What is the Difference Between Self-Managed vs Public SSL/TLS Certificates? ๐
DevOps Engineers often work with TLS certificates, and understanding the difference between self-managed and paid certificates is very important.
So lets understand the basics.
๐ช๐ต๐ฎ๐ ๐ถ๐ ๐ฎ ๐๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฐ๐ฎ๐๐ฒ ๐๐๐๐ต๐ผ๐ฟ๐ถ๐๐?
Certificate Authority (CA) is usually a company or organization that issues digital certificates.
Here's how to request a TLS certificate from a well-known Certificate Authority (CA) like Verisign, LetsEncrypt or Comodo:
- Create a Certificate Signing Request (CSR) with a private key. The CSR includes details about your location, organization, and FQDN (Fully Qualified Domain Name).
- Send the CSR to the trusted CA.
- The CA validates the request and sends back a TLS certificate signed using the CAโs private key.
- Validate and use this TLS certificate with your applications.
Most browsers and operating systems ๐๐๐ผ๐ฟ๐ฒ ๐ฟ๐ผ๐ผ๐ ๐๐ ๐ฐ๐ฒ๐ฟ๐๐ถ๐ณ๐ถ๐ฐ๐ฎ๐๐ฒ๐ from all the trusted CAs. ย You can view them from the browser settings.
That is why browsers donโt show security messages when visiting websites using TLS from a trusted and well-known commercial CA.
Each browser has its own set of criteria and processes for accepting and trusting CAs.
๐ฆ๐ผ, ๐๐ต๐ผ ๐ฑ๐ฒ๐ฐ๐ถ๐ฑ๐ฒ๐ ๐ถ๐ณ ๐ฎ ๐๐ ๐ฐ๐ฎ๐ป ๐ฏ๐ฒ ๐๐ฟ๐๐๐๐ฒ๐ฑ?
Well, they are vetted by independent audit organizations like webtrust.ย
The results of these audits are important for a CA to be trusted by web browsers and operating systems.
Now letโs look at self-managed certificates.
For internal applications, organizations often run their own private CA (PKI infrastructure).
The workflow looks like this:
- Create your own Root CA certificate and CA private key
- Generate a server private key and CSR
- Use the CA private key to sign the CSR and generate the TLS certificate
- Install the Root CA certificate in browsers or operating systems to avoid HTTPS warnings
Without installing the Root CA certificate, browsers will show security warnings because the CA is not publicly trusted.
For public endpoints, organizations always use certificates from well-known CAs (LetsEncrypt or paid ones)
We share deep dives on Kubernetes, DevOps,MLOps, Cloud and GitOps
What's Your Reaction?
Like
0
Dislike
0
Love
0
Funny
0
Wow
0
Sad
0
Angry
0
Comments (0)