Back to Redis

Index

content/operate/rs/7.8/security/certificates/_index.md

latest2.4 KB
Original Source

Redis Enterprise Software uses self-signed certificates by default to ensure that the product is secure. These certificates are autogenerated on the first node of each Redis Enterprise Software installation and are copied to all other nodes added to the cluster.

You can replace a self-signed certificate with one signed by a certificate authority of your choice.

Supported certificates

Here's the list of supported certificates that create secure, encrypted connections to your Redis Enterprise Software cluster:

Certificate nameAutogeneratedDescription
api<span title="Yes"></span>Encrypts [REST API]({{< relref "/operate/rs/7.8/references/rest-api/" >}}) requests and responses.
cm<span title="Yes"></span>Secures connections to the Redis Enterprise Cluster Manager UI.
ldap_client<span title="No">:x:</span>Secures connections between LDAP clients and LDAP servers.
metrics_exporter<span title="Yes"></span>Sends Redis Enterprise metrics to external [monitoring tools]({{< relref "/operate/rs/7.8/monitoring/" >}}) over a secure connection.
mtls_trusted_ca<span title="No">:x:</span>Required to enable certificate-based authentication for secure, passwordless access to the REST API.
proxy<span title="Yes"></span>Creates secure, encrypted connections between clients and databases.
syncer<span title="Yes"></span>For [Active-Active]({{< relref "/operate/rs/7.8/databases/active-active/" >}}) or [Replica Of]({{< relref "/operate/rs/7.8/databases/import-export/replica-of/" >}}) databases, encrypts data during the synchronization of participating clusters.

Certificates that are not autogenerated are optional unless you want to use certain features. For example, you must provide your own ldap_client certificate to enable [LDAP authentication]({{<relref "/operate/rs/7.8/security/access-control/ldap">}}) or an mtls_trusted_ca certificate to enable certificate-based authentication.

Accept self-signed certificates to access the Cluster Manager UI

When you use the default self-signed certificates and you connect to the Cluster Manager UI over a web browser, you'll see an untrusted connection notification. Depending on your browser, you can allow the connection for each session or add an exception to trust the certificate for all future sessions.