You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docsource/content.md
+1-17Lines changed: 1 addition & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -229,22 +229,6 @@ For example, ClusterIssuer resources can be used to issue certificates for resou
229
229
kubectl apply -f clusterissuer.yaml
230
230
```
231
231
232
-
>**Overriding the `spec` using Kubernetes Annotations on CertificateRequest Resources**
233
-
>
234
-
> The
235
-
>
236
-
><details><summary>Notes</summary>
237
-
> The GoDaddy AnyCA Gateway REST plugin requires several custom enrollment parameters that are passed to GoDaddy upon the submission of a new PFX/CSR enrollment request. These custom enrollment parameters configure the domain/organization/extended validation procedure required to complete the certificate enrollment.
238
-
>
239
-
> Prior to Command v12.3, custom enrollment parameters are not supported on a per-request basis forPFX/CSR Enrollment. If your Keyfactor Command version is less than v12.3, the only way to configure custom enrollment parameters is to set default parameter values on the Certificate Templatein the Keyfactor AnyCA Gateway REST.
240
-
>
241
-
> Before continuing with installation prior to Command 12.3, users should consider the following:
242
-
>
243
-
>* Each combination of custom enrollment parameters will require the creation of a new Certificate Template and Certificate Profile in the Keyfactor AnyCA Gateway REST.
244
-
>* If you have multiple combinations of custom enrollment parameters, consider the operational complexity of managing multiple Certificate Templates and Certificate Profiles.
245
-
>* If your certificate workflows mostly consist of certificate renewal, re-issuance, and revocation, the GoDaddy AnyCA Gateway REST plugin is fully supported.
246
-
></details>
247
-
248
232
# Creating a Certificate
249
233
250
234
Once an Issuer or ClusterIssuer resource is created, they can be used to issue certificates using cert-manager. The two most important concepts are `Certificate` and `CertificateRequest` resources.
@@ -341,7 +325,7 @@ Keyfactor Command allows users to [attach custom metadata to certificates](https
341
325
342
326
- **Pre-defined Certificate Metadata**
343
327
344
-
If **all of the following metadata fields are defined** in Command, Command Issuer will populate the fields upon certificate enrollment. All of the metadata fields are String types. Please refer to the [Command docs](https://software.keyfactor.com/Core/Current/Content/ReferenceGuide/Certificate%20Metadata.htm) to define these metadata fields in Command.
328
+
If **all of the following metadata fields are defined** in Command, Command Issuer will populate the fields upon certificate enrollment. All of the metadata fields are String types. Please refer to the [Command docs](https://software.keyfactor.com/Core/Current/Content/ReferenceGuide/Certificate%20Metadata.htm) to define these metadata fields in Command if you would like Command Issuer to populate these fields on certificates upon enrollment.
0 commit comments