Hi there,
I’m setting up OpenZiti with BrowZer following the quickstart guide (BrowZer | OpenZiti), which recommends using a wildcard Let’s Encrypt certificate for the controller and BrowZer bootstrapper (e.g., *.example.com for controller.example.com and browzer.example.com, edge-router.example.com). I have two main questions about this approach:
Is a wildcard certificate truly necessary?
Can I instead use separate Let’s Encrypt certificates for the controller and bootstrapper (e.g., one for controller.example.com and another for browzer.example.com)? Alternatively, would a single certificate with Subject Alternative Names (SANs) listing both subdomains work?
Are there specific requirements in the BrowZer architecture that make a wildcard certificate the only viable option, or is it recommended purely for convenience?
How safe is it to use the same wildcard certificate for both components?
I’m concerned about the security implications of sharing a single wildcard certificate (and its private key) across the controller and bootstrapper, especially if they’re on different servers. It feels risky to have one private key that could potentially affect all subdomains if compromised.
Are requests from the browzer bootstrapper only verified using the Let's Encrypt certs or are the Let's Encrypt also signed by the Ziti CA? In other words, if someone would gain access to the Let's Encrypt private key, would the whole Ziti Infrastructure be compromised?
Thanks
Dominik