content/operate/rs/7.22/security/certificates/_index.md
Redis Enterprise Software uses self-signed certificates by default to ensure that the product is secure. These certificates are autogenerated on the first node of each Redis Enterprise Software installation and are copied to all other nodes added to the cluster.
You can replace a self-signed certificate with one signed by a certificate authority of your choice.
Here's the list of supported certificates that create secure, encrypted connections to your Redis Enterprise Software cluster:
| Certificate name | Autogenerated | Description |
|---|---|---|
api | <span title="Yes">✅</span> | Encrypts [REST API]({{< relref "/operate/rs/7.22/references/rest-api/" >}}) requests and responses. |
ccs_internode_encryption | <span title="Yes">✅</span> | Control plane [internode encryption]({{< relref "/operate/rs/7.22/security/encryption/internode-encryption" >}}). Encrypts internal traffic for cluster management. |
cm | <span title="Yes">✅</span> | Secures connections to the Redis Enterprise Cluster Manager UI. |
data_internode_encryption | <span title="Yes">✅</span> | Data plane [internode encryption]({{< relref "/operate/rs/7.22/security/encryption/internode-encryption" >}}). Encrypts internal data traffic between shards and the data management controller (DMC). |
ldap_client | <span title="No">:x:</span> | Secures connections between LDAP clients and LDAP servers. |
metrics_exporter | <span title="Yes">✅</span> | Sends Redis Enterprise metrics to external [monitoring tools]({{< relref "/operate/rs/7.22/monitoring/" >}}) over a secure connection. |
mtls_trusted_ca | <span title="No">:x:</span> | Required to enable certificate-based authentication for secure, passwordless access to the REST API. |
proxy | <span title="Yes">✅</span> | Creates secure, encrypted connections between clients and databases. |
syncer | <span title="Yes">✅</span> | For [Active-Active]({{< relref "/operate/rs/7.22/databases/active-active/" >}}) or [Replica Of]({{< relref "/operate/rs/7.22/databases/import-export/replica-of/" >}}) databases, encrypts data during the synchronization of participating clusters. |
Certificates that are not autogenerated are optional unless you want to use certain features. For example, you must provide your own ldap_client certificate to enable [LDAP authentication]({{<relref "/operate/rs/7.22/security/access-control/ldap">}}) or an mtls_trusted_ca certificate to enable certificate-based authentication.
When you use the default self-signed certificates and you connect to the Cluster Manager UI over a web browser, you'll see an untrusted connection notification. Depending on your browser, you can allow the connection for each session or add an exception to trust the certificate for all future sessions.