blob: ed496f6e5de9f757688b228be7742741a1e2d1b5 [file] [log] [blame]
Vijay VK2648c6d2018-09-19 04:30:37 +01001.. This work is licensed under a Creative Commons Attribution 4.0 International License.
2.. http://creativecommons.org/licenses/by/4.0
deen1985de4f9782021-03-25 17:33:35 +01003.. _tls_enablement:
Vijay VK2648c6d2018-09-19 04:30:37 +01004
5TLS Support
6===========
7
Jack Lucas5e9c1262023-03-20 11:33:05 -04008Beginning with the London release, ONAP is using a service mesh (Istio) to encrypt and authenticate traffic between ONAP components. In earlier releases, each component was responsible for protecting its HTTP interfaces with TLS,
9using certificates generated by the (now obsolete) AAF component.
Vijay VK2648c6d2018-09-19 04:30:37 +010010
Jack Lucas5e9c1262023-03-20 11:33:05 -040011Some DCAE components offer HTTP interfaces to clients outside the ONAP Kubernetes cluster. In earlier releases, ONAP offered a mechanism allowing components to obtain
12TLS certificates from an external source using the CMPv2 protocol. (See `these design notes <https://wiki.onap.org/display/DW/DCAE+CertService+integration>`_ for details on how that approach worked in conjunction with AAF.)
13Beginning with the London release, external HTTP interfaces should be exposed via the Istio Gateway. The gateway can terminate TLS and can be configured with the necessary certificates.