Pass the decrypted mTLS client certificate key to Elastic Defend #5490
Labels
enhancement
New feature or request
Team:Elastic-Agent-Control-Plane
Label for the Agent Control Plane team
Elastic Defend currently does not support passphrase-protected private keys for mTLS communication with Fleet Server. To enable secure communication between Elastic Defend and Fleet Server when using passphrase-protected keys, the elastic-agent should decrypt the private key and pass the decrypted key to Elastic Defend. This should be done without requiring Elastic Defend to implement support for passphrase handling. Instead, leverage the existing
fleet.ssl.*
configuration block within Elastic Defend to provide the decrypted key directly. They are following the Filebeat ssl configuration as a spec: https://www.elastic.co/guide/en/beats/filebeat/current/configuration-ssl.html#client-keyAcceptance Criteria:
fleet.ssl.key
configuration setting within Elastic Defend's configuration.TestEndpointSignedComponentModifier
to include a check for the mTLS client certificate key decryption.Additional Notes:
The text was updated successfully, but these errors were encountered: