Skip to content

Commit

Permalink
Add CA certs plug-in guide (#1083)
Browse files Browse the repository at this point in the history
* Add CA certs plug-in guide

* Update 03-90-istio-cert-unknown.md

* Delete docs/user/operation-guides/02-40-plug-in-root-ca.md

* Update 03-90-istio-cert-unknown.md

* Apply suggestions from code review

Co-authored-by: Natalia Sitko <[email protected]>

* Apply suggestions from code review

Co-authored-by: Natalia Sitko <[email protected]>

---------

Co-authored-by: Natalia Sitko <[email protected]>
  • Loading branch information
barchw and nataliasitko authored Oct 24, 2024
1 parent b1910ad commit 0489042
Showing 1 changed file with 21 additions and 0 deletions.
21 changes: 21 additions & 0 deletions docs/user/troubleshooting/03-90-istio-cert-unknown.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
# Istio Cannot Verify an HTTPS Certificate Generated by a Trusted Signing CA

## Symptom

See the possible symptoms:
Istiod logs include multiple warnings or errors containing the message `x509: certificate signed by unknown authority`.
- The JWT authorization flow does not function correctly, and requests with valid tokens result in a `401` status error, `Jwt verification fails.`
- Istio sidecars Envoy configuration for JWT is not up-to-date.
- Checking the server certificate chain reveals different root Certificate Authorities (CAs) than working servers.

## Cause

By default, Istio requires that if an outbound connection to an HTTPS server is initiated, the server certificate must be signed by a trusted CA. This means that the client must recognize at least the root CA presented by the server.
If the server uses an unrecognized root CA to generate its domain certificate, the HTTPS handshake fails, and the connection is not established. This issue might happen, for example, when the server uses an internal solution-specific root CA or it has been migrated to a new root CA that is not widely recognized.
As a result, the JWKS fetch from the JWKS URI may fail.

## Remedy

To ensure that the certificate is trusted by Istio, verify that you are using the most up-to-date version of the Istio module. If you are using SAP BTP, Kyma runtime, the solution guarantees that you have the most up-to-date version.

In case your Istio module version is up-to-date, but the verification is still failing, make sure that the CA root cert is trusted by istiod.

0 comments on commit 0489042

Please sign in to comment.