# Custom Receptor CA The control nodes on the K8S cluster will communicate with execution nodes via mutual TLS TCP connections, running via Receptor. Execution nodes will verify incoming connections by ensuring the x509 certificate was issued by a trusted Certificate Authority (CA). A user may wish to provide their own CA for this validation. If no CA is provided, AWX Operator will automatically generate one using OpenSSL. Given custom `ca.crt` and `ca.key` stored locally, run the following, ```bash kubectl create secret tls awx-demo-receptor-ca \ --cert=/path/to/ca.crt --key=/path/to/ca.key ``` The secret should be named `{AWX Custom Resource name}-receptor-ca`. In the above the AWX CR name is "awx-demo". Please replace "awx-demo" with your AWX Custom Resource name. If this secret is created after AWX is deployed, run the following to restart the deployment, ```bash kubectl rollout restart deployment awx-demo ``` !!! warning Changing the receptor CA will break connections to any existing execution nodes. These nodes will enter an `unavailable` state, and jobs will not be able to run on them. Users will need to download and re-run the install bundle for each execution node. This will replace the TLS certificate files with those signed by the new CA. The execution nodes should then appear in a `ready` state after a few minutes.