ServiceFabric standalone Windows cluster, x509 certificate

Gennart, Tony 46 Reputation points
2025-05-14T12:10:04.6+00:00

Hello,

I have a serviceFabric cluster on-premise using security ClusterConfig.X509.MultiMachine via internal certificate PKI. Current issuer on PKI will expire and i must change my config to refer the new issuer.

The question is: In this section "ClusterCertificateIssuerStores" only 2 issuer are allowed. For now i have my intermediate issuer and root issuer. Is it mandatory to have intermediate + root issuer? Is it enough to only reference Root issuer without intermediate or the complete path of issuer must me present in configuration?

e.g:

User's image

In fact, I have to replace intemediate CA 1 by the new but if root is enough probably nothing to do...

related doc: https://learn.microsoft.com/en-us/azure/service-fabric/service-fabric-windows-cluster-x509-security

Thanks in advance.

Tony

Azure Service Fabric
Azure Service Fabric
An Azure service that is used to develop microservices and orchestrate containers on Windows and Linux.
{count} votes

Accepted answer
  1. Durga Reshma Malthi 9,840 Reputation points Microsoft External Staff Moderator
    2025-05-15T09:48:39.4266667+00:00

    Hi Gennart, Tony

    Yes, you can specify both the intermediate and the root CA. If your cluster explicitly requires the intermediate issuer, you must update it when replacing the old intermediate CA. If your cluster can validate certificates using only the root issuer, then no changes may be needed.

    In your case, since you're replacing the intermediate CA, you need to replace the old intermediate CA with the new intermediate CA and keep the root CA if it remains unchanged.

    "ClusterCertificateIssuerStores": [
      {
        "IssuerCommonName": "Issuer Root CA",
        "X509StoreNames": "Root CA"
      },
      {
        "IssuerCommonName": "Issuer Int CA 2",  // new intermediate CA
        "X509StoreNames": "Issuing CA 2"
      }
    ]
    

    After updating, please restart the Service Fabric cluster and validate that all services are working correctly with the new certificate paths.

    Hope this helps!

    Please Let me know if you have any queries.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.