You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The WinCertStore Orchestrator remotely manages certificates in a Windows Server local machine certificate store. Users are able to determine which store they wish to place certificates in by entering the correct store path. For a complete list of local machine cert stores you can execute the PowerShell command:
@@ -154,13 +154,22 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
<details><summary>Create WinSql manually in the Command UI</summary>
338
365
@@ -405,7 +432,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
405
432
406
433
407
434
408
-
</details>
435
+
409
436
</details>
410
437
411
438
@@ -414,6 +441,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
414
441
1.**Download the latest Windows Certificate Universal Orchestrator extension from GitHub.**
415
442
416
443
Navigate to the [Windows Certificate Universal Orchestrator extension GitHub version page](https://github.com/Keyfactor/iis-orchestrator/releases/latest). Refer to the compatibility matrix below to determine whether the `net6.0` or `net8.0` asset should be downloaded. Then, click the corresponding asset to download the zip archive.
444
+
417
445
| Universal Orchestrator Version | Latest .NET version installed on the Universal Orchestrator server |`rollForward` condition in `Orchestrator.runtimeconfig.json`|`iis-orchestrator` .NET version to download |
@@ -443,8 +471,14 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
443
471
Refer to [Starting/Restarting the Universal Orchestrator service](https://software.keyfactor.com/Core-OnPrem/Current/Content/InstallingAgents/NetCoreOrchestrator/StarttheService.htm).
444
472
445
473
474
+
6.**(optional) PAM Integration**
475
+
476
+
The Windows Certificate Universal Orchestrator extension is compatible with all supported Keyfactor PAM extensions to resolve PAM-eligible secrets. PAM extensions running on Universal Orchestrators enable secure retrieval of secrets from a connected PAM provider.
477
+
478
+
To configure a PAM provider, [reference the Keyfactor Integration Catalog](https://keyfactor.github.io/integrations-catalog/content/pam) to select an extension, and follow the associated instructions to install it on the Universal Orchestrator (remote).
446
479
447
-
> The above installation steps can be supplimented by the [official Command documentation](https://software.keyfactor.com/Core-OnPrem/Current/Content/InstallingAgents/NetCoreOrchestrator/CustomExtensions.htm?Highlight=extensions).
480
+
481
+
> The above installation steps can be supplemented by the [official Command documentation](https://software.keyfactor.com/Core-OnPrem/Current/Content/InstallingAgents/NetCoreOrchestrator/CustomExtensions.htm?Highlight=extensions).
448
482
449
483
450
484
@@ -455,6 +489,8 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
<details><summary>Create Certificate Stores manually in the UI</summary>
@@ -466,6 +502,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
466
502
2.**Add a Certificate Store.**
467
503
468
504
Click the Add button to add a new Certificate Store. Use the table below to populate the **Attributes** in the **Add** form.
505
+
469
506
| Attribute | Description |
470
507
| --------- | ----------- |
471
508
| Category | Select "Windows Certificate" or the customized certificate store name from the previous step. |
@@ -479,12 +516,9 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
479
516
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
480
517
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
481
518
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
482
-
483
-
484
-
485
-
486
519
</details>
487
520
521
+
488
522
***Using kfutil**
489
523
490
524
<details><summary>Create Certificate Stores with kfutil</summary>
@@ -497,6 +531,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
497
531
2. **Populate the generated CSV file**
498
532
499
533
Open the CSV file, and reference the table below to populate parameters for each **Attribute**.
534
+
500
535
| Attribute | Description |
501
536
| --------- | ----------- |
502
537
| Category | Select "Windows Certificate" or the customized certificate store name from the previous step. |
@@ -510,25 +545,38 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
510
545
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
511
546
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
512
547
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
513
-
514
-
515
-
516
-
517
-
3. **Import the CSV file to create the certificate stores**
548
+
3. **Import the CSV file to create the certificate stores**
<details><summary>Attributes eligible for retrieval by a PAM Provider on the Universal Orchestrator</summary>
556
+
557
+
If a PAM provider was installed _on the Universal Orchestrator_ in the [Installation](#Installation) section, the following parameters can be configured for retrieval _on the Universal Orchestrator_.
558
+
559
+
| Attribute | Description |
560
+
| --------- | ----------- |
561
+
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
562
+
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
563
+
564
+
Please refer to the **Universal Orchestrator (remote)** usage section ([PAM providers on the Keyfactor Integration Catalog](https://keyfactor.github.io/integrations-catalog/content/pam)) for your selected PAM provider for instructions on how to load attributes orchestrator-side.
565
+
566
+
> Any secret can be rendered by a PAM provider _installed on the Keyfactor Command server_. The above parameters are specific to attributes that can be fetched by an installed PAM provider running on the Universal Orchestrator server itself.
522
567
</details>
523
568
524
-
> The content in this section can be supplimented by the [official Command documentation](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/Certificate%20Stores.htm?Highlight=certificate%20store).
569
+
570
+
> The content in this section can be supplemented by the [official Command documentation](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/Certificate%20Stores.htm?Highlight=certificate%20store).
<details><summary>Create Certificate Stores manually in the UI</summary>
@@ -540,6 +588,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
540
588
2. **Add a Certificate Store.**
541
589
542
590
Click the Add button to add a new Certificate Store. Use the table below to populate the **Attributes**in the **Add** form.
591
+
543
592
| Attribute | Description |
544
593
| --------- | ----------- |
545
594
| Category | Select "IIS Bound Certificate" or the customized certificate store name from the previous step. |
@@ -553,12 +602,9 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
553
602
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
554
603
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
555
604
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
556
-
557
-
558
-
559
-
560
605
</details>
561
606
607
+
562
608
***Using kfutil**
563
609
564
610
<details><summary>Create Certificate Stores with kfutil</summary>
@@ -571,6 +617,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
571
617
2. **Populate the generated CSV file**
572
618
573
619
Open the CSV file, and reference the table below to populate parameters for each **Attribute**.
620
+
574
621
| Attribute | Description |
575
622
| --------- | ----------- |
576
623
| Category | Select "IIS Bound Certificate" or the customized certificate store name from the previous step. |
@@ -584,25 +631,38 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
584
631
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
585
632
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
586
633
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
587
-
588
-
589
-
590
-
591
-
3. **Import the CSV file to create the certificate stores**
634
+
3. **Import the CSV file to create the certificate stores**
<details><summary>Attributes eligible for retrieval by a PAM Provider on the Universal Orchestrator</summary>
642
+
643
+
If a PAM provider was installed _on the Universal Orchestrator_ in the [Installation](#Installation) section, the following parameters can be configured for retrieval _on the Universal Orchestrator_.
644
+
645
+
| Attribute | Description |
646
+
| --------- | ----------- |
647
+
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
648
+
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
649
+
650
+
Please refer to the **Universal Orchestrator (remote)** usage section ([PAM providers on the Keyfactor Integration Catalog](https://keyfactor.github.io/integrations-catalog/content/pam)) for your selected PAM provider for instructions on how to load attributes orchestrator-side.
651
+
652
+
> Any secret can be rendered by a PAM provider _installed on the Keyfactor Command server_. The above parameters are specific to attributes that can be fetched by an installed PAM provider running on the Universal Orchestrator server itself.
596
653
</details>
597
654
598
-
> The content in this section can be supplimented by the [official Command documentation](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/Certificate%20Stores.htm?Highlight=certificate%20store).
655
+
656
+
> The content in this section can be supplemented by the [official Command documentation](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/Certificate%20Stores.htm?Highlight=certificate%20store).
599
657
600
658
601
659
</details>
602
660
603
661
<details><summary>WinSql (WinSql)</summary>
604
662
605
663
664
+
### Store Creation
665
+
606
666
***Manually with the Command UI**
607
667
608
668
<details><summary>Create Certificate Stores manually in the UI</summary>
@@ -614,6 +674,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
614
674
2. **Add a Certificate Store.**
615
675
616
676
Click the Add button to add a new Certificate Store. Use the table below to populate the **Attributes**in the **Add** form.
677
+
617
678
| Attribute | Description |
618
679
| --------- | ----------- |
619
680
| Category | Select "WinSql" or the customized certificate store name from the previous step. |
@@ -628,12 +689,9 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
628
689
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
629
690
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
630
691
| RestartService | Boolean value (true or false) indicating whether to restart the SQL Server service after installing the certificate. Example: 'true' to enable service restart after installation. |
631
-
632
-
633
-
634
-
635
692
</details>
636
693
694
+
637
695
***Using kfutil**
638
696
639
697
<details><summary>Create Certificate Stores with kfutil</summary>
@@ -646,6 +704,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
646
704
2. **Populate the generated CSV file**
647
705
648
706
Open the CSV file, and reference the table below to populate parameters for each **Attribute**.
707
+
649
708
| Attribute | Description |
650
709
| --------- | ----------- |
651
710
| Category | Select "WinSql" or the customized certificate store name from the previous step. |
@@ -660,18 +719,29 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
660
719
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
661
720
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
662
721
| RestartService | Boolean value (true or false) indicating whether to restart the SQL Server service after installing the certificate. Example: 'true' to enable service restart after installation. |
663
-
664
-
665
-
666
-
667
-
3. **Import the CSV file to create the certificate stores**
722
+
3. **Import the CSV file to create the certificate stores**
<details><summary>Attributes eligible for retrieval by a PAM Provider on the Universal Orchestrator</summary>
730
+
731
+
If a PAM provider was installed _on the Universal Orchestrator_ in the [Installation](#Installation) section, the following parameters can be configured for retrieval _on the Universal Orchestrator_.
732
+
733
+
| Attribute | Description |
734
+
| --------- | ----------- |
735
+
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
736
+
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
737
+
738
+
Please refer to the **Universal Orchestrator (remote)** usage section ([PAM providers on the Keyfactor Integration Catalog](https://keyfactor.github.io/integrations-catalog/content/pam)) for your selected PAM provider for instructions on how to load attributes orchestrator-side.
739
+
740
+
> Any secret can be rendered by a PAM provider _installed on the Keyfactor Command server_. The above parameters are specific to attributes that can be fetched by an installed PAM provider running on the Universal Orchestrator server itself.
672
741
</details>
673
742
674
-
> The content in this section can be supplimented by the [official Command documentation](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/Certificate%20Stores.htm?Highlight=certificate%20store).
743
+
744
+
> The content in this section can be supplemented by the [official Command documentation](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/Certificate%20Stores.htm?Highlight=certificate%20store).
0 commit comments