Skip to content

Adding additional CA to the DAM trust store

Implementing a custom plugin for the Digital Asset Management extensibility is by default limited to publicly trusted certificates. If the plugin is signed with a self-signed or otherwise untrusted certificate authority (CA), the trust store of DAM can be extended. Starting CF216, you can add additional certificate authorities to the trust store.

Prerequisites

The Digital Asset Management leverages basic Node.JS functionality to extend the trust store by using the NODE_EXTRA_CA_CERTS flag. Therefore, the certificate file used for the next steps must be one single file in the pem format with all necessary CAs aggregated into it.

Adding the PEM file as a secret

To have your deployment and DAM use the certificate, you must store it in the Kubernetes cluster as a secret.

The secret can be created using the following commands:

Note

You can choose the secret name and this must be referenced in the next configuration step (for example, custom-ca-cert). The namespace is the Kubernetes namespace where you want to deploy HCL Digital Experience 9.5 to (for example, digital-experience). However, you must set the key name to customCACert.pem in the following command like in --from-file=key=source.

# Create secret with the name "custom-ca-cert" and the key "customCACert.pem"
# Secret will be created in the namespace "digital-experience"

kubectl create secret generic custom-ca-cert --from-file=customCACert.pem=./customCACert.pem -n digital-experience

Configuring secret in deployment

Make sure that the reference to the secret is set up correctly in your custom-values.yaml file. Otherwise, Digital Asset Management will not be able to trust the additional certificates.

You can set the name of the certificate used with the following syntax. By default, no secret is set:

# Networking specific configuration
networking:
  addon:
    digitalAssetManagement:
      caTrustSecret: "custom-ca-cert"

Note

Verify you have entered the correct name.