Back to Redis

Certificate Based Authentication

content/operate/rs/security/certificates/certificate-based-authentication.md

latest6.2 KB
Original Source

You can set up certificate-based authentication for specific users to enable secure, passwordless access to the Redis Software [REST API]({{<relref "/operate/rs/references/rest-api">}}) and databases.

Certificate-based authentication for the REST API

Set up certificate-based authentication for the REST API

To set up certificate-based authentication:

  1. Add a trusted CA certificate mtls_trusted_ca to the cluster using an [update cluster certificates]({{<relref "/operate/rs/references/rest-api/requests/cluster/certificates">}}) request:

    {{< multitabs id="add-mtls_trusted_ca-cert" tab1="Redis Software v7.22.2 and later" tab2="Redis Software v7.22.0 and earlier" >}}

For Redis Software versions 7.22.2 and later, use:

sh
PUT /v1/cluster/certificates
{
  "certificates": [
    {
      "name": "mtls_trusted_ca",
      "certificate": "<content of certificate PEM file>"
    }
  ]
}

-tab-sep-

For Redis Software versions 7.22.0 and earlier, use:

sh
PUT /v1/cluster/update_cert
{
  "name": "mtls_trusted_ca",
  "certificate": "<content of certificate PEM file>"
}
{{< /multitabs >}}
  1. [Update cluster settings]({{<relref "/operate/rs/references/rest-api/requests/cluster#put-cluster">}}) with mutual TLS (mTLS) configuration using one of the following options:

    {{< multitabs id="enable-mTLS" tab1="Without subject validation" tab2="With SAN validation" tab3="With Full Subject Name validation" >}}

Additional certificate validation is optional. To enable mutual TLS without subject validation, use:

sh
PUT /v1/cluster
{
  "mtls_certificate_authentication": true,
  "mtls_client_cert_subject_validation_type": "disabled"
}

-tab-sep-

For certificate validation by Subject Alternative Name (SAN), use:

sh
PUT /v1/cluster
{
  "mtls_certificate_authentication": true,
  "mtls_client_cert_subject_validation_type": "san_cn",
  "mtls_authorized_subjects": [{
    "CN": "<Subject Common Name or SAN DNS entry>"
  }]
}

Replace the placeholder value <> with your client certificate's Subject Common Name or SAN DNS entry.

Example certificate and mTLS settings

If a client certificate has:

  • Subject: CN=client.example.com

  • SAN: DNS:app1.example.com, DNS:client.example.com, DNS:app1-prod.example.com

You can use any of these values for the CN in mtls_authorized_subjects:

sh
PUT /v1/cluster
{
  "mtls_certificate_authentication": true,
  "mtls_client_cert_subject_validation_type": "san_cn",
  "mtls_authorized_subjects": [
    {"CN": "client.example.com"},   // Subject CN
    {"CN": "app1.example.com"},     // SAN DNS entry
    {"CN": "app1-prod.example.com"} // Another SAN DNS entry
  ]
}

-tab-sep-

For certificate validation by full Subject Name, use:

sh
PUT /v1/cluster
{
  "mtls_certificate_authentication": true,
  "mtls_client_cert_subject_validation_type": "full_subject",
  "mtls_authorized_subjects": [{
    "CN": "<Common Name>",
    "OU": [<array of Organizational Unit strings>],
    "O": "<Organization>",
    "C": "<2-letter country code>",
    "L": "<Locality (city)>",
    "ST": "<State/Province>"
  }]
}

Replace the placeholder values <> with your client certificate's subject values.

Example certificate and mTLS settings

If a client certificate has:

  • Subject: CN=client.example.com

  • SAN: DNS:app1.example.com, DNS:client.example.com, DNS:app1-prod.example.com

You can use any of these values for the CN in mtls_authorized_subjects:

sh
PUT /v1/cluster
{
  "mtls_certificate_authentication": true,
  "mtls_client_cert_subject_validation_type": "san_cn",
  "mtls_authorized_subjects": [
    {"CN": "client.example.com"},   // Subject CN
    {"CN": "app1.example.com"},     // SAN DNS entry
    {"CN": "app1-prod.example.com"} // Another SAN DNS entry
  ]
}
{{< /multitabs >}}
  1. When you [create new users]({{<relref "/operate/rs/references/rest-api/requests/users#post-user">}}), include "auth_method": "certificate" and certificate_subject_line in the request body:

    sh
    POST /v1/users
    {
      "auth_method": "certificate",
      "certificate_subject_line": "CN=<Common Name>, OU=<Organization Unit>, O=<Organization>, L=<Locality>, ST=<State/Province>, C=<Country>"
    }
    

    Replace the placeholder values <> with your client certificate's subject values.

Authenticate REST API requests

To use the REST API with certificate-based authentication, you must provide a client certificate, signed by the trusted CA mtls_trusted_ca, and a private key.

The following example uses cURL to send a [REST API request]({{<relref "/operate/rs/references/rest-api/requests">}}):

sh
curl --request <METHOD> --url https://<hostname-or-IP-address>:9443/<API-version>/<API-path> --cert client.pem --key client.key

Certificate-based authentication for databases

Set up certificate-based authentication for databases

To set up certificate-based authentication for databases:

  1. Enable mutual TLS for the relevant databases. See [Enable TLS]({{<relref "/operate/rs/security/encryption/tls/enable-tls">}}) for detailed instructions.

  2. When you [create new users]({{<relref "/operate/rs/references/rest-api/requests/users#post-user">}}), include "auth_method": "certificate" and certificate_subject_line in the request body :

    sh
    POST /v1/users
    {
      "auth_method": "certificate",
      "certificate_subject_line": "CN=<Common Name>, OU=<Organization Unit>, O=<Organization>, L=<Locality>, ST=<State/Province>, C=<Country>"
    }
    

    Replace the placeholder values <> with your client certificate's subject values.

Authenticate database connections

To connect to a database with certificate-based authentication, you must provide a client certificate, signed by the trusted CA mtls_trusted_ca, and a private key.

The following example shows how to connect to a Redis database with [redis-cli]({{<relref "/operate/rs/references/cli-utilities/redis-cli">}}):

sh
redis-cli -h <hostname-or-IP-address> -p <port> --tls --cacert <redis_cert>.pem --cert redis_user.crt --key redis_user_private.key

Limitations

  • Certificate-based authentication is not implemented for the Cluster Manager UI.