Configure the Identity Service with SSL You can configure the Identity Service to support 2-way SSL. You must obtain the x509 certificates externally and configure them. The Identity Service provides a set of sample certificates in the examples/pki/certs and examples/pki/private directories: Certificate types cacert.pem Certificate Authority chain to validate against. ssl_cert.pem Public certificate for Identity Service server. middleware.pem Public and private certificate for Identity Service middleware/client. cakey.pem Private key for the CA. ssl_key.pem Private key for the Identity Service server. You can choose names for these certificates. You can also combine the public/private keys in the same file, if you wish. These certificates are provided as an example.
SSL configuration To enable SSL with client authentication, modify the [ssl] section in the etc/keystone.conf file. The following SSL configuration example uses the included sample certificates: [ssl] enable = True certfile = <path to keystone.pem> keyfile = <path to keystonekey.pem> ca_certs = <path to ca.pem> cert_required = True Options enable. True enables SSL. Default is False. certfile. Path to the Identity Service public certificate file. keyfile. Path to the Identity Service private certificate file. If you include the private key in the certfile, you can omit the keyfile. ca_certs. Path to the CA trust chain. cert_required. Requires client certificate. Default is False.