Overview
Xloud platform services communicate over encrypted channels by default. TLS protects API endpoints, inter-service traffic, database connections, and message queue channels. This page covers certificate provisioning, TLS configuration at both the internal and external layers, HAProxy termination, and endpoint hardening for production deployments.Prerequisites
- XDeploy access with administrator privileges
- SSL/TLS certificates (CA-signed, self-signed, or Let’s Encrypt)
- Access to the XDeploy configuration interface or
/etc/xavs/globals.d/on the bootstrap node
TLS Architecture
Xloud separates TLS configuration into three independent scopes:| Scope | Description | Applies To |
|---|---|---|
| External TLS | Traffic between clients and the platform API / Dashboard | Public-facing endpoints, HAProxy VIP |
| Internal TLS | Service-to-service traffic within the cluster | API ↔ database, API ↔ message queue, service ↔ service |
| Backend TLS | HAProxy to upstream service connections | HAProxy → Keystone, Nova API, Neutron, etc. |
TLS Configuration
- XDeploy
- CLI
Enable TLS Scopes
Locate the Security section and enable each TLS scope appropriate for your deployment:
| Setting | Recommended Value | Description |
|---|---|---|
| Enable External TLS | Yes | Encrypts client-to-HAProxy traffic |
| Enable Internal TLS | Yes | Encrypts service-to-service traffic |
| Enable Backend TLS | Yes | Encrypts HAProxy-to-service traffic |
Configure Certificate Source
Select the certificate source for external TLS:
- Self-signed: Xloud generates certificates automatically using the internal CA
- CA-signed: Upload your organization’s certificate and private key
- Let’s Encrypt: Provide a domain name and contact email for automatic provisioning
Certificate Management
Self-Signed Certificates
Xloud uses an internal CA to generate self-signed certificates for all services. The CA certificate must be distributed to all clients that communicate with the platform.Export internal CA certificate
CA-Signed Certificates
Submit CSR to your CA
Submit
haproxy.csr to your certificate authority. The CA returns a signed certificate (haproxy.crt) and the CA chain (ca-chain.crt).Certificate Renewal
Check certificate expiration
HAProxy TLS Termination
HAProxy terminates external TLS at the VIP and forwards requests to upstream services. The configuration supports both TLS termination (backend plain) and TLS pass-through (backend TLS).| Mode | Description | Use Case |
|---|---|---|
| Termination | HAProxy decrypts; backend receives plain HTTP | Default — simplifies backend config |
| Re-encryption | HAProxy decrypts; re-encrypts to backend | Maximum security; backend TLS required |
| Pass-through | HAProxy forwards encrypted bytes unchanged | End-to-end mTLS for specific services |
kolla_enable_tls_backend: "yes" is set.
Service Endpoint Hardening
Disable unused API versions
Disable unused API versions
Restrict API endpoints to the minimum required versions. For Xloud Compute, disable legacy v2.0 and enforce v2.1:
/etc/xavs/globals.d/_60_endpoint_hardening.yml
Restrict cipher suites
Restrict cipher suites
Enforce modern cipher suites and disable weak protocols. Add to the HAProxy global configuration:This disables TLS 1.0, TLS 1.1, and all weak cipher suites including RC4, 3DES, and export ciphers.
Cipher suite hardening
Enable HSTS headers
Enable HSTS headers
For Dashboard (Horizon) endpoints, enable HTTP Strict Transport Security to prevent protocol downgrade attacks:
HSTS configuration
Configure Keystone token expiry
Configure Keystone token expiry
Reduce the default token lifetime to limit the window of exposure for compromised tokens:The default token lifetime is 3600 seconds (1 hour). Reduce to 1800 for sensitive environments.
Token expiry configuration
Validation
Verify TLS is active across all platform endpoints:- Dashboard
- CLI
Navigate to the XDeploy Services view. All service health indicators should show green. Click on any service to view its TLS status.
All services show a valid certificate with a matching hostname and a future expiry date.
Next Steps
Hardening Guide
OS-level hardening, SSH configuration, and service minimization to complement TLS
API Security
Token authentication, application credentials, and RBAC enforcement
Compliance
Audit logging, log retention, and compliance framework mapping
Network Security
Security groups, FWaaS, and network segmentation