When Building a Certificate Under Sans Do I Include the Domain Again
Transport Layer Security (TLS) is an encryption protocol used in SSL certificates to protect network communications.
Google Cloud uses SSL certificates to provide privacy and security from a client to a load balancer. To achieve this, the load balancer must accept an SSL document and the document's corresponding private central. Communication betwixt the client and the load balancer remains private—illegible to whatsoever third party that doesn't have this private key.
Self-managed and Google-managed SSL certificates
You tin obtain your own cocky-managed certificates or you lot can utilize Google-managed certificates, which Google obtains and manages for you.
-
Self-managed SSL certificates are certificates that you obtain, provision, and renew yourself. This type can exist any of:
- Domain Validation (DV)
- Organization Validation (OV)
- Extended Validation (EV) certificates
For more data, see Public key certificate.
-
Google-managed SSL certificates are certificates that Google Cloud obtains and manages for your domains, renewing them automatically. Google-managed certificates are Domain Validation (DV) certificates. They don't demonstrate the identity of an organization or individual associated with the certificate, and they don't back up wildcard common names.
The following table summarizes the types of Google Deject load balancers that require SSL certificates and supported certificate types.
Load balancer type | Protocol from the client to the load balancer | Supported certificate blazon |
---|---|---|
| HTTPS or HTTP/ii | Google-managed, self-managed, or a combination of both |
| HTTPS or HTTP/two | Cocky-managed |
SSL proxy load balancer | SSL (TLS) | Google-managed, self-managed, or a combination of both |
For information about configuring SSL certificates for your load balancers, see the following guides:
- Self-managed certificates
- Google-managed certificates
Certificate Manager
If you are using the External HTTP(Due south) load balancer (Classic) or the Global external HTTP(S) load balancer (Preview) on the Premium Network Service Tier, you tin apply the Preview release of Certificate Managing director to provision and manage your SSL certificates. Certificate Manager doesn't take the limitations listed in the Limitations section on this folio. Document Manager does not back up any other types of load balancers.
For more data, encounter the Certificate Manager overview.
Multiple SSL certificates
You can configure up to the maximum number of SSL certificates per target HTTPS or target SSL proxy. Utilise multiple SSL certificates when you are serving from multiple domains using the aforementioned load balancer IP address and port, and you want to use a unlike SSL certificate for each domain.
When you specify more i SSL certificate, the start certificate in the list of SSL certificates is considered the chief SSL certificate associated with the target proxy.
When a client sends a request, the load balancer uses the SNI hostname specified by the client to select the certificate to use in negotiating the SSL connection.
Whenever possible, the load balancer selects a certificate whose common proper name (CN) or subject alternative name (SAN) matches the SNI hostname that is specified by the client. RSA and ECDSA are types of digital signatures, and the customer software must be able to use them.
When the SNI hostname matches CNs or SANs in more than 1 certificate, the certificate option is based on client-specific and internal factors that cannot be predicted. Ane of the certificates matching the SNI is returned. The load balancer can besides serve the expired certificate if the expired certificate is still associated with the target proxy.
If none of the available certificates can be selected, or if the client doesn't specify an SNI hostname, the load balancer negotiates SSL using the main certificate (the first certificate in the list).
Encryption from the load balancer to the backends
For information about this topic, come across Encryption to the backends.
Load balancers, SSL certificates, and target proxies
A Google Deject SSL certificate resources contains both a private cardinal and the SSL certificate itself.
Target proxies represent the logical connection between a load balancer'south frontend and its backend service (for SSL proxy load balancers) or URL map (for HTTPS load balancers).
The following diagram shows how the target proxy and its associated SSL certificates fit into the load balancing compages.
SSL document scope
Google Cloud has 2 scopes for SSL document resources, regional and global.
Load balancer type | Scope of SSL document resource | gcloud reference | API reference |
---|---|---|---|
| Global | gcloud compute ssl-certificates --global | sslCertificates |
| Regional | gcloud compute ssl-certificates --region | regionSslCertificates |
SSL proxy load balancer | Global | gcloud compute ssl-certificates --global | sslCertificates |
For the global external HTTP(S) load balancer (archetype) and SSL proxy load balancer, global SSL document resources are required in both Standard and Premium Tier. This ways that in Standard Tier, a regional forwarding rule points to a global target proxy.
Target proxies
SSL certificates are associated with the following types of target proxies:
Load balancer type | Type of target proxy | gcloud reference | API reference |
---|---|---|---|
| Global | gcloud compute target-https-proxies --global | targetHttpsProxies |
| Regional | gcloud compute target-https-proxies --region | regionTargetHttpsProxies |
SSL proxy load balancer | Global | gcloud compute target-ssl-proxies --global | targetSslProxies |
Pricing
Y'all may incur networking charges when you lot use Google Cloud load balancers. For more data, come across All networking pricing. There are no additional charges for using self-managed and Google-managed SSL certificates.
Limitations
-
A limited number of SSL certificates is supported for each target proxy. For more than information, come across the limit for SSL certificates per target HTTPS or target SSL proxy.
-
A limited number of domains is supported for each Google-managed certificate. For more information, see the limit for domains per Google-managed SSL certificate.
-
When you utilise Google-managed certificates with SSL Proxy Load Balancing, the load balancer'due south forwarding rule must use TCP port 443 for the Google-managed document to be renewed automatically.
-
Google Cloud load balancers don't support client certificate-based authentication (mutual TLS, mTLS).
-
Google-managed SSL certificates don't support using wildcards.
What's adjacent
- To use SSL certificates with Kubernetes Engine, see HTTP(S) Load Balancing with Ingress.
- To acquire almost the supported central lengths for private keys, see the load balancing quotas page.
- To learn how Google encrypts user traffic, see the Encryption in Transit in Google Cloud white paper.
- To learn how to troubleshoot problems with Google-managed and self-managed certificates, encounter Troubleshooting SSL certificates.
- To learn how to use Certificate Manager to provision and manage SSL certificates, encounter the Document Manager overview.
If you're new to Google Cloud, create an account to evaluate how our products perform in existent-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
Get started for free
Source: https://cloud.google.com/load-balancing/docs/ssl-certificates
Komentar
Posting Komentar