Skip to main content

Certificate Management

cert-manager runs as platform infrastructure — stream-aligned teams have no direct interface with it. Its primary responsibility is acting as the Istio certificate authority via the cert-manager istio-csr integration, issuing short-lived mTLS workload certificates to Envoy sidecars across all mesh clusters.

  • Self-signed root CA: An ECDSA P-256 self-signed root certificate (CN: opentofu-self-signed-ca.osinfra.io, 30-year validity) is generated in the main workspace by OpenTofu and stored in state. The cert and key are passed to each regional workspace via remote state.
  • istio-csr: The cert-manager Istio Certificate Signing Request agent replaces istiod's built-in Citadel CA — the component responsible for signing certificate signing requests (CSRs) from Envoy sidecars. All workload mTLS certificates are signed by cert-manager through this integration; istiod continues to handle config distribution, service discovery, and sidecar injection as normal.
  • Automatic rotation: cert-manager handles certificate issuance and rotation for all mesh workloads without manual intervention.
note

Platform teams may use cert-manager for other certificate needs beyond Istio mTLS. Stream-aligned teams have no direct interface with cert-manager.

Components

Certificate Authority

The trust anchor of the mesh is root-ca — an ECDSA P-256 self-signed certificate (CN: opentofu-self-signed-ca.osinfra.io, 30-year validity) generated in the main workspace by OpenTofu and passed to regional workspaces via remote state. It establishes the chain of trust for every workload certificate in the mesh.

ComponentDescription
istio-intermediate-cacert-manager Issuer in istio-system backed by the root CA Secret; issues the istio-ca intermediate Certificate
istio-ca720h intermediate CA Certificate (CN: istio-intermediate-ca.osinfra.io) stored as the Kubernetes Secret named istio-ca in istio-system
istio-ca-issuercert-manager Issuer backed by the istio-ca Secret; cert-manager-istio-csr uses it to sign Envoy sidecar CSRs

Workload Certificate

workload-certificate is a short-lived mTLS leaf certificate issued to an Envoy sidecar by cert-manager-istio-csr. Automatically rotated by cert-manager — no manual intervention required.

Glossary

TermMeaning in this context
istio-ca720h intermediate CA Certificate (CN: istio-intermediate-ca.osinfra.io) stored as a Kubernetes Secret named istio-ca in istio-system — the Secret name and CN differ; this is the signing authority used by cert-manager-istio-csr for all workload CSRs
istio-ca-issuercert-manager Issuer backed by the istio-ca Secret; cert-manager-istio-csr uses this issuer to sign Envoy sidecar certificates
istio-intermediate-cacert-manager Issuer in istio-system backed by the root CA Secret; issues the istio-ca intermediate Certificate
root-caECDSA P-256 self-signed trust anchor (CN: opentofu-self-signed-ca.osinfra.io, 30-year validity) generated in the main workspace by OpenTofu and passed to regional workspaces via remote state
workload-certificateShort-lived mTLS leaf certificate issued to an Envoy sidecar by cert-manager-istio-csr; automatically rotated by cert-manager

Downstream Interfaces

OutputConsumed ByViaDescription
istio-ca-issuerService Meshcert-manager-istio-csrSigns workload CSRs for all Envoy sidecar mTLS certificates

Core Invariant

All mesh workload certificates are issued and rotated by cert-manager — no manually managed certificates exist in the mesh.