Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pass the decrypted mTLS client certificate key to Elastic Defend #5490

Closed
AndersonQ opened this issue Sep 10, 2024 · 2 comments · Fixed by #5542
Closed

Pass the decrypted mTLS client certificate key to Elastic Defend #5490

AndersonQ opened this issue Sep 10, 2024 · 2 comments · Fixed by #5542
Assignees
Labels
enhancement New feature or request Team:Elastic-Agent-Control-Plane Label for the Agent Control Plane team

Comments

@AndersonQ
Copy link
Member

AndersonQ commented Sep 10, 2024

Elastic Defend currently does not support passphrase-protected private keys for mTLS communication with Fleet Server. To enable secure communication between Elastic Defend and Fleet Server when using passphrase-protected keys, the elastic-agent should decrypt the private key and pass the decrypted key to Elastic Defend. This should be done without requiring Elastic Defend to implement support for passphrase handling. Instead, leverage the existing fleet.ssl.* configuration block within Elastic Defend to provide the decrypted key directly. They are following the Filebeat ssl configuration as a spec: https://www.elastic.co/guide/en/beats/filebeat/current/configuration-ssl.html#client-key

Acceptance Criteria:

Additional Notes:

@AndersonQ AndersonQ added enhancement New feature or request Team:Elastic-Agent-Control-Plane Label for the Agent Control Plane team labels Sep 10, 2024
@AndersonQ AndersonQ self-assigned this Sep 10, 2024
@elasticmachine
Copy link
Contributor

Pinging @elastic/elastic-agent-control-plane (Team:Elastic-Agent-Control-Plane)

@cmacknz
Copy link
Member

cmacknz commented Sep 10, 2024

FYI @nfritts, no work from endpoint should be required here since it appears that endpoint already accepts client certificates and keys for mTLS.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request Team:Elastic-Agent-Control-Plane Label for the Agent Control Plane team
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants