Using a custom TLS certificate for HTTPS connections with Watson Machine Learning Accelerator
Upgrade to IBM Software Hub Version 5.1 before IBM Cloud Pak for Data Version 4.7 reaches end of support. For more information, see Upgrading IBM Software Hub in the IBM Software Hub Version 5.1 documentation.
The Watson Machine Learning Accelerator installation includes a self-signed TLS certificate that can be used to enable HTTPS connections. By default, this certificate is untrusted by all HTTPS clients. However, you can replace the default certificate with your own TLS certificate.
Watson Machine Learning Accelerator exposes one HTTPS port as the primary access point for the web client and for API requests. On Red Hat® OpenShift®, the port is exposed as an OpenShift route.
Before you begin
- Required permissions
- To complete this task, you must have one of the following roles:
- Red Hat OpenShift cluster administrator
- Red Hat OpenShift instance administrator on the project where Cloud Pak for Data is installed
To complete this task, you must have your own certificate and private key file that meet the following requirements:
- Both files are in PEM format.
- The root ca certificate is named ca.crt.
- The certificate is named tls.crt.
The certificate can be a bundle that contains your server, intermediates, and root certificates concatenated (in the proper order) into one file. The necessary certificates must be enabled as trusted certificates on the clients that connect to the cluster.
- The private key is named tls.key.
- The ECDSA certificate is named tls-ecdsa.crt.
- The private ECDSA key is named tls-ecdsa.key.
Procedure
To replace the default TLS certificate with your custom TLS certificate: