Skip to main content
Redhat Developers  Logo
  • Products

    Platforms

    • Red Hat Enterprise Linux
      Red Hat Enterprise Linux Icon
    • Red Hat AI
      Red Hat AI
    • Red Hat OpenShift
      Openshift icon
    • Red Hat Ansible Automation Platform
      Ansible icon
    • View All Red Hat Products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat Developer Hub
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat OpenShift Local
    • Red Hat Developer Sandbox

      Try Red Hat products and technologies without setup or configuration fees for 30 days with this shared Openshift and Kubernetes cluster.
    • Try at no cost
  • Technologies

    Featured

    • AI/ML
      AI/ML Icon
    • Linux
      Linux Icon
    • Kubernetes
      Cloud icon
    • Automation
      Automation Icon showing arrows moving in a circle around a gear
    • View All Technologies
    • Programming Languages & Frameworks

      • Java
      • Python
      • JavaScript
    • System Design & Architecture

      • Red Hat architecture and design patterns
      • Microservices
      • Event-Driven Architecture
      • Databases
    • Developer Productivity

      • Developer productivity
      • Developer Tools
      • GitOps
    • Automated Data Processing

      • AI/ML
      • Data Science
      • Apache Kafka on Kubernetes
    • Platform Engineering

      • DevOps
      • DevSecOps
      • Ansible automation for applications and services
    • Secure Development & Architectures

      • Security
      • Secure coding
  • Learn

    Featured

    • Kubernetes & Cloud Native
      Openshift icon
    • Linux
      Rhel icon
    • Automation
      Ansible cloud icon
    • AI/ML
      AI/ML Icon
    • View All Learning Resources

    E-Books

    • GitOps Cookbook
    • Podman in Action
    • Kubernetes Operators
    • The Path to GitOps
    • View All E-books

    Cheat Sheets

    • Linux Commands
    • Bash Commands
    • Git
    • systemd Commands
    • View All Cheat Sheets

    Documentation

    • Product Documentation
    • API Catalog
    • Legacy Documentation
  • Developer Sandbox

    Developer Sandbox

    • Access Red Hat’s products and technologies without setup or configuration, and start developing quicker than ever before with our new, no-cost sandbox environments.
    • Explore Developer Sandbox

    Featured Developer Sandbox activities

    • Get started with your Developer Sandbox
    • OpenShift virtualization and application modernization using the Developer Sandbox
    • Explore all Developer Sandbox activities

    Ready to start developing apps?

    • Try at no cost
  • Blog
  • Events
  • Videos

Using a public certificate with Red Hat Single Sign-On/Keycloak

February 6, 2019
Nicolas Massé
Related topics:
Security
Related products:
Red Hat Single sign-on

Share:

    When deploying Red Hat Single Sign-On/Keycloak for a test or a proof of concept, most users will choose to use a self-signed certificate as explained in the official documentation.

    The setup instructions are straightforward, but this self-signed certificate will trigger certificate error messages in your web browser and can also prevent some clients such as Postman from working properly.

    This article explains how to use a public certificate from Let's Encrypt with Red Hat Single Sign-On.

    Are you using a public certificate?

    A simple and effective way to know if you are using a public certificate is to use curl.

    $ curl https://sso.example.test/auth/realms/master
    curl: (60) SSL certificate problem: self signed certificate in certificate chain
    More details here: https://curl.haxx.se/docs/sslcerts.html
    
    curl performs SSL certificate verification by default, using a "bundle"
     of Certificate Authority (CA) public keys (CA certs). If the default
     bundle file isn't adequate, you can specify an alternate file
     using the --cacert option.
    If this HTTPS server uses a certificate signed by a CA represented in
     the bundle, the certificate verification probably failed due to a
     problem with the certificate (it might be expired, or the name might
     not match the domain name in the URL).
    If you'd like to turn off curl's verification of the certificate, use
     the -k (or --insecure) option.
    HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.

    If you get this output from curl, you are using a self-signed certificate that will cause you headaches later.

    Continue reading to learn how to fix this!

    Instructions

    During the rest of this article, we will focus on a Red Hat Single Sign-On 7.2 installation on OpenShift.

    I assume Red Hat Single Sign-On has been installed, as explained in the official documentation using one of the "sso72-x509-*" templates.

    First, move to the project in which you installed Red Hat Single Sign-On:

    $ oc project sso

    We will retrieve a public certificate using Let's Encrypt as a certificate authority, and Lego is a client that can speak with Let's Encrypt. It has several advantages such as ease of use and it's packaged as a container image.

    Install Lego in the current project:

    $ oc new-app --name lego xenolf/lego:latest
    $ oc patch dc lego --type=json -p '[{"op": "add", "path": "/spec/template/spec/containers/0/command", "value": ["/bin/sh", "-c", "while :; do sleep 1; done" ]}]'
    $ oc expose dc/lego --port=8080
    

    To get a public certificate for your Red Hat Single Sign-On instance, we need to find the hostname of that instance. The hostname is a property of the OpenShift route that has been created as part of the Red Hat Single Sign-On installation.

    Query the hostname of your Red Hat Single Sign-On route and save it for later use:

    $ hostname=$(oc get route sso -o jsonpath='{.spec.host}')
    

    This route to your Red Hat Single Sign-On instance needs to be replaced by a temporary route to Lego so that Let's Encrypt can perform the HTTP challenge. The easiest way to do this is to delete your existing route and create a new one with the same hostname:

    $ oc delete route sso
    $ oc expose service lego --hostname="$hostname" --name=sso
    

    You can now trigger the certificate request from the running Lego pod:

    $ pod=$(oc get pods -o name -l app=lego |head -n1)
    $ oc rsh $pod lego --path /tmp/.lego --http --http.port :8080 -d "$hostname" -m your@email.address --accept-tos run

    The first command gets the name of the pod running Lego and sets a shell variable accordingly. The second command runs the lego command from the Lego container. This command has several switches:

    • --path /tmp/.lego will store the generated certificates in /tmp.
    • --http.port :8080 asks Lego to listen on port 8080 to receive the ACME HTTP challenge.
    • --http enables the HTTP challenge.
    • -d "$hostname" sets the hostname of our Red Hat Single Sign-On instance in the certificate request.
    • -m your@email.address sets the email address to receive renewal notifications (do not forget to set yours!).
    • --accept-tos means you read and accepted the Let's Encrypt Terms of Service.
    • run triggers the certificate request.

    If you did everything correctly, you should see something like this:

    2019/01/22 12:03:55 [INFO] [hostname] acme: Obtaining bundled SAN certificate
    2019/01/22 12:03:56 [INFO] [hostname] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz/[redacted]
    2019/01/22 12:03:56 [INFO] [hostname] acme: Could not find solver for: tls-alpn-01
    2019/01/22 12:03:56 [INFO] [hostname] acme: Trying to solve HTTP-01
    2019/01/22 12:03:56 [INFO] [hostname] Served key authentication
    2019/01/22 12:04:01 [INFO] [hostname] The server validated our request
    2019/01/22 12:04:01 accept tcp [::]:8080: use of closed network connection
    2019/01/22 12:04:01 [INFO] [hostname] acme: Validations succeeded; requesting certificates
    2019/01/22 12:04:03 [INFO] [hostname] Server responded with a certificate.
    

    Congratulations; you just issued your first public certificate!

    Retrieve the freshly issued certificate from the Lego container and store it somewhere safe:

    $ oc rsync $pod:/tmp/.lego ~/
    

    You should now have the certificate stored in your home folder on your workstation.

    $ find ~/.lego/certificates
    /Users/redhat/.lego/certificates
    /Users/redhat/.lego/certificates/<hostname>.key
    /Users/redhat/.lego/certificates/<hostname>.issuer.crt
    /Users/redhat/.lego/certificates/<hostname>.json
    /Users/redhat/.lego/certificates/<hostname>.crt

    You can now delete the temporary route and replace it with a new to route to the Red Hat Single Sign-On pod.

    $ oc delete route sso
    $ oc create -f - <<EOF
    apiVersion: v1
    kind: Route
    metadata:
      name: sso
    spec:
      host: $hostname
      to:
        kind: Service
        name: sso
      tls:
        termination: edge
        key: |-
    $(sed 's/^/      /' ~/.lego/certificates/$hostname.key)
        certificate: |-
    $(sed 's/^/      /' ~/.lego/certificates/$hostname.crt)
        caCertificate: |-
    $(sed 's/^/      /' ~/.lego/certificates/$hostname.issuer.crt)
    EOF

    Confirm that your Red Hat Single Sign-On instance is now using a public certificate by running again the curl command:

    $ curl https://$hostname/auth/realms/master
    

    Lego does not need to run continuously, so between certificate renewals (every 90 days), you can scale it down:

    $ oc scale dc/lego --replicas=0
    

    Conclusion

    Self-signed certificates are always a headache when delivering a proof of concept or a workshop. This article presented a very practical way to get a valid public certificate for your Red Hat Single Sign-On instance.

    Some aspects would need improvements to be used for longer periods or in production environments. For instance, we would need to use the proper Kubernetes concepts, Cron to run Lego, handle the certificate renewal, and use the DNS validation challenge (which requires a more complex setup but does not involve deleting the sso route).

    Also, this article is about getting public certificates for your Red Hat Single Sign-On instance that is publicly deployed on the Internet. If your instance is deployed on your laptop for development purposes, the mkcertproject can help you generate proper certificates and make them trusted in your web browser.

    Nevertheless, I hope this article will give you ideas and entice you to use public certificates for your Red Hat Single Sign-On setups.

    Another article that might be of interest is "Single Sign-On Made Easy with Keycloak/Red Hat SSO."

    Last updated: February 11, 2024

    Recent Posts

    • Cloud bursting with confidential containers on OpenShift

    • Reach native speed with MacOS llama.cpp container inference

    • A deep dive into Apache Kafka's KRaft protocol

    • Staying ahead of artificial intelligence threats

    • Strengthen privacy and security with encrypted DNS in RHEL

    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform

    Build

    • Developer Sandbox
    • Developer Tools
    • Interactive Tutorials
    • API Catalog

    Quicklinks

    • Learning Resources
    • E-books
    • Cheat Sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site Status Dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2025 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Report a website issue