Back to Redis

Index

content/operate/rs/7.4/security/certificates/_index.md

latest1.7 KB
Original Source

Redis Enterprise Software uses self-signed certificates by default to ensure that the product is secure. If using a self-signed certificate is not the right solution for you, you can import a certificate signed by a certificate authority of your choice.

Here's the list of self-signed certificates that create secure, encrypted connections to your Redis Enterprise cluster:

Certificate nameDescription
apiEncrypts [REST API]({{< relref "/operate/rs/7.4/references/rest-api/" >}}) requests and responses.
cmSecures connections to the Redis Enterprise Cluster Manager UI.
ldap_clientSecures connections between LDAP clients and LDAP servers.
metrics_exporterSends Redis Enterprise metrics to external [monitoring tools]({{< relref "/operate/rs/7.4/clusters/monitoring/" >}}) over a secure connection.
proxyCreates secure, encrypted connections between clients and databases.
syncerFor [Active-Active]({{< relref "/operate/rs/7.4/databases/active-active/" >}}) or [Replica Of]({{< relref "/operate/rs/7.4/databases/import-export/replica-of/" >}}) databases, encrypts data during the synchronization of participating clusters.

These self-signed certificates are generated on the first node of each Redis Enterprise Software installation and are copied to all other nodes added to the cluster.

When you use the default self-signed certificates and you connect to the Cluster Manager UI over a web browser, you'll see an untrusted connection notification.

Depending on your browser, you can allow the connection for each session or add an exception to trust the certificate for all future sessions.