| title | summary | aliases | ||
|---|---|---|---|---|
Certificate-Based Authentication for Login |
Learn the certificate-based authentication used for login. |
|
TiDB supports a certificate-based authentication method for users to log into TiDB. With this method, TiDB issues certificates to different users, uses encrypted connections to transfer data, and verifies certificates when users log in. This approach is more secure than the traditional password-based authentication method commonly used by MySQL users and is thus adopted by an increasing number of users.
To use certificate-based authentication, you might need to perform the following operations:
- Create security keys and certificates
- Configure certificates for TiDB and the client
- Configure the user certificate information to be verified when the user logs in
- Update and replace certificates
The rest of the document introduces in detail how to perform these operations.
It is recommended that you use OpenSSL to create keys and certificates. The certificate generation process is similar to the process described in Enable TLS Between TiDB Clients and Servers. The following paragraphs demonstrate how to configure more attribute fields that need to be verified in the certificate.
It is recommended that you use OpenSSL to create keys and certificates. The certificate generation process is similar to the process described in Enable TLS Between TiDB Clients and Servers. The following paragraphs demonstrate how to configure more attribute fields that need to be verified in the certificate.
-
Execute the following command to generate the CA key:
{{< copyable "shell-regular" >}}
sudo openssl genrsa 2048 > ca-key.pemThe output of the above command:
Generating RSA private key, 2048 bit long modulus (2 primes) ....................+++++ ...............................................+++++ e is 65537 (0x010001) -
Execute the following command to generate the certificate corresponding to the CA key:
{{< copyable "shell-regular" >}}
sudo openssl req -new -x509 -nodes -days 365000 -key ca-key.pem -out ca-cert.pem
-
Enter detailed certificate information. For example:
{{< copyable "shell-regular" >}}
Country Name (2 letter code) [AU]:US State or Province Name (full name) [Some-State]:California Locality Name (e.g. city) []:San Francisco Organization Name (e.g. company) [Internet Widgits Pty Ltd]:PingCAP Inc. Organizational Unit Name (e.g. section) []:TiDB Common Name (e.g. server FQDN or YOUR name) []:TiDB admin Email Address []:s@pingcap.com
Note:
In the above certificate details, texts after
:are the entered information.
-
Execute the following command to generate the server key:
{{< copyable "shell-regular" >}}
sudo openssl req -newkey rsa:2048 -days 365000 -nodes -keyout server-key.pem -out server-req.pem
-
Enter detailed certificate information. For example:
{{< copyable "shell-regular" >}}
Country Name (2 letter code) [AU]:US State or Province Name (full name) [Some-State]:California Locality Name (e.g. city) []:San Francisco Organization Name (e.g. company) [Internet Widgits Pty Ltd]:PingCAP Inc. Organizational Unit Name (e.g. section) []:TiKV Common Name (e.g. server FQDN or YOUR name) []:TiKV Test Server Email Address []:k@pingcap.com Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: An optional company name []: -
Execute the following command to generate the RSA key of the server:
{{< copyable "shell-regular" >}}
sudo openssl rsa -in server-key.pem -out server-key.pem
The output of the above command:
writing RSA key
-
Use the CA certificate signature to generate the signed server certificate:
{{< copyable "shell-regular" >}}
sudo openssl x509 -req -in server-req.pem -days 365000 -CA ca-cert.pem -CAkey ca-key.pem -set_serial 01 -out server-cert.pem
The output of the above command (for example):
Signature ok subject=C = US, ST = California, L = San Francisco, O = PingCAP Inc., OU = TiKV, CN = TiKV Test Server, emailAddress = k@pingcap.com Getting CA Private Key
Note:
When you log in, TiDB checks whether the information in the
subjectsection of the above output is consistent or not.
After generating the server key and certificate, you need to generate the key and certificate for the client. It is often necessary to generate different keys and certificates for different users.
-
Execute the following command to generate the client key:
{{< copyable "shell-regular" >}}
sudo openssl req -newkey rsa:2048 -days 365000 -nodes -keyout client-key.pem -out client-req.pem
-
Enter detailed certificate information. For example:
{{< copyable "shell-regular" >}}
Country Name (2 letter code) [AU]:US State or Province Name (full name) [Some-State]:California Locality Name (e.g. city) []:San Francisco Organization Name (e.g. company) [Internet Widgits Pty Ltd]:PingCAP Inc. Organizational Unit Name (e.g. section) []:TiDB Common Name (e.g. server FQDN or YOUR name) []:tpch-user1 Email Address []:zz@pingcap.com Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: An optional company name []: -
Execute the following command to generate the RSA key of the client:
{{< copyable "shell-regular" >}}
sudo openssl rsa -in client-key.pem -out client-key.pem
The output of the above command:
writing RSA key
-
Use the CA certificate signature to generate the client certificate:
{{< copyable "shell-regular" >}}
sudo openssl x509 -req -in client-req.pem -days 365000 -CA ca-cert.pem -CAkey ca-key.pem -set_serial 01 -out client-cert.pem
The output of the above command (for example):
Signature ok subject=C = US, ST = California, L = San Francisco, O = PingCAP Inc., OU = TiDB, CN = tpch-user1, emailAddress = zz@pingcap.com Getting CA Private Key
Note:
The information of the
subjectsection in the above output is used for certificate configuration for login verification in therequiresection.
Execute the following command to verify certificate:
{{< copyable "shell-regular" >}}
openssl verify -CAfile ca-cert.pem server-cert.pem client-cert.pemIf the certificate is verified, you will see the following result:
server-cert.pem: OK
client-cert.pem: OK
After generating the certificates, you need to configure the TiDB server and the client to use the corresponding server certificate or client certificate.
Modify the [security] section in the TiDB configuration file. This step specifies the directory in which the CA certificate, the server key, and the server certificate are stored. You can replace path/to/server-cert.pem, path/to/server-key.pem, path/to/ca-cert.pem with your own directory.
{{< copyable "" >}}
[security]
ssl-cert ="path/to/server-cert.pem"
ssl-key ="path/to/server-key.pem"
ssl-ca="path/to/ca-cert.pem"
Start TiDB and check logs. If the following information is displayed in the log, the configuration is successful:
[INFO] [server.go:264] ["secure connection is enabled"] ["client verification enabled"=true]
Configure the client so that the client uses the client key and certificate for login.
Taking the MySQL client as an example, you can use the newly created client certificate, client key and CA by specifying ssl-cert, ssl-key, and ssl-ca:
{{< copyable "shell-regular" >}}
mysql -utest -h0.0.0.0 -P4000 --ssl-cert /path/to/client-cert.new.pem --ssl-key /path/to/client-key.new.pem --ssl-ca /path/to/ca-cert.pemNote:
/path/to/client-cert.new.pem,/path/to/client-key.new.pem, and/path/to/ca-cert.pemare the directory of the CA certificate, client key, and client certificate. You can replace them with your own directory.
First, connect TiDB using the client to configure the login verification. Then, you can get and configure the user certificate information to be verified.
The user certificate information can be specified by require subject, require issuer, require san, and require cipher, which are used to check the X509 certificate attributes.
-
require subject: Specifies thesubjectinformation of the client certificate when you log in. With this option specified, you do not need to configurerequire sslor x509. The information to be specified is consistent with the enteredsubjectinformation in Generate client keys and certificates.To get this option, execute the following command:
{{< copyable "shell-regular" >}}
openssl x509 -noout -subject -in client-cert.pem | sed 's/.\{8\}//' | sed 's/, /\//g' | sed 's/ = /=/g' | sed 's/^/\//'
-
require issuer: Specifies thesubjectinformation of the CA certificate that issues the user certificate. The information to be specified is consistent with the enteredsubjectinformation in Generate CA key and certificate.To get this option, execute the following command:
{{< copyable "shell-regular" >}}
openssl x509 -noout -subject -in ca-cert.pem | sed 's/.\{8\}//' | sed 's/, /\//g' | sed 's/ = /=/g' | sed 's/^/\//'
-
require san: Specifies theSubject Alternative Nameinformation of the CA certificate that issues the user certificate. The information to be specified is consistent with thealt_namesof theopenssl.cnfconfiguration file used to generate the client certificate.-
Execute the following command to get the information of the
require sanitem in the generated certificate:{{< copyable "shell-regular" >}}
openssl x509 -noout -extensions subjectAltName -in client.crt
-
require sancurrently supports the followingSubject Alternative Namecheck items:- URI
- IP
- DNS
-
Multiple check items can be configured after they are connected by commas. For example, configure
require sanas follows for theu1user:{{< copyable "sql" >}}
create user 'u1'@'%' require san 'DNS:d1,URI:spiffe://example.org/myservice1,URI:spiffe://example.org/myservice2';
The above configuration only allows the
u1user to log in to TiDB using the certificate with the URI itemspiffe://example.org/myservice1orspiffe://example.org/myservice2and the DNS itemd1.
-
-
require cipher: Checks the cipher method supported by the client. Use the following statement to check the list of supported cipher methods:{{< copyable "sql" >}}
SHOW SESSION STATUS LIKE 'Ssl_cipher_list';
After getting the user certificate information (require subject, require issuer, require san, require cipher), configure these information to be verified when creating a user, granting privileges, or altering a user. Replace <replaceable> with the corresponding information in the following statements.
You can configure one option or multiple options using the space or and as the separator.
-
Configure user certificate when creating a user (
create user):{{< copyable "sql" >}}
create user 'u1'@'%' require issuer '<replaceable>' subject '<replaceable>' san '<replaceable>' cipher '<replaceable>';
-
Configure user certificate when granting privileges:
{{< copyable "sql" >}}
grant all on *.* to 'u1'@'%' require issuer '<replaceable>' subject '<replaceable>' san '<replaceable>' cipher '<replaceable>';
-
Configure user certificate when altering a user:
{{< copyable "sql" >}}
alter user 'u1'@'%' require issuer '<replaceable>' subject '<replaceable>' san '<replaceable>' cipher '<replaceable>';
After the above configuration, the following items will be verified when you log in:
- SSL is used; the CA that issues the client certificate is consistent with the CA configured in the server.
- The
issuerinformation of the client certificate matches the information specified inrequire issuer. - The
subjectinformation of the client certificate matches the information specified inrequire cipher. - The
Subject Alternative Nameinformation of the client certificate matches the information specified inrequire san.
You can log into TiDB only after all the above items are verified. Otherwise, the ERROR 1045 (28000): Access denied error is returned. You can use the following command to check the TLS version, the cipher algorithm and whether the current connection uses the certificate for the login.
Connect the MySQL client and execute the following statement:
{{< copyable "sql" >}}
\sThe output:
--------------
mysql Ver 15.1 Distrib 10.4.10-MariaDB, for Linux (x86_64) using readline 5.1
Connection id: 1
Current database: test
Current user: root@127.0.0.1
SSL: Cipher in use is TLS_AES_256_GCM_SHA384
Then execute the following statement:
{{< copyable "sql" >}}
show variables like '%ssl%';The output:
+---------------+----------------------------------+
| Variable_name | Value |
+---------------+----------------------------------+
| ssl_cert | /path/to/server-cert.pem |
| ssl_ca | /path/to/ca-cert.pem |
| have_ssl | YES |
| have_openssl | YES |
| ssl_key | /path/to/server-key.pem |
+---------------+----------------------------------+
6 rows in set (0.067 sec)
The key and certificate are updated regularly. The following sections introduce how to update the key and certificate.
The CA certificate is the basis for mutual verification between the client and server. To replace the CA certificate, generate a combined certificate that supports the authentication for both old and new certificates. On the client and server, first replace the CA certificate, then replace the client/server key and certificate.
-
Back up the old CA key and certificate (suppose that
ca-key.pemis stolen):{{< copyable "shell-regular" >}}
mv ca-key.pem ca-key.old.pem && \ mv ca-cert.pem ca-cert.old.pem -
Generate the new CA key:
{{< copyable "shell-regular" >}}
sudo openssl genrsa 2048 > ca-key.pem -
Generate the new CA certificate using the newly generated CA key:
{{< copyable "shell-regular" >}}
sudo openssl req -new -x509 -nodes -days 365000 -key ca-key.pem -out ca-cert.new.pem
Note:
Generating the new CA certificate is to replace the keys and certificates on the client and server, and to ensure that online users are not affected. Therefore, the appended information in the above command must be consistent with the
require issuerinformation. -
Generate the combined CA certificate:
{{< copyable "shell-regular" >}}
cat ca-cert.new.pem ca-cert.old.pem > ca-cert.pem
After the above operations, restart the TiDB server with the newly created combined CA certificate. Then the server accepts both the new and old CA certificates.
Also replace the old CA certificate with the combined certificate so that the client accepts both the old and new CA certificates.
Note:
Perform the following steps only after you have replaced the old CA certificate on the client and server with the combined CA certificate.
-
Generate the new RSA key of the client:
{{< copyable "shell-regular" >}}
sudo openssl req -newkey rsa:2048 -days 365000 -nodes -keyout client-key.new.pem -out client-req.new.pem && \ sudo openssl rsa -in client-key.new.pem -out client-key.new.pemNote:
The above command is to replace the client key and certificate, and to ensure that the online users are not affected. Therefore, the appended information in the above command must be consistent with the
require subjectinformation. -
Use the combined certificate and the new CA key to generate the new client certificate:
{{< copyable "shell-regular" >}}
sudo openssl x509 -req -in client-req.new.pem -days 365000 -CA ca-cert.pem -CAkey ca-key.pem -set_serial 01 -out client-cert.new.pem
-
Make the client (for example, MySQL) connect TiDB with the new client key and certificate:
{{< copyable "shell-regular" >}}
mysql -utest -h0.0.0.0 -P4000 --ssl-cert /path/to/client-cert.new.pem --ssl-key /path/to/client-key.new.pem --ssl-ca /path/to/ca-cert.pem
Note:
/path/to/client-cert.new.pem,/path/to/client-key.new.pem, and/path/to/ca-cert.pemspecify the directory of the CA certificate, client key, and client certificate. You can replace them with your own directory.
-
Generate the new RSA key of the server:
{{< copyable "shell-regular" >}}
sudo openssl req -newkey rsa:2048 -days 365000 -nodes -keyout server-key.new.pem -out server-req.new.pem && \ sudo openssl rsa -in server-key.new.pem -out server-key.new.pem -
Use the combined CA certificate and the new CA key to generate the new server certificate:
{{< copyable "shell-regular" >}}
sudo openssl x509 -req -in server-req.new.pem -days 365000 -CA ca-cert.pem -CAkey ca-key.pem -set_serial 01 -out server-cert.new.pem
-
Configure the TiDB server to use the new server key and certificate. See Configure TiDB server for details.