Generate certificates

    You can probably find OpenSSL in the package manager for your operating system.

    On CentOS, use Yum:

    On macOS, use Homebrew:

    The first step in this process is to generate a private key using the openssl genrsa command. As the name suggests, you should keep this file private.

    Private keys must be of sufficient length to be secure, so specify 2048:

    1. openssl genrsa -out root-ca-key.pem 2048

    You can optionally add the -aes256 option to encrypt the key using the AES-256 standard. This option requires a password.

    Generate a root certificate

    Next, use the private key to generate a self-signed certificate for the root CA:

    1. openssl req -new -x509 -sha256 -key root-ca-key.pem -out root-ca.pem -days 730

    The default -days value of 30 is only useful for testing purposes. This sample command specifies 730 (two years) for the certificate expiration date, but use whatever value makes sense for your organization.

    • The -x509 option specifies that you want a self-signed certificate rather than a certificate request.
    • The -sha256 option sets the hash algorithm to SHA-256. SHA-256 is the default in later versions of OpenSSL, but earlier versions might use SHA-1.

    Follow the prompts to specify details for your organization. Together, these details form the distinguished name (DN) of your CA.

    Generate an admin certificate

    To generate an admin certificate, first create a new key:

    1. openssl genrsa -out admin-key-temp.pem 2048
    1. openssl pkcs8 -inform PEM -outform PEM -in admin-key-temp.pem -topk8 -nocrypt -v1 PBE-SHA1-3DES -out admin-key.pem

    Next, create a certificate signing request (CSR). This file acts as an application to a CA for a signed certificate:

    Follow the prompts to fill in the details. You don’t need to specify a challenge password. As noted in the OpenSSL Cookbook, “Having a challenge password does not increase the security of the CSR in any way.”

    If you generate TLS certificates and have enabled hostname verification by setting plugins.security.ssl.transport.enforce_hostname_verification to true (default), be sure to specify a common name (CN) for each certificate signing request (CSR) that matches the corresponding DNS A record of the intended node.

    If you want to use the same node certificate on all nodes (not recommended), set hostname verification to false. For more information, see .

    Now that the private key and signing request have been created, generate the certificate:

    1. openssl x509 -req -in admin.csr -CA root-ca.pem -CAkey root-ca-key.pem -CAcreateserial -sha256 -out admin.pem -days 730

    Just like the root certificate, use the -days option to specify an expiration date of longer than 30 days.

    Similar to the steps in , you will generate keys and CSRs with new file names for each node and as many client certificates as you need. For example, you might generate one client certificate for OpenSearch Dashboards and another for a Python client. Each certificate should use its own private key and should be generated from a unique CSR with matching SAN extension specific to the intended host. A SAN extension is not needed for the admin cert because that cert is not tied to a specific host.

    To generate a node or client certificate, first create a new key:

    1. openssl genrsa -out node1-key-temp.pem 2048

    Then convert that key to PKCS#8 format for use in Java using a PKCS#12-compatible algorithm (3DES):

    1. openssl pkcs8 -inform PEM -outform PEM -in node1-key-temp.pem -topk8 -nocrypt -v1 PBE-SHA1-3DES -out node1-key.pem

    Next, create the CSR:

    1. openssl req -new -key node1-key.pem -out node1.csr

    Before generating a signed certificate, create a SAN extension file which describes the DNS A record for the host:

    1. echo 'subjectAltName=DNS:node1.dns.a-record' > node1.ext

    Generate the certificate:

    Sample script

    If you already know the certificate details and don’t want to specify them interactively, use the -subj option in your root-ca.pem and CSR commands. This script creates a root certificate, admin certificate, two node certificates, and a client certificate, all with an expiration dates of two years (730 days):

    1. #!/bin/sh
    2. # Root CA
    3. openssl genrsa -out root-ca-key.pem 2048
    4. openssl req -new -x509 -sha256 -key root-ca-key.pem -subj "/C=CA/ST=ONTARIO/L=TORONTO/O=ORG/OU=UNIT/CN=root.dns.a-record" -out root-ca.pem -days 730
    5. # Admin cert
    6. openssl genrsa -out admin-key-temp.pem 2048
    7. openssl req -new -key admin-key.pem -subj "/C=CA/ST=ONTARIO/L=TORONTO/O=ORG/OU=UNIT/CN=A" -out admin.csr
    8. # Node cert 1
    9. openssl genrsa -out node1-key-temp.pem 2048
    10. openssl pkcs8 -inform PEM -outform PEM -in node1-key-temp.pem -topk8 -nocrypt -v1 PBE-SHA1-3DES -out node1-key.pem
    11. openssl req -new -key node1-key.pem -subj "/C=CA/ST=ONTARIO/L=TORONTO/O=ORG/OU=UNIT/CN=node1.dns.a-record" -out node1.csr
    12. echo 'subjectAltName=DNS:node1.dns.a-record' > node1.ext
    13. openssl x509 -req -in node1.csr -CA root-ca.pem -CAkey root-ca-key.pem -CAcreateserial -sha256 -out node1.pem -days 730 -extfile node1.ext
    14. # Node cert 2
    15. openssl genrsa -out node2-key-temp.pem 2048
    16. openssl pkcs8 -inform PEM -outform PEM -in node2-key-temp.pem -topk8 -nocrypt -v1 PBE-SHA1-3DES -out node2-key.pem
    17. openssl req -new -key node2-key.pem -subj "/C=CA/ST=ONTARIO/L=TORONTO/O=ORG/OU=UNIT/CN=node2.dns.a-record" -out node2.csr
    18. echo 'subjectAltName=DNS:node2.dns.a-record' > node2.ext
    19. openssl x509 -req -in node2.csr -CA root-ca.pem -CAkey root-ca-key.pem -CAcreateserial -sha256 -out node2.pem -days 730 -extfile node2.ext
    20. # Client cert
    21. openssl genrsa -out client-key-temp.pem 2048
    22. openssl pkcs8 -inform PEM -outform PEM -in client-key-temp.pem -topk8 -nocrypt -v1 PBE-SHA1-3DES -out client-key.pem
    23. openssl req -new -key client-key.pem -subj "/C=CA/ST=ONTARIO/L=TORONTO/O=ORG/OU=UNIT/CN=client.dns.a-record" -out client.csr
    24. echo 'subjectAltName=DNS:client.dns.a-record' > client.ext
    25. openssl x509 -req -in client.csr -CA root-ca.pem -CAkey root-ca-key.pem -CAcreateserial -sha256 -out client.pem -days 730 -extfile client.ext
    26. # Cleanup
    27. rm admin-key-temp.pem
    28. rm admin.csr
    29. rm node1-key-temp.pem
    30. rm node1.csr
    31. rm node1.ext
    32. rm node2-key-temp.pem
    33. rm node2.ext
    34. rm client-key-temp.pem
    35. rm client.csr

    Add distinguished names to opensearch.yml

    You must specify the distinguished names (DNs) for all admin and node certificates in opensearch.yml on all nodes. Using the certificates from the sample script above, part of opensearch.yml might look like this:

    1. plugins.security.authcz.admin_dn:
    2. - 'CN=A,OU=UNIT,O=ORG,L=TORONTO,ST=ONTARIO,C=CA'
    3. plugins.security.nodes_dn:
    4. - 'CN=node1.dns.a-record,OU=UNIT,O=ORG,L=TORONTO,ST=ONTARIO,C=CA'
    5. - 'CN=node2.dns.a-record,OU=UNIT,O=ORG,L=TORONTO,ST=ONTARIO,C=CA'

    But if you look at the subject of the certificate after creating it, you might see different formatting:

    1. subject=/C=CA/ST=ONTARIO/L=TORONTO/O=ORG/OU=UNIT/CN=node1.dns.a-record

    If you compare this string to the ones above, you can see that you need to invert the order of elements and use commas rather than slashes. Enter this command to get the correct string:

    1. openssl x509 -subject -nameopt RFC2253 -noout -in node.pem

    Then copy and paste the output into opensearch.yml.

    This process generates many files, but these are the ones you need to add to each node:

    • root-ca.pem
    • admin.pem
    • admin-key.pem
    • (Optional) node1.pem
    • (Optional) node1-key.pem

    On one node, the security configuration portion of opensearch.yml might look like this:

    1. plugins.security.ssl.transport.pemcert_filepath: node1.pem
    2. plugins.security.ssl.transport.pemkey_filepath: node1-key.pem
    3. plugins.security.ssl.transport.pemtrustedcas_filepath: root-ca.pem
    4. plugins.security.ssl.transport.enforce_hostname_verification: false
    5. plugins.security.ssl.http.enabled: true
    6. plugins.security.ssl.http.pemcert_filepath: node1.pem
    7. plugins.security.ssl.http.pemkey_filepath: node1-key.pem
    8. plugins.security.ssl.http.pemtrustedcas_filepath: root-ca.pem
    9. plugins.security.authcz.admin_dn:
    10. - 'CN=A,OU=UNIT,O=ORG,L=TORONTO,ST=ONTARIO,C=CA'
    11. plugins.security.nodes_dn:

    For more information about adding and using these certificates in your own setup, see for Docker, Configure TLS certificates, and .

    Run securityadmin.sh

    OpenSearch Dashboards

    For information on using your root CA and a client certificate to enable TLS for OpenSearch Dashboards, see Configure TLS for OpenSearch Dashboards.