This is a cache of https://docs.okd.io/4.9/security/certificate_types_descriptions/user-provided-certificates-for-api-server.html. It is a snapshot of the page at 2025-06-05T22:59:03.993+0000.
User-provided certificates for the <strong>api</strong> server - Certificate types and descriptions | Security and compliance | OKD 4.9
×

Purpose

The api server is accessible by clients external to the cluster at api.<cluster_name>.<base_domain>. You might want clients to access the api server at a different hostname or without the need to distribute the cluster-managed certificate authority (CA) certificates to the clients. The administrator must set a custom default certificate to be used by the api server when serving content.

Location

The user-provided certificates must be provided in a kubernetes.io/tls type Secret in the openshift-config namespace. Update the api server cluster configuration, the apiserver/cluster resource, to enable the use of the user-provided certificate.

Management

User-provided certificates are managed by the user.

Expiration

api server client certificate expiration is less than five minutes.

User-provided certificates are managed by the user.

Customization

Update the secret containing the user-managed certificate as needed.

Additional resources