<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Understanding the difference between TLS certificates in Viya in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/Understanding-the-difference-between-TLS-certificates-in-Viya/m-p/986135#M30773</link>
    <description>&lt;DIV&gt;
&lt;H3&gt;1. &lt;span class="lia-unicode-emoji" title=":old_key:"&gt;🗝&lt;/span&gt;️ &lt;CODE&gt;sas-ingress.key&lt;/CODE&gt; — The Private Key&lt;/H3&gt;
&lt;P&gt;This is the &lt;STRONG&gt;private key&lt;/STRONG&gt; for the Ingress Controller (typically NGINX). It is the secret half of the public/private key pair used in TLS handshakes.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;What it does&lt;/STRONG&gt;: Used by the Ingress Controller to decrypt incoming HTTPS traffic from browsers/clients.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Where it lives&lt;/STRONG&gt;: Stored inside a Kubernetes secret called &lt;CODE&gt;sas-ingress-certificate&lt;/CODE&gt; (alongside the signed certificate).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;How it's specified&lt;/STRONG&gt;: In &lt;CODE&gt;customer-provided-ingress-certificate.yaml&lt;/CODE&gt; as &lt;CODE&gt;tls.key&lt;/CODE&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Important&lt;/STRONG&gt;: Never expose this file. It must match the public certificate (&lt;CODE&gt;sas-ingress-certificate.pem&lt;/CODE&gt;).&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;
&lt;H3&gt;2. &lt;span class="lia-unicode-emoji" title=":page_facing_up:"&gt;📄&lt;/span&gt; &lt;CODE&gt;sas-ingress-certificate.pem&lt;/CODE&gt; — The Signed Server Identity Certificate&lt;/H3&gt;
&lt;P&gt;This is the &lt;STRONG&gt;public TLS certificate&lt;/STRONG&gt; for the Ingress Controller — the certificate presented to browsers and clients when they connect to SAS Viya over HTTPS.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;What it does&lt;/STRONG&gt;: Proves the identity of your SAS Viya server to external clients (browsers, APIs, etc.).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Signed by&lt;/STRONG&gt;: Your organization's CA (the one referenced in &lt;CODE&gt;sas-ingress-CA-certificate.pem&lt;/CODE&gt;).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Where it lives&lt;/STRONG&gt;: Also stored in the Kubernetes secret &lt;CODE&gt;sas-ingress-certificate&lt;/CODE&gt;, specified as &lt;CODE&gt;tls.crt&lt;/CODE&gt; in &lt;CODE&gt;customer-provided-ingress-certificate.yaml&lt;/CODE&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Requirement&lt;/STRONG&gt;: Must be a wildcard or contain a SAN matching your Ingress FQDN.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;
&lt;H3&gt;3. &lt;span class="lia-unicode-emoji" title=":classical_building:"&gt;🏛&lt;/span&gt;️ &lt;CODE&gt;sas-ingress-CA-certificate.pem&lt;/CODE&gt; — The CA Certificate (Trust Anchor)&lt;/H3&gt;
&lt;P&gt;This is the &lt;STRONG&gt;Certificate Authority (CA) certificate&lt;/STRONG&gt; that &lt;STRONG&gt;signed&lt;/STRONG&gt; &lt;CODE&gt;sas-ingress-certificate.pem&lt;/CODE&gt;. It represents the root (or intermediate) of your PKI trust chain.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;What it does&lt;/STRONG&gt;: Allows SAS Viya's internal services (pods) to &lt;STRONG&gt;trust&lt;/STRONG&gt; the Ingress certificate. Without this, internal pod-to-pod or pod-to-ingress communication will fail with &lt;CODE&gt;x509: certificate signed by unknown authority&lt;/CODE&gt; errors.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;When required&lt;/STRONG&gt;: Needed when the CA that signed the Ingress certificate is &lt;STRONG&gt;not&lt;/STRONG&gt; in the Mozilla trusted CA bundle (i.e., it's a private/corporate CA, not a public one like DigiCert or Let's Encrypt).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;How it's provided&lt;/STRONG&gt;: Via &lt;CODE&gt;customer-provided-ca-certificates.yaml&lt;/CODE&gt; — you place PEM-encoded CA cert files under &lt;CODE&gt;site-config/security/cacerts/&lt;/CODE&gt; and reference them in that YAML.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;What it updates&lt;/STRONG&gt;: SAS Viya's internal &lt;STRONG&gt;trust stores&lt;/STRONG&gt; across all pods (managed by the &lt;CODE&gt;sas-certframe&lt;/CODE&gt; init container).&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; If your Ingress cert is signed by a &lt;STRONG&gt;well-known public CA&lt;/STRONG&gt; (e.g., Let's Encrypt, DigiCert), you may not need this file since those CAs are already in the Mozilla bundle included in SAS Viya's default trust store.&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;H3&gt;4. &lt;span class="lia-unicode-emoji" title=":card_file_box:"&gt;🗃&lt;/span&gt;️ &lt;CODE&gt;trustedcerts.pem&lt;/CODE&gt; — The Aggregated Trust Store&lt;/H3&gt;
&lt;P&gt;This is SAS Viya's &lt;STRONG&gt;compiled/aggregated trust store file&lt;/STRONG&gt; — a single PEM file that concatenates &lt;STRONG&gt;all trusted CA certificates&lt;/STRONG&gt; that SAS services use to verify TLS connections.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;What it does&lt;/STRONG&gt;: Acts as the unified CA bundle for all SAS Viya internal services. When a SAS service (e.g., CAS, SAS Logon) makes an outbound TLS connection, it validates the peer's certificate against this file.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Where it lives&lt;/STRONG&gt;: Inside running containers at:
&lt;PRE&gt;&lt;CODE&gt;/opt/sas/viya/config/etc/SASSecurityCertificateFramework/cacerts/trustedcerts.pem
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;What it contains&lt;/STRONG&gt;: Mozilla public CA certs + the Ingress CA chain + the SAS internal CA + any additional customer-provided CA certs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Managed by&lt;/STRONG&gt;: The &lt;CODE&gt;sas-certframe&lt;/CODE&gt; init container, which builds this file automatically at pod startup by merging all the CA sources.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;For the official SAS documentation on this, the SAS Help Center has a comprehensive guide: &lt;A class="fui-Link ___w5et180 f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv f1mo0ibp fjoy568 ff5ikls f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a" tabindex="0" href="https://go.documentation.sas.com/doc/en/sasadmincdc/v_056/calencryptmotion/n1xdqv1sezyrahn17erzcunxwix9.htm" rel="noopener noreferrer" data-tabster="{&amp;quot;restorer&amp;quot;:{&amp;quot;type&amp;quot;:1}}" target="_blank"&gt;Configure Network Security and Encryption&lt;/A&gt;.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 08 Apr 2026 21:49:23 GMT</pubDate>
    <dc:creator>angian</dc:creator>
    <dc:date>2026-04-08T21:49:23Z</dc:date>
    <item>
      <title>Understanding the difference between TLS certificates in Viya</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Understanding-the-difference-between-TLS-certificates-in-Viya/m-p/983630#M30687</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;While working on configuration of SAS Viya4 for using customer provided ca certificates, I came across these terms.&lt;BR /&gt;trustedcerts.pem, sas-ingress-certificate.pem, sas-ingress.key and sas-ingress-CA-certificate.pem.&lt;BR /&gt;Wondering if some one can help me understand these terms?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 17:35:31 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Understanding-the-difference-between-TLS-certificates-in-Viya/m-p/983630#M30687</guid>
      <dc:creator>thesasuser</dc:creator>
      <dc:date>2026-02-17T17:35:31Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding the difference between TLS certificates in Viya</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Understanding-the-difference-between-TLS-certificates-in-Viya/m-p/986135#M30773</link>
      <description>&lt;DIV&gt;
&lt;H3&gt;1. &lt;span class="lia-unicode-emoji" title=":old_key:"&gt;🗝&lt;/span&gt;️ &lt;CODE&gt;sas-ingress.key&lt;/CODE&gt; — The Private Key&lt;/H3&gt;
&lt;P&gt;This is the &lt;STRONG&gt;private key&lt;/STRONG&gt; for the Ingress Controller (typically NGINX). It is the secret half of the public/private key pair used in TLS handshakes.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;What it does&lt;/STRONG&gt;: Used by the Ingress Controller to decrypt incoming HTTPS traffic from browsers/clients.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Where it lives&lt;/STRONG&gt;: Stored inside a Kubernetes secret called &lt;CODE&gt;sas-ingress-certificate&lt;/CODE&gt; (alongside the signed certificate).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;How it's specified&lt;/STRONG&gt;: In &lt;CODE&gt;customer-provided-ingress-certificate.yaml&lt;/CODE&gt; as &lt;CODE&gt;tls.key&lt;/CODE&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Important&lt;/STRONG&gt;: Never expose this file. It must match the public certificate (&lt;CODE&gt;sas-ingress-certificate.pem&lt;/CODE&gt;).&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;
&lt;H3&gt;2. &lt;span class="lia-unicode-emoji" title=":page_facing_up:"&gt;📄&lt;/span&gt; &lt;CODE&gt;sas-ingress-certificate.pem&lt;/CODE&gt; — The Signed Server Identity Certificate&lt;/H3&gt;
&lt;P&gt;This is the &lt;STRONG&gt;public TLS certificate&lt;/STRONG&gt; for the Ingress Controller — the certificate presented to browsers and clients when they connect to SAS Viya over HTTPS.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;What it does&lt;/STRONG&gt;: Proves the identity of your SAS Viya server to external clients (browsers, APIs, etc.).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Signed by&lt;/STRONG&gt;: Your organization's CA (the one referenced in &lt;CODE&gt;sas-ingress-CA-certificate.pem&lt;/CODE&gt;).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Where it lives&lt;/STRONG&gt;: Also stored in the Kubernetes secret &lt;CODE&gt;sas-ingress-certificate&lt;/CODE&gt;, specified as &lt;CODE&gt;tls.crt&lt;/CODE&gt; in &lt;CODE&gt;customer-provided-ingress-certificate.yaml&lt;/CODE&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Requirement&lt;/STRONG&gt;: Must be a wildcard or contain a SAN matching your Ingress FQDN.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;
&lt;H3&gt;3. &lt;span class="lia-unicode-emoji" title=":classical_building:"&gt;🏛&lt;/span&gt;️ &lt;CODE&gt;sas-ingress-CA-certificate.pem&lt;/CODE&gt; — The CA Certificate (Trust Anchor)&lt;/H3&gt;
&lt;P&gt;This is the &lt;STRONG&gt;Certificate Authority (CA) certificate&lt;/STRONG&gt; that &lt;STRONG&gt;signed&lt;/STRONG&gt; &lt;CODE&gt;sas-ingress-certificate.pem&lt;/CODE&gt;. It represents the root (or intermediate) of your PKI trust chain.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;What it does&lt;/STRONG&gt;: Allows SAS Viya's internal services (pods) to &lt;STRONG&gt;trust&lt;/STRONG&gt; the Ingress certificate. Without this, internal pod-to-pod or pod-to-ingress communication will fail with &lt;CODE&gt;x509: certificate signed by unknown authority&lt;/CODE&gt; errors.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;When required&lt;/STRONG&gt;: Needed when the CA that signed the Ingress certificate is &lt;STRONG&gt;not&lt;/STRONG&gt; in the Mozilla trusted CA bundle (i.e., it's a private/corporate CA, not a public one like DigiCert or Let's Encrypt).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;How it's provided&lt;/STRONG&gt;: Via &lt;CODE&gt;customer-provided-ca-certificates.yaml&lt;/CODE&gt; — you place PEM-encoded CA cert files under &lt;CODE&gt;site-config/security/cacerts/&lt;/CODE&gt; and reference them in that YAML.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;What it updates&lt;/STRONG&gt;: SAS Viya's internal &lt;STRONG&gt;trust stores&lt;/STRONG&gt; across all pods (managed by the &lt;CODE&gt;sas-certframe&lt;/CODE&gt; init container).&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; If your Ingress cert is signed by a &lt;STRONG&gt;well-known public CA&lt;/STRONG&gt; (e.g., Let's Encrypt, DigiCert), you may not need this file since those CAs are already in the Mozilla bundle included in SAS Viya's default trust store.&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;H3&gt;4. &lt;span class="lia-unicode-emoji" title=":card_file_box:"&gt;🗃&lt;/span&gt;️ &lt;CODE&gt;trustedcerts.pem&lt;/CODE&gt; — The Aggregated Trust Store&lt;/H3&gt;
&lt;P&gt;This is SAS Viya's &lt;STRONG&gt;compiled/aggregated trust store file&lt;/STRONG&gt; — a single PEM file that concatenates &lt;STRONG&gt;all trusted CA certificates&lt;/STRONG&gt; that SAS services use to verify TLS connections.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;What it does&lt;/STRONG&gt;: Acts as the unified CA bundle for all SAS Viya internal services. When a SAS service (e.g., CAS, SAS Logon) makes an outbound TLS connection, it validates the peer's certificate against this file.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Where it lives&lt;/STRONG&gt;: Inside running containers at:
&lt;PRE&gt;&lt;CODE&gt;/opt/sas/viya/config/etc/SASSecurityCertificateFramework/cacerts/trustedcerts.pem
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;What it contains&lt;/STRONG&gt;: Mozilla public CA certs + the Ingress CA chain + the SAS internal CA + any additional customer-provided CA certs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Managed by&lt;/STRONG&gt;: The &lt;CODE&gt;sas-certframe&lt;/CODE&gt; init container, which builds this file automatically at pod startup by merging all the CA sources.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;For the official SAS documentation on this, the SAS Help Center has a comprehensive guide: &lt;A class="fui-Link ___w5et180 f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv f1mo0ibp fjoy568 ff5ikls f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a" tabindex="0" href="https://go.documentation.sas.com/doc/en/sasadmincdc/v_056/calencryptmotion/n1xdqv1sezyrahn17erzcunxwix9.htm" rel="noopener noreferrer" data-tabster="{&amp;quot;restorer&amp;quot;:{&amp;quot;type&amp;quot;:1}}" target="_blank"&gt;Configure Network Security and Encryption&lt;/A&gt;.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 08 Apr 2026 21:49:23 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Understanding-the-difference-between-TLS-certificates-in-Viya/m-p/986135#M30773</guid>
      <dc:creator>angian</dc:creator>
      <dc:date>2026-04-08T21:49:23Z</dc:date>
    </item>
  </channel>
</rss>

