You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docsource/hcvkvjks.md
+32-3Lines changed: 32 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,10 +8,34 @@ The inventory job will catalog the certificates contained within the store. Add
8
8
9
9
### Secret naming
10
10
11
-
In ordered to be managed by this orchestrator extension, a certificate store is comprised of two secret entries:
11
+
In order to be managed by this orchestrator extension, a certificate store is comprised of two secret entries:
12
12
- The certificate with the naming convention `<certificate name>_jks`
13
13
- A secret containing the store passphrase located on the same level. This should be named `passphrase`
14
14
15
+
This is the convention followed by the certificate store if the full path to the secret is not provided, and no passphrase path is provided.
16
+
17
+
18
+
**As of version 3.2+ of this integration, any secret name can be used, and the passphrase path can be anywhere within an accessable area of the KeyValue secrets engine.**
19
+
20
+
Additionally, we can read the certificate store and/or passphrase secret from a JSON secret that contains the value on a specific property.
21
+
The way to indicate the property name that should be used to retreive the value of the certificate store or passphrase, add a "?" at the end of the path, followed by the property name.
> This path indicates that the secret containing the certificate store data is named "myjkscertstore" and is a JSON secret with the `certData` property containing the Base64 encoded certificate store.
27
+
>
28
+
29
+
StorePath = `kv-v2/mycerts/myjkscertstore`
30
+
> This path indicates that the entire secret value is the base64 encoded certificate store
31
+
32
+
> Generally, the paths to the certificate store data and passphrase should be in the following format
This convention applies to both the Store Path and Passphrase Path.
37
+
38
+
15
39
### Base64 encoding
16
40
17
41
Certificates should be stored in a base64 encoded format.
@@ -46,6 +70,7 @@ Here are the steps for manually creating the store type in Keyfactor Command.
46
70
- Click the "Custom Fields" tab to add the following custom fields:
47
71
-**MountPoint** - Type: *string*
48
72
-**IncludeCertChain** - Type: *bool* (If true, the available intermediate certificates will also be written to Vault during enrollment)
73
+
-**PassphrasePath** - Type: *string* (If the passphrase is in a location other than in a secret named 'passphrase' at the same level as the cert store, provide the path here)
@@ -65,10 +90,11 @@ In Keyfactor Command create a new Certificate Store that resembles the one below
65
90
66
91
-**Client Machine** - Enter an identifier for the client machine. This could be the Orchestrator host name, or anything else useful. This value is not used by the extension.
67
92
-**Store Path** - This is the path after mount point where the certs will be stored.
68
-
- example: `kv-v2\kf-secrets\mystore_jks`would use the path "\kf-secrets"
93
+
- example: `kv-v2\kf-secrets\mystore_jks`
69
94
-**Mount Point** - This is the mount point name for the instance of the Key Value secrets engine.
70
95
- If left blank, will default to "kv-v2".
71
96
- If your organization utilizes Vault enterprise namespaces, you should include the namespace here.
97
+
-**Passphrase Path** - The path to the secret (and optional JSON property) where the certificate store passphrase is located.
72
98
73
99
#### Set the server username and password
74
100
@@ -84,7 +110,10 @@ The certificate store entry is returned from a discovery job when..
84
110
1. There is an entry named `passphrase` that contains the password for the store on the same level.
85
111
1. The entry for the certificate contain the base64 encoded certificate file.
86
112
87
-
**Note**: Key/Value secrets that do not include the expected keys or names do not end with "_p12" will be ignored during inventory scans.
113
+
> :warning:
114
+
> While any secret and passphrase location can be used, the discovery job can only discover certificate stores that follow the default convention.
115
+
> If you store your certificate stores and passphrases with another convention, the discovery job will not work in that case.
116
+
88
117
89
118
Set the following fields to configure a discovery job for JKS Certificate Stores:
90
119
-**Client Machine** - any string; it is unused by the Discovery job
Copy file name to clipboardExpand all lines: docsource/hcvkvp12.md
+30-3Lines changed: 30 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,29 @@ In ordered to be managed by this orchestrator extension, a certificate store is
12
12
- The certificate with the naming convention `<certificate name>_p12`
13
13
- A secret containing the store passphrase located on the same level. This should be named `passphrase`
14
14
15
+
This is the convention followed by the certificate store if the full path to the secret is not provided, and no passphrase path is provided.
16
+
17
+
18
+
**As of version 3.2+ of this integration, any secret name can be used, and the passphrase path can be anywhere within an accessable area of the KeyValue secrets engine.**
19
+
20
+
Additionally, we can read the certificate store and/or passphrase secret from a JSON secret that contains the value on a specific property.
21
+
The way to indicate the property name that should be used to retreive the value of the certificate store or passphrase, add a "?" at the end of the path, followed by the property name.
> This path indicates that the secret containing the certificate store data is named "myjkscertstore" and is a JSON secret with the `certData` property containing the Base64 encoded certificate store.
27
+
>
28
+
29
+
StorePath = `kv-v2/mycerts/myjkscertstore`
30
+
> This path indicates that the entire secret value is the base64 encoded certificate store
31
+
32
+
> Generally, the paths to the certificate store data and passphrase should be in the following format
> if namespaces are not used, that section can be omitted.
35
+
36
+
This convention applies to both the Store Path and Passphrase Path.
37
+
15
38
### Base64 encoding
16
39
17
40
Certificates should be stored in a base64 encoded format.
@@ -46,6 +69,7 @@ Here are the steps for manually creating the store type in Keyfactor Command.
46
69
- Click the "Custom Fields" tab to add the following custom fields:
47
70
-**MountPoint** - Type: *string*
48
71
-**IncludeCertChain** - Type: *bool* (If true, the available intermediate certificates will also be written to Vault during enrollment)
72
+
-**PassphrasePath** - Type: *string* (If the passphrase is in a location other than in a secret named 'passphrase' at the same level as the cert store, provide the path here)
@@ -65,11 +89,11 @@ Create a new Certificate Store that resembles the one below:
65
89
66
90
-**Client Machine** - Enter an identifier for the client machine. This could be the Orchestrator host name, or anything else useful. This value is not used by the extension.
67
91
-**Store Path** - This is the path after mount point where the certs will be stored.
68
-
- example: `kv-v2\kf-secrets\mystore_p12` would use the path "\kf-secrets"
92
+
- example: `kv-v2\kf-secrets\mystore_p12`
69
93
-**Mount Point** - This is the mount point name for the instance of the Key Value secrets engine.
70
94
- If left blank, will default to "kv-v2".
71
95
- If your organization utilizes Vault enterprise namespaces, you should include the namespace here.
72
-
96
+
-**Passphrase Path** - The path to the secret (and optional JSON property) where the certificate store passphrase is located.
73
97
#### Set the server username and password
74
98
75
99
-**SERVER USERNAME** should be the full URL to the instance of Vault that will be accessible by the orchestrator. (example: `http://127.0.0.1:8200`)
@@ -86,7 +110,10 @@ The certificate store entry is returned from a discovery job when..
86
110
1. There is an entry named `passphrase` that contains the password for the store on the same level.
87
111
1. The entry for the certificate contain the base64 encoded certificate file.
88
112
89
-
**Note**: Key/Value secrets that do not include the expected keys or names do not end with "_p12" will be ignored during inventory scans.
113
+
> :warning:
114
+
> While any secret and passphrase location can be used, the discovery job can only discover certificate stores that follow the default convention.
115
+
> If you store your certificate stores and passphrases with another convention, the discovery job will not work in that case.
116
+
90
117
91
118
Set the following fields to configure a discovery job for PKCS12 Certificate Stores:
92
119
-**Client Machine** - any string; it is unused by the Discovery job
Copy file name to clipboardExpand all lines: docsource/hcvkvpfx.md
+28-2Lines changed: 28 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,28 @@ In ordered to be managed by this orchestrator extension, a certificate store is
12
12
- The certificate with the naming convention `<certificate name>_pfx`
13
13
- A secret containing the store passphrase located on the same level. This should be named `passphrase`
14
14
15
+
This is the convention followed by the certificate store if the full path to the secret is not provided, and no passphrase path is provided.
16
+
17
+
**As of version 3.2+ of this integration, any secret name can be used, and the passphrase path can be anywhere within an accessable area of the KeyValue secrets engine.**
18
+
19
+
Additionally, we can read the certificate store and/or passphrase secret from a JSON secret that contains the value on a specific property.
20
+
The way to indicate the property name that should be used to retreive the value of the certificate store or passphrase, add a "?" at the end of the path, followed by the property name.
> This path indicates that the secret containing the certificate store data is named "myjkscertstore" and is a JSON secret with the `certData` property containing the Base64 encoded certificate store.
26
+
>
27
+
28
+
StorePath = `kv-v2/mycerts/myjkscertstore`
29
+
> This path indicates that the entire secret value is the base64 encoded certificate store
30
+
31
+
> Generally, the paths to the certificate store data and passphrase should be in the following format
> if namespaces are not used, that section can be omitted.
34
+
35
+
This convention applies to both the Store Path and Passphrase Path.
36
+
15
37
### Base64 encoding
16
38
17
39
Certificates should be stored in a base64 encoded format.
@@ -46,6 +68,7 @@ Here are the steps for manually creating the store type in Keyfactor Command.
46
68
- Click the "Custom Fields" tab to add the following custom fields:
47
69
-**MountPoint** - Type: *string*
48
70
-**IncludeCertChain** - Type: *bool* (If true, the available intermediate certificates will also be written to Vault during enrollment)
71
+
-**PassphrasePath** - Type: *string* (If the passphrase is in a location other than in a secret named 'passphrase' at the same level as the cert store, provide the path here)
@@ -65,10 +88,11 @@ Create a new Certificate Store that resembles the one below:
65
88
66
89
-**Client Machine** - Enter an identifier for the client machine. This could be the Orchestrator host name, or anything else useful. This value is not used by the extension.
67
90
-**Store Path** - This is the path to the secret containing the store.
68
-
- example: `kv-v2\kf-secrets\mystore_pfx` would use the path "\kf-secrets"
91
+
- example: `kv-v2\kf-secrets\mystore_pfx`
69
92
-**Mount Point** - This is the mount point name for the instance of the Key Value secrets engine.
70
93
- If left blank, will default to "kv-v2".
71
94
- If your organization utilizes Vault enterprise namespaces, you should include the namespace here.
95
+
-**Passphrase Path** - The path to the secret (and optional JSON property) where the certificate store passphrase is located.
72
96
73
97
#### Set the server username and password
74
98
@@ -86,7 +110,9 @@ The certificate store entry is returned from a discovery job when..
86
110
1. There is an entry named `passphrase` that contains the password for the store on the same level.
87
111
1. The entry for the certificate contain the base64 encoded certificate file.
88
112
89
-
**Note**: Key/Value secrets that do not include the expected keys or names do not end with "_pfx" will be ignored during inventory scans.
113
+
> :warning:
114
+
> While any secret and passphrase location can be used, the discovery job can only discover certificate stores that follow the default convention.
115
+
> If you store your certificate stores and passphrases with another convention, the discovery job will not work in that case.
90
116
91
117
Set the following fields to configure a discovery job for PFX Certificate Stores:
92
118
-**Client Machine** - any string; it is unused by the Discovery job
Copy file name to clipboardExpand all lines: integration-manifest.json
+9-3Lines changed: 9 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -66,6 +66,15 @@
66
66
"DependsOn": "",
67
67
"DefaultValue": "",
68
68
"Required": true
69
+
},
70
+
{
71
+
"Name": "PassphrasePath",
72
+
"DisplayName": "Passphrase Path",
73
+
"Type": "String",
74
+
"DependsOn": "",
75
+
"DefaultValue": "",
76
+
"Required": false,
77
+
"Description": "This is the path to the secret that contains the passphrase to the cert store file. If empty or omitted, assume the secret is named 'passphrase' on the same level as the certificate store secret."
69
78
}
70
79
],
71
80
"EntryParameters": [],
@@ -227,7 +236,6 @@
227
236
"DependsOn": "",
228
237
"DefaultValue": "",
229
238
"Required": false,
230
-
"IsPAMEligible": true,
231
239
"Description": "This is the path to the secret that contains the passphrase to the cert store file. If empty or omitted, assume the secret is named 'passphrase' on the same level as the certificate store secret."
232
240
}
233
241
],
@@ -310,7 +318,6 @@
310
318
"DependsOn": "",
311
319
"DefaultValue": "",
312
320
"Required": false,
313
-
"IsPAMEligible": true,
314
321
"Description": "This is the path to the secret that contains the passphrase to the cert store file. If empty or omitted, assume the secret is named 'passphrase' on the same level as the certificate store secret."
315
322
}
316
323
],
@@ -393,7 +400,6 @@
393
400
"DependsOn": "",
394
401
"DefaultValue": "",
395
402
"Required": false,
396
-
"IsPAMEligible": true,
397
403
"Description": "This is the path to the secret that contains the passphrase to the cert store file. If empty or omitted, assume the secret is named 'passphrase' on the same level as the certificate store secret."
0 commit comments