在自带子 CA 模式下,子 CA 的 CSR 在 GDC 气隙设备管理 API 服务器中生成。您必须签署 CSR 请求,并将已签名的证书上传到系统中。如需了解详情,请参阅为自带子 CA 证书签名。您可以创建一个指向此 SubCA 的 CertificateIssuer 自定义资源,并将其标记为默认 CertificateIssuer。
新创建的子 CA 会颁发所有后续的 Web 证书。您无需更改信任库。
过渡到其他 PKI 模式
PKI API 支持从默认的完全受管理模式过渡到其他受支持的自定义模式。如需了解详情,请参阅过渡到不同的 PKI 模式。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[],[],null,["# Web TLS certificate configuration\n\nGoogle Distributed Cloud (GDC) air-gapped appliance provides a [public key infrastructure (PKI) API](/distributed-cloud/hosted/docs/latest/appliance/apis/service/security/pki/v1/security-pki-v1)\nfor you to obtain a web certificate. This API supports several user modes:\n\n- **Fully-managed**: certificates issued by GDC PKI infrastructure and chained to a GDC-managed self-signed root certificate authority (CA).\n- **BYO cert**: you provide a pool of certificates with a default wildcard certificate. GDC will use the best matched certificate for your service.\n- **BYO SubCA**: certificates issued by GDC PKI infrastructure and chained to your SubCA. You must provide the SubCA and let GDC operate it.\n\nInfra PKI mode definitions\n--------------------------\n\nThis section provides a detailed explanation of each PKI user mode.\n\n### Fully Managed mode (default mode)\n\nIn fully managed mode, the tenant organization relies on the GDC\npublic key infrastructure (PKI) to issue certificates. When you create a new\norganization, this mode is the default mode applied. Afterwards, you can switch\nto a different PKI mode.\n\nWith this mode, you must obtain and distribute the root CA to your environment\nfor trust.\n\n### BYO Certificates mode\n\nBYO certificate mode supports signing leaf certificates with external or user-managed\nCAs. This mode generates a certificate signing request (CSR) for every\ncertificate request. While waiting for signing, BYO cert mode searches for an\nexisting customer-signed certificate among the pool that matches with the\ncertificate request:\n\n- If it can't find a matching certificate, a GDC-managed fallback CA issues a temporary certificate ready for immediate use.\n- If it finds a matching certificate, it uses the matching certificate as the temporary certificate for the current request.\n\nTo sign the CSR, you must perform the following steps:\n\n1. Download the CSR from the `Certificate` custom resource status.\n2. Upload the signed certificate and the external CA certificate to the same `Certificate` custom resource with an update to the `spec` field.\n\nTo manage verification and replace the temporary certificate, GDC air-gapped appliance\nupdates the certificate secret with the uploaded certificate and the external CA.\nYou don't have to change your trust stores.\n\nFor more information, see\n[Sign the BYO certificate](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/pki/transition-pki-modes#sign-byo-cert).\n\n### BYO SubCA mode\n\nWith BYO SubCA mode, a CSR for the SubCA generates within the GDC air-gapped appliance\nManagement API server. You must sign the CSR request, and upload the signed\ncertificate into the system. For more information, see\n[Sign the BYO SubCA certificate](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/pki/transition-pki-modes#sign-byo-subca-cert).\nYou can create a `CertificateIssuer` custom resource that points to this SubCA\nand mark it as the default `CertificateIssuer`.\n\nThe newly created subCA issues all of the subsequent web certificates. You\ndon't have to change your trust stores.\n\nTransition to a different PKI mode\n----------------------------------\n\nThe PKI API supports transition from the default fully-managed mode to other\nsupported custom modes. For more information, see\n[transition to different PKI modes](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/pki/transition-pki-modes)."]]