You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+96-90Lines changed: 96 additions & 90 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,8 +28,8 @@ certificate authority. After issuance, the certificate is then returned to Hashi
28
28
-[Check the Vault server status](#check-the-vault-server-status)
29
29
-[Install and register the plugin](#install-and-register-the-plugin)
30
30
-[Configure the plugin](#configure-the-plugin)
31
-
-[Using the plugin](#using-the-plugin)
32
31
-[Adding Roles](#adding-roles)
32
+
-[Using the plugin](#using-the-plugin)
33
33
-[Issuing Certificates](#issuing-certificates)
34
34
-[Viewing Certificates](#viewing-certificates)
35
35
-[Command Reference](#plugin-command-reference)
@@ -79,18 +79,18 @@ document.
79
79
80
80
### Keyfactor Requirements
81
81
82
-
- A functional instance of Keyfactor Command
83
-
- An administrative user account to be used for configuring the Keyfactor options needed for the implementation
84
-
- A functional integrated certificate authority to be used for issuing the certificates
85
-
- A certificate template (or templates) defined to use for certificate issuance.
86
-
- A user account with permissions to connect to the Keyfactor API and submit certificate requests. This user account will require READ and ENROLL permissions on the certificate template that you will use for the Vault plugin.
82
+
- A functional instance of Keyfactor Command
83
+
- An administrative user account to be used for configuring the Keyfactor options needed for the implementation
84
+
- A functional integrated certificate authority to be used for issuing the certificates
85
+
- A certificate template (or templates) defined to use for certificate issuance.
86
+
- A user account with permissions to connect to the Keyfactor API and submit certificate requests. This user account will require READ and ENROLL permissions on the certificate template that you will use for the Vault plugin.
87
87
88
88
### Hashicorp Vault Requirements
89
89
90
-
- A functional Hashicorp Vault Installation **version 1.10.xx or greater**.
91
-
- An administrative account with permission to login to the Hashicorp Vault server in order to make administrative changes.
92
-
- An adequate number of unseal keys to meet the minimum criteria to unseal the Hashicorp Vault
93
-
- A Hashicorp Vault login token
90
+
- A functional Hashicorp Vault Installation **version 1.10.xx or greater**.
91
+
- An administrative account with permission to login to the Hashicorp Vault server in order to make administrative changes.
92
+
- An adequate number of unseal keys to meet the minimum criteria to unseal the Hashicorp Vault
93
+
- A Hashicorp Vault login token
94
94
95
95
## Installation - Keyfactor
96
96
@@ -363,97 +363,103 @@ in order to view the configuration settings (see example below).
363
363
364
364

365
365
366
-
## Using the plugin
367
-
368
366
### Adding Roles
369
367
370
-
Hashicorp Vault supports being able to add roles to control certificate issuance policies such as allowed domains. To create a role, use the vault write command as in the below example.
Hashicorp Vault supports being able to add roles to control certificate issuance policies for allowed domains and allowing sub-domain certificates to be created.
369
+
To create a role, use the vault write command as in the below example.
This will create a role called "hashiwebserver" that can be used to generate certificates for domains ending with "kftrain.lab".
374
+
375
+
These properties can also be set in the certificate template. If they differ, the most restrictive setting is applied.
376
+
377
+
## Using the plugin
372
378
373
379
### Issuing Certificates
374
380
375
-
When requesting a certificate using the Keyfactor plugin, the command is the same as if you were issuing the certificate through the vault integrated PKI. As a part of the write command you will specify the role name you would like to use, as well as the common name on the certificate. A typical certificate issuance command is listed below for the hashiwebserver role, and a CN of foo.kftrain.lab on the certificate.
381
+
When requesting a certificate using the Keyfactor plugin, the command is the same as if you were issuing the certificate through the vault integrated PKI. As a part of the write command you will specify the role name you would like to use, as well as the common name on the certificate. A typical certificate issuance command is listed below for the hashiwebserver role, and a CN of foo.kftrain.lab on the certificate.
The resulting response will show the certificate data response for the request. This certificate will also be stored in the Vault secrets store.
385
+
The resulting response will show the certificate data response for the request. This certificate will also be stored in the Vault secrets store.
380
386
381
387

382
388
383
389
### Viewing Certificates
384
390
385
-
After certificates are stored in the secrets store, you can then retrieve those certificates at a later time if necessary. To list the certificates that exist within the Vault store, use the LIST option with vault. The only parameter that you need to include is the secrets store name for the store that you would like to read. The system will then return a list of all of the serial numbers for certificates that are present in that secrets store.
386
-
387
-
`vault list keyfactor/certs`
388
-
389
-
The results of the command will be a list of serial numbers for the certificates in that store location:
390
-
391
-
```
392
-
Keys
393
-
----
394
-
750000276546d818cbe70231b6000000002765
395
-
750000276623facfaddb6c4ca1000000002766
396
-
```
397
-
398
-
If you would like to retrieve a specific certificate from the store, you can do so by using the "vault read" command, and specifying the serial number of the certificate that you would like returned. The format for the command looks like this:
After certificates are stored in the secrets store, you can then retrieve those certificates at a later time if necessary. To list the certificates that exist within the Vault store, use the LIST option with vault. The only parameter that you need to include is the secrets store name for the store that you would like to read. The system will then return a list of all of the serial numbers for certificates that are present in that secrets store.
392
+
393
+
`vault list keyfactor/certs`
394
+
395
+
The results of the command will be a list of serial numbers for the certificates in that store location:
396
+
397
+
```
398
+
Keys
399
+
----
400
+
750000276546d818cbe70231b6000000002765
401
+
750000276623facfaddb6c4ca1000000002766
402
+
```
403
+
404
+
If you would like to retrieve a specific certificate from the store, you can do so by using the "vault read" command, and specifying the serial number of the certificate that you would like returned. The format for the command looks like this:
0 commit comments