Skip to content

Commit 054ff2a

Browse files
committed
docu: Add a note to suggest using an issuer-per-namespace approach
And mention using a 'master' SA account and attached security concerns
1 parent d3b629c commit 054ff2a

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

README.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,19 @@ helm install stackit-cert-manager-webhook --namespace cert-manager stackit-cert-
9595
config:
9696
projectId: <STACKIT PROJECT ID>
9797
```
98-
*Note:* Ensure your service account secret (sa.json) is created in the namespace linked to the issuer so the webhook can access the project resources.
98+
*Note on service accounts and namespaces:*
99+
- Issuer-per-namespace (recommended for isolation): create a STACKIT service-account key (sa.json) for each STACKIT project you need to manage and place that key in a Kubernetes Secret in the same namespace as the Issuer. This means one sa.json (one SA key) per Issuer/namespace when the Issuers target different STACKIT projects.
100+
Example (create a secret in the Issuer namespace):
101+
```bash
102+
kubectl create secret generic stackit-sa-authentication \
103+
-n <issuer-namespace> \
104+
--from-literal=sa.json='{"id":"...","credentials":{...}}'
105+
```
106+
Ensure the webhook can read the secret in that namespace (create the secret where the Issuer lives).
107+
- Alternative (single SA key for multiple projects): you can grant the service account broader permissions at folder or organization level so one sa.json can manage zones across multiple projects. This is more convenient but grants wider access — evaluate security and follow least-privilege principles.
108+
- Tradeoffs:
109+
- Per-namespace/per-project SA keys: better isolation and least privilege, easier to rotate keys per project.
110+
- Folder/org-level SA key: lower operational overhead (single key), but larger blast radius if compromised.
99111

100112
3. ***Demonstration of Ingress Integration with Wildcard SSL/TLS Certificate Generation***
101113
Given the preceding configuration, it is possible to exploit the capabilities of the Issuer or ClusterIssuer to

0 commit comments

Comments
 (0)