave the default value.
413-
6. Under Name, enter `myIdentityCertData`, or whatever name you like.
414-
7. Under Value, enter the content of the mycert.txt file.
415-
8. Leave the remaining values at their defaults and select Create.

0 commit comments

Comments
 (0)