Answer the question
In order to leave comments, you need to log in
How to organize PKI correctly?
Hey! I read about the organization of my PKI and did not quite understand one thing.
Let's say I have a Kubernetes cluster, a MongoDB ReplicaSet, a Consul cluster, and an OpenVPN server. Certificates are used everywhere for authentication. As I understand it, if we have one root CA for everything (offline) and one intermediate, then all certificates will be issued by one certification authority (that is, they trust each other among themselves).
Does this mean that, say, an OpenVPN user can take their certificate and use it to join their node to, for example, a Consul cluster? Or is it possible to take a certificate that uses Kubernetes and successfully log in to OpenVPN? If yes, then it turns out that you need to make a separate CA for each type of service? Or is there some other way to make restrictions?
Answer the question
In order to leave comments, you need to log in
I read about the organization of my PKI and did not quite understand one thing
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question