Skip to content

When your Client Workload uses Transport Layer Security (TLS) (such as HTTPS or Redis with TLS) to communicate with the Server Workload, you must enable TLS Decrypt in your Aembit Tenant. TLS Decrypt allows the Aembit Agent Proxy to decrypt and manage encrypted traffic between your Client and Server Workloads, enabling Workload IAM functionality.

To configure TLS Decrypt, you must configure your Client Workloads to trust your Aembit Tenant Root Certificate Authorities (CAs) so they can establish TLS connections with your Server Workload. To do this, you must:

To configure TLS Decrypt, you must have the following:

  • A Server Workload with TLS enabled (see Enable Server Workload TLS).

  • Your Aembit Tenant Root CA.

  • TLS version 1.2+ on your Client and Server Workloads (Agent Proxy requirement).

To get your Aembit Tenant Root CA, perform the following steps:

  1. Log in to your Aembit tenant.

  2. In the left sidebar menu, go to Edge Components.

  3. In the top ribbon menu, click TLS Decrypt.

    TLS Decrypt Page

  4. Click Download your Aembit Tenant Root CA certificate.

Alternatively, you may download the Aembit Tenant Root CA directly by using to the following URL, making sure to replace <your_tenant_id> with your actual Aembit tenant ID:

Terminal window
https://<your_tenant_id>.aembit.io/api/v1/root-ca

Add your Aembit Tenant Root CA to a trusted root store

Section titled “Add your Aembit Tenant Root CA to a trusted root store”

Different operating systems and application frameworks have different methods for adding root certificates to their associated root store. Most Client Workloads use the system root store. This isn’t always the case, however, so make sure to consult your operating system’s documentation.

You must install your Aembit Tenant Root CA on your Client Workload container or Virtual Machine (VM). Install your Aembit Tenant Root CA either during workload build/provisioning time, or at runtime, as long as the Client Workload processes trust the Aembit Tenant Root CA.

Select a tab for your operating system, distribution, and specific application to see the steps to adding your Aembit Tenant Root CA to your root store:

For Debian/Ubuntu Linux, you must include the Aembit Tenant Root CA in your Client Workload container image:

  1. Get your Aembit Tenant Root CA and save it to </your/file/path>/<aembit-tenant-root-ca>.crt.

  2. Run the following commands to include the root CA in your Dockerfile:

    RUN apt-get update && apt-get install -y ca-certificates
    COPY </your/file/path>/<aembit-tenant-root-ca>.crt /usr/local/share/ca-certificates
    RUN update-ca-certificates

The default lifetime of leaf certificates for your Aembit Tenant Root CA is 1 day. To change this value, follow these steps:

  1. Log in to your Aembit tenant.

  2. In the left sidebar menu, go to Edge Components.

  3. In the top ribbon menu, click TLS Decrypt.

  4. Under Leaf Certificate Lifetime, select the desired value (1 hour, 1 day, or 1 week) from the dropdown menu.

  5. Click Save.

  6. (Optional) To apply the changes to existing leaf certificates, you must either:

    • Restart the associated Agent Proxy. See Verifying your leaf certificate lifetime.

    • Wait for existing certificates to expire.

After changing your leaf certificate lifetime, verify the changes by viewing the details of the cert through the following commands:

  1. After changing the leaf certificate lifetime, log in to the Agent Proxy associated with the leaf certificate lifetime you updated.

  2. Restart the Agent Proxy.

  3. Run the following command to create a test TLS connection from the Agent Proxy to a Server Workload. The hostname must be in a Server Workload associated with the Access Policy for that Agent Proxy.

    Terminal window
    openssl s_client -connect <server_workload_hostname>:<port>
  4. Inspect the output and look for the Server certificate section.

    Copy the contents of the certificate (highlighted in the following example):

    Server certificate
    -----BEGIN CERTIFICATE-----
    MjUwMjA1MjI1MDIxWhcNMzUwMjAzMjI1MDIxWjBrMSUwIwYDVQQDDBxBZW1iaXQg
    ...
    ... omitted for brevity
    ...
    0ApHb7jB+YkL59eG9WOdCUqjQjBAA=
    -----END CERTIFICATE-----
    subject-CN - my.service.com
  5. View and inspect the detailed contents of the certificate by echoing the certificate you just copied into the openssl x509 -text command:

    Terminal window
    echo "<copied_server_certificate>" | openssl x509 -text

    You should see output similar to the following:

    Terminal window
    Certificate:
    Data:
    Version: 3 (0x2)
    Serial Number: 1234567890 (0x12345fe4)
    Signature Algorithm: ecdsa-with-SHA384
    Issuer: CN = Aembit Tenant 1a2b3c Issuing CA, O = Aembit Inc, C = US, emailAddress = support@aembit.io
    Validity
    Not Before: Feb 10 13:25:42 2025 GMT
    Not After : Feb 11 13:30:42 2025 GMT
    Subject: CN = my.service.com
    ...
    ... omitted for brevity
    ...

    Notice that the highlighted Validity section has the new lifetime representing the leaf certificate lifetime you selected. Aembit intentionally adds five minutes to the Not Before time to account for clock skew between different systems.