Skip to content

Firefly and TLS Protect Datacenter

We have two control planes you can connect Firefly to. Choose between the convenience of the SaaS-based Venafi Control Plane with TLS Protect Cloud, or the control of a self-hosted deployment with TLS Protect Datacenter. In this section you will learn how to use Firefly with TLS Protect Datacenter. For information on how to use Firefly with Venafi Control Plane, see Firefly and Venafi Control Plane

Overview

In this section, Firefly will be deployed on Kubernetes and configured to bootstrap its security settings directly from the TLS Protect Datacenter, eliminating the need to connect to any other Venafi infrastructure.

The Firefly security configuration enables security teams to define policies that align with corporate security requirements. These policies govern the subordinate certificate used to sign certificates requested by clients, the policies applied to the requested leaf certificates, as well as the authentication and authorization configuration for the client.

Once Firefly is deployed and configured, it can serve certificate requests for various use cases, including modern scenarios like mTLS authentication for workloads, as well as traditional use cases such as TLS server termination.

In this way, the issued certificates are:

  • signed and trusted by your organization’s root CAs.

  • compliant with your organization’s PKI policy.

Firefly will handle the load of signing certificate requests, even during high rates of certificate renewals, instead of the TLS Protect Datacenter. TLS Protect Datacenter will only be required when Firefly is restarted or when renewing the subordinate CA certificate.

In this scenario, authentication between Firefly and the TLS Protect Datacenter will use OIDC, where the Kubernetes cluster hosting Firefly issues short-lived JWT credentials, which are then validated by TLS Protect Datacenter.

Prerequisites

  • An instance of Venafi TLS Protect Datacenter, configured with a certificate authority (such as ADCS), and a template that permits the issuance of subordinate CA certificates.

  • Access to the Venafi Configuration Console to configure authentication settings.

  • A Kubernetes cluster where Firefly will be deployed. The cluster must have its OIDC Discovery endpoint exposed for use by unauthenticated clients.

  • Check the network requirements.

Administrative functions

Configuring Firefly to work with TLS Protect Datacenter requires work from more than one administrator:

  • A TLS Protect Datacenter platform administrator is needed to configure the user, API integrations, and JWT mapping.

  • A PKI administrator is required to create policy folders in TLS Protect Datacenter, as well as to generate, modify, and import the security configuration that Firefly will use.

  • A Kubernetes Platform administrator is needed to bootstrap Firefly, and must have information about how Firefly will authenticate to TLS Protect Datacenter, security configuration, and bindings.

Let's begin

Here are the steps we'll take in getting started with Firefly on TLS Protect Datacenter:

  1. Authenticating to TLS Protect Datacenter In this step you'll learn how to configure an API integration in TLS Protect Datacenter, and configure authentication settings for Firefly.

  2. Create a CA template in TLS Protect Datacenter In this step you will create a new CA template. This will be used to sign the subordinate CA certificate for each Firefly.

  3. Create a policy folder in TLS Protect Datacenter In this step you will create a TLS Protect Datacenter policy folder in which to store the security configuration and define policies for the issuance of the subordinate CA certificates.

  4. Push a Firefly security configuration to TLS Protect Datacenter In this step you will create a Firefly security configuration and store it in TLS Protect Datacenter.

  5. Deploy a Firefly in Kubernetes In this final step, as a Kubernetes platform administrator, you will need to use the information from your TLS Protect Datacenter administrators regarding how Firefly should authenticate with TLS Protect Datacenter, and which security configuration it will use.

Known issue

  • As best practice dictates following the principle of least privilege in security, it is recommended that the users used by your Firefly instances to authenticate have minimal permissions in TLS Protect Datacenter. However, a side effect of this is that when Firefly starts, you may see the warning message below, indicating insufficient rights to retrieve the security configuration. Although this message appears, Firefly is still able to retrieve the security configuration, so you can safely ignore the warning:

    Warning   Secret Store - Insufficient Rights (Retrieve)    firefly had insufficient rights to retrieve the secret for entry 243046   Secret Store - Insufficient Rights (Retrieve)    firefly had insufficient rights to retrieve the secret for entry 243046
    

What's next?