You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Internally set the -IncludePortInSPN option when creating the remote PowerShell connection. Needed for some Kerberos configurations.
286
+
287
+

288
+
289
+
290
+
291
+
###### WinRM Protocol
292
+
Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment.
293
+
294
+

295
+
296
+
297
+
298
+
###### WinRM Port
299
+
String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22.
300
+
301
+

302
+
303
+
304
+
305
+
###### Server Username
306
+
Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'.
307
+
308
+
309
+
> [!IMPORTANT]
310
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
311
+
312
+
313
+
314
+
315
+
###### Server Password
316
+
Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key.
317
+
318
+
319
+
> [!IMPORTANT]
320
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
321
+
322
+
323
+
324
+
325
+
###### Use SSL
326
+
Determine whether the server uses SSL or not (This field is automatically created)
327
+
328
+

329
+
330
+
331
+
332
+
333
+
283
334
##### Entry Parameters Tab
284
335
285
336
| Name | Display Name | Description | Type | Default Value | Entry has a private key | Adding an entry | Removing an entry | Reenrolling an entry |
@@ -292,12 +343,14 @@ the Keyfactor Command Portal
Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'
String value specifying the Subject Alternative Name (SAN) to be used when performing reenrollment jobs. Format as a list of <san_type>=<san_value> entries separated by ampersands; Example: 'dns=www.example.com&dns=www.example2.com' for multiple SANs. Can be made optional if RFC 2818 is disabled on the CA.
Internally set the -IncludePortInSPN option when creating the remote PowerShell connection. Needed for some Kerberos configurations.
480
+
481
+

482
+
483
+
484
+
485
+
###### WinRM Protocol
486
+
Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment.
487
+
488
+

489
+
490
+
491
+
492
+
###### WinRM Port
493
+
String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22.
494
+
495
+

496
+
497
+
498
+
499
+
###### Server Username
500
+
Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'.
501
+
502
+
503
+
> [!IMPORTANT]
504
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
505
+
506
+
507
+
508
+
509
+
###### Server Password
510
+
Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key.
511
+
512
+
513
+
> [!IMPORTANT]
514
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
515
+
516
+
517
+
518
+
519
+
###### Use SSL
520
+
Determine whether the server uses SSL or not (This field is automatically created)
521
+
522
+

523
+
524
+
525
+
526
+
527
+
424
528
##### Entry Parameters Tab
425
529
426
530
| Name | Display Name | Description | Type | Default Value | Entry has a private key | Adding an entry | Removing an entry | Reenrolling an entry |
@@ -440,41 +544,49 @@ the Keyfactor Command Portal
440
544
441
545
442
546
##### Port
547
+
String value specifying the IP port to bind the certificate to for the IIS site. Example: '443' for HTTPS.
String value specifying the IP address to bind the certificate to for the IIS site. Example: '*' for all IP addresses or '192.168.1.1' for a specific IP address.
String value specifying the host name (host header) to bind the certificate to for the IIS site. Leave blank for all host names or enter a specific hostname such as 'www.example.com'.
String value specifying the name of the IIS web site to bind the certificate to. Example: 'Default Web Site' or any custom site name such as 'MyWebsite'.
A 128-Bit Flag that determines what type of SSL settings you wish to use. The default is 0, meaning No SNI. For more information, check IIS documentation for the appropriate bit setting.)
Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'
String value specifying the Subject Alternative Name (SAN) to be used when performing reenrollment jobs. Format as a list of <san_type>=<san_value> entries separated by ampersands; Example: 'dns=www.example.com&dns=www.example2.com' for multiple SANs. Can be made optional if RFC 2818 is disabled on the CA.
Internally set the -IncludePortInSPN option when creating the remote PowerShell connection. Needed for some Kerberos configurations.
709
+
710
+

711
+
712
+
713
+
714
+
###### WinRM Protocol
715
+
Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment.
716
+
717
+

718
+
719
+
720
+
721
+
###### WinRM Port
722
+
String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22.
723
+
724
+

725
+
726
+
727
+
728
+
###### Server Username
729
+
Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'.
730
+
731
+
732
+
> [!IMPORTANT]
733
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
734
+
735
+
736
+
737
+
738
+
###### Server Password
739
+
Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key.
740
+
741
+
742
+
> [!IMPORTANT]
743
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
744
+
745
+
746
+
747
+
748
+
###### Use SSL
749
+
Determine whether the server uses SSL or not (This field is automatically created)
750
+
751
+

752
+
753
+
754
+
755
+
###### Restart SQL Service After Cert Installed
756
+
Boolean value (true or false) indicating whether to restart the SQL Server service after installing the certificate. Example: 'true' to enable service restart after installation.
757
+
758
+

759
+
760
+
761
+
762
+
763
+
594
764
##### Entry Parameters Tab
595
765
596
766
| Name | Display Name | Description | Type | Default Value | Entry has a private key | Adding an entry | Removing an entry | Reenrolling an entry |
@@ -604,17 +774,20 @@ the Keyfactor Command Portal
String value specifying the SQL Server instance name to bind the certificate to. Example: 'MSSQLServer' for the default instance or 'Instance1' for a named instance.
Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'
String value specifying the Subject Alternative Name (SAN) to be used when performing reenrollment jobs. Format as a list of <san_type>=<san_value> entries separated by ampersands; Example: 'dns=www.example.com&dns=www.example2.com' for multiple SANs.
@@ -628,15 +801,14 @@ the Keyfactor Command Portal
628
801
629
802
1.**Download the latest Windows Certificate Universal Orchestrator extension from GitHub.**
630
803
631
-
Navigate to the [Windows Certificate Universal Orchestrator extension GitHub version page](https://github.com/Keyfactor/iis-orchestrator/releases/latest). Refer to the compatibility matrix below to determine whether the`net6.0` or `net8.0` asset should be downloaded. Then, click the corresponding asset to download the zip archive.
804
+
Navigate to the [Windows Certificate Universal Orchestrator extension GitHub version page](https://github.com/Keyfactor/iis-orchestrator/releases/latest). Refer to the compatibility matrix below to determine the asset should be downloaded. Then, click the corresponding asset to download the zip archive.
632
805
633
806
| Universal Orchestrator Version | Latest .NET version installed on the Universal Orchestrator server |`rollForward` condition in `Orchestrator.runtimeconfig.json`|`iis-orchestrator` .NET version to download |
0 commit comments