You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+60-3Lines changed: 60 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ The high level steps required to configure the Azure Keyvault Orchestrator exten
70
70
71
71
1)[Configure the Azure Keyvault for client access](#configure-the-azure-keyvault-for-client-access)
72
72
73
-
1)[Create the Store Type in Keyfactor](#create-the-akv-certificate-store-type)
73
+
1)[Create the Store Type in Keyfactor](#akv-certificate-store-type)
74
74
75
75
1)[Install the Extension on the Orchestrator](#installation)
76
76
@@ -544,7 +544,7 @@ To use the Azure Key Vault Universal Orchestrator extension, you **must** create
544
544
545
545
546
546
The Azure Keyvault Certificate Store Type is designed to integrate with Microsoft Azure Key Vault, enabling users to
547
-
manage and automate the lifecycle of cryptographic certificates stored in Azure Key Vault through Keyfactor Command.
547
+
manage and automate the lifecycle of cryptographic certificates stored in Azure Keyvault through Keyfactor Command.
548
548
This Certificate Store Type represents the connection and configuration necessary to interact with specific instances of
549
549
Azure Key Vault, allowing for operations such as inventory, addition, removal, and discovery of certificates and
550
550
certificate stores.
@@ -565,6 +565,11 @@ However, ensuring that the orchestrator has network access to Azure endpoints is
565
565
mindful of these caveats and limitations will help ensure successful deployment and use of the Azure Keyvault
566
566
Certificate Store Type within your organization’s security framework.
567
567
568
+
> :warning:
569
+
> The alias you provide when enrolling a certificate will be used as the certificate name in Azure Keyvault.
570
+
> Consequently; [it must _only_ contain alphanumeric characters and hyphens](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/resource-name-rules#microsoftkeyvault).
571
+
> If you encounter the error "The request URI contains an invalid name" when attempting to perform an enrollment, it is likely due to the use of disallowed characters in the alias.
572
+
568
573
569
574
570
575
@@ -633,7 +638,7 @@ the Keyfactor Command Portal
633
638
##### Advanced Tab
634
639
| Attribute | Value | Description |
635
640
| --------- | ----- | ----- |
636
-
| Supports Custom Alias |Optional| Determines if an individual entry within a store can have a custom Alias. |
641
+
| Supports Custom Alias |Required| Determines if an individual entry within a store can have a custom Alias. |
637
642
| Private Key Handling | Optional | This determines if Keyfactor can send the private key associated with a certificate to the store. Required because IIS certificates without private keys would be invalid. |
638
643
| PFX Password Style | Default | 'Default' - PFX password is randomly generated, 'Custom' - PFX password may be specified when the enrollment job is created (Requires the Allow Custom Password application setting to be enabled.) |
If desired, tags can be applied to the KeyVault entries. Provide them as a JSON string of key-value pairs ie: '{'tag-name': 'tag-content', 'other-tag-name': 'other-tag-content'}'
If true, this will perform a union of any tags provided with enrollment with the tags on the existing cert with the same alias and apply the result to the new certificate.
Copy file name to clipboardExpand all lines: docsource/akv.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
## Overview
2
2
3
3
The Azure Keyvault Certificate Store Type is designed to integrate with Microsoft Azure Key Vault, enabling users to
4
-
manage and automate the lifecycle of cryptographic certificates stored in Azure Key Vault through Keyfactor Command.
4
+
manage and automate the lifecycle of cryptographic certificates stored in Azure Keyvault through Keyfactor Command.
5
5
This Certificate Store Type represents the connection and configuration necessary to interact with specific instances of
6
6
Azure Key Vault, allowing for operations such as inventory, addition, removal, and discovery of certificates and
7
7
certificate stores.
@@ -22,3 +22,8 @@ However, ensuring that the orchestrator has network access to Azure endpoints is
22
22
mindful of these caveats and limitations will help ensure successful deployment and use of the Azure Keyvault
23
23
Certificate Store Type within your organization’s security framework.
24
24
25
+
> :warning:
26
+
> The alias you provide when enrolling a certificate will be used as the certificate name in Azure Keyvault.
27
+
> Consequently; [it must _only_ contain alphanumeric characters and hyphens](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/resource-name-rules#microsoftkeyvault).
28
+
> If you encounter the error "The request URI contains an invalid name" when attempting to perform an enrollment, it is likely due to the use of disallowed characters in the alias.
0 commit comments