Certificate-based authentication
Certificate-based authentication allows secure, passwordless access to the REST API and databases.
| Redis Enterprise Software | 
|---|
You can set up certificate-based authentication for specific users to enable secure, passwordless access to the Redis Enterprise Software REST API and databases.
Set up certificate-based authentication
To set up certificate-based authentication:
- 
If you want to enable certificate-based authentication for databases, you must enable mutual TLS for the relevant databases. Otherwise, you can skip this step. 
Add mtls_trusted_ca certificate
To add a trusted CA certificate mtls_trusted_ca to the cluster, use an update cluster certificates request.
For Redis Enterprise Software versions 7.22.2 and later, use:
PUT /v1/cluster/certificates
{
  "certificates": [
    {
      "name": "mtls_trusted_ca",
      "certificate": "<content of certificate PEM file>"
    }
  ]
}
For Redis Enterprise Software versions 7.22.0 and earlier, use:
PUT /v1/cluster/update_cert
{
  "name": "mtls_trusted_ca",
  "certificate": "<content of certificate PEM file>"
}
Configure cluster settings
Update cluster settings with mutual TLS configuration.
For certificate validation by Subject Alternative Name (SAN), use:
PUT /v1/cluster
{
  "mtls_certificate_authentication": true,
  "mtls_client_cert_subject_validation_type": "san_cn",
  "mtls_authorized_subjects": [{
    "CN": "<Common Name>"
  }]
}
For certificate validation by full Subject Name, use:
PUT /v1/cluster
{
  "mtls_certificate_authentication": true,
  "mtls_client_cert_subject_validation_type": "full_subject",
  "mtls_authorized_subjects": [{
    "CN": "<Common Name>",
    "OU": [<array of Organizational Unit strings>],
    "O": "<Organization>",
    "C": "<2-letter country code>",
    "L": "<Locality (city)>",
    "ST": "<State/Province>"
  }]
}
Replace the placeholder values <> with your client certificate's subject values.
Enable mutual TLS for databases
Before you can connect to a database using certificate-based authentication, you must enable mutual TLS (mTLS). See Enable TLS for detailed instructions.
Create certificate auth_method users
When you create new users, include "auth_method": "certificate" and certificate_subject_line in the request body :
POST /v1/users
{
  "auth_method": "certificate",
  "certificate_subject_line": "CN=<Common Name>, OU=<Organization Unit>, O=<Organization>, L=<Locality>, ST=<State/Province>, C=<Country>"
}
Replace the placeholder values <> with your client certificate's subject values.
Authenticate REST API requests
To use the REST API with certificate-based authentication, you must provide a client certificate, signed by the trusted CA mtls_trusted_ca, and a private key.
The following example uses cURL to send a REST API request:
curl --request <METHOD> --url https://<hostname-or-IP-address>:9443/<API-version>/<API-path> --cert client.pem --key client.key
Authenticate database connections
To connect to a database with certificate-based authentication, you must provide a client certificate, signed by the trusted CA mtls_trusted_ca, and a private key.
The following example shows how to connect to a Redis database with redis-cli:
redis-cli -h <hostname-or-IP-address> -p <port> --tls --cacert <redis_cert>.pem --cert redis_user.crt --key redis_user_private.key
Limitations
- Certificate-based authentication is not implemented for the Cluster Manager UI.