mirror of https://github.com/docker/docs.git
72 lines
2.6 KiB
Markdown
72 lines
2.6 KiB
Markdown
---
|
|
title: Use your own TLS certificates
|
|
description: Learn how to configure Docker Universal Control Plane to use your own certificates.
|
|
keywords: Universal Control Plane, UCP, certificate, authentication, tls
|
|
ui_tabs:
|
|
- version: ucp-3.0
|
|
orhigher: false
|
|
- version: ucp-2.2
|
|
orlower: true
|
|
next_steps:
|
|
- path: ../../user-access/cli/
|
|
title: Access UCP from the CLI
|
|
---
|
|
{% if include.version=="ucp-3.0" %}
|
|
|
|
All UCP services are exposed using HTTPS, to ensure all communications between
|
|
clients and UCP are encrypted. By default, this is done using self-signed TLS
|
|
certificates that are not trusted by client tools like web browsers. So when
|
|
you try to access UCP, your browser warns that it doesn't trust UCP or that
|
|
UCP has an invalid certificate.
|
|
|
|

|
|
|
|
The same happens with other client tools.
|
|
|
|
```none
|
|
$ curl https://ucp.example.org
|
|
|
|
SSL certificate problem: Invalid certificate chain
|
|
```
|
|
|
|
You can configure UCP to use your own TLS certificates, so that it is
|
|
automatically trusted by your browser and client tools.
|
|
|
|
To ensure minimal impact to your business, you should plan for this change to
|
|
happen outside business peak hours. Your applications will continue running
|
|
normally, but existing UCP client certificates will become invalid, so users
|
|
will have to download new ones to [access UCP from the CLI](../../user-access/cli.md).
|
|
|
|
## Configure UCP to use your own TLS certificates and keys
|
|
|
|
In the UCP web UI, log in with administrator credentials and
|
|
navigate to the **Admin Settings** page.
|
|
|
|
In the left pane, click **Certificates**.
|
|
|
|

|
|
|
|
Upload your certificates and keys:
|
|
|
|
* A `ca.pem` file with the root CA public certificate.
|
|
* A `cert.pem` file with the TLS certificate for your domain and any intermediate public
|
|
certificates, in this order.
|
|
* A `key.pem` file with TLS private key. Make sure it is not encrypted with a password.
|
|
Encrypted keys should have `ENCRYPTED` in the first line.
|
|
|
|
Finally, click **Save** for the changes to take effect.
|
|
|
|
After replacing the TLS certificates, your users won't be able to authenticate
|
|
with their old client certificate bundles. Ask your users to go to the UCP
|
|
web UI and [get new client certificate bundles](../../user-access/cli.md).
|
|
|
|
If you deployed Docker Trusted Registry, you'll also need to reconfigure it
|
|
to trust the new UCP TLS certificates.
|
|
[Learn how to configure DTR](/reference/dtr/2.5/cli/reconfigure.md).
|
|
|
|
{% elsif include.version=="ucp-2.2" %}
|
|
|
|
Learn about [using your own TLS certificates](/datacenter/ucp/2.2/guides/admin/configure/use-your-own-tls-certificates.md).
|
|
|
|
{% endif %}
|