Skip to main content
Version: next

Decision matrix

Choose the TLS mode deliberately

Choose the TLS mode deliberately.
ModeUse it whenWhat the operator ownsWatch for
ACMEThe service is exposed publicly and OpenBao should obtain certificates directly from an ACME provider.The operator wires the listener path, but OpenBao handles the certificate lifecycle itself.This works best when the service owns the public endpoint and you can meet the ACME challenge requirements.
OperatorManagedYou need a fast internal evaluation path or temporary development certificates.The operator generates and rotates the CA and leaf certificates inside the cluster.This is not the Hardened production posture because the operator holds certificate authority material.

Diagram

Certificate rotation and reload path

When the certificate source changes, the operator updates the mounted material and the workload reloads it without rebuilding or reinstalling the cluster.

Trust paths that matter

Reference table

TLS surfaces

TLS surfaces.
PathWhat is being protectedPrimary concern
Pod to podRaft and internal service traffic between OpenBao members.The SAN set and CA distribution need to match pod and service DNS accurately so peers can authenticate each other.
Edge proxy to backendGateway, ingress, or mesh traffic between the edge and the cluster.Choose passthrough versus termination deliberately so you know where the private key lives and where client identity is enforced.

Where key material lives

Reference table

Key and CA ownership

Key and CA ownership.
ModeServer private keyCA or trust rootOperational consequence
ACMEGenerated inside OpenBaoPublic ACME issuerThe operator never needs the private key, but the cluster must satisfy the ACME issuance path.
OperatorManagedKubernetes Secret managed by the operatorOperator-generated internal CAFast to stand up, but the trust root now lives inside the same management plane you are trying to keep small and reviewable.

Exposure guidance

Decision matrix

Edge exposure choices

Edge exposure choices.
PatternUse it whenWhy it is preferred or risky
Edge terminationYou need policy enforcement, client-auth handling, or platform certificate lifecycle at the edge.This can be valid, but you must be explicit about how trust is re-established between the proxy and OpenBao.
Temporary self-signed or operator-generated edge trustShort-lived evaluation environments only.This path is easy to start but tends to leak into production unless you set a deliberate migration plan.
Configuration ownership

This page explains the TLS security model. Use the configuration guides when you need the exact cluster fields:

Continue workload protections

Next release documentation

You are reading the unreleased main docs. Use the version menu for the newest published release, or check the release notes for what is already out.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.