You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Internally set the -IncludePortInSPN option when creating the remote PowerShell connection. Needed for some Kerberos configurations.
286
+
287
+

288
+
289
+
290
+
291
+
###### WinRM Protocol
292
+
Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment.
293
+
294
+

295
+
296
+
297
+
298
+
###### WinRM Port
299
+
String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22.
300
+
301
+

302
+
303
+
304
+
305
+
###### Server Username
306
+
Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'.
307
+
308
+
309
+
> [!IMPORTANT]
310
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
311
+
312
+
313
+
314
+
315
+
###### Server Password
316
+
Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key.
317
+
318
+
319
+
> [!IMPORTANT]
320
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
321
+
322
+
323
+
324
+
325
+
###### Use SSL
326
+
Determine whether the server uses SSL or not (This field is automatically created)
327
+
328
+

329
+
330
+
331
+
332
+
333
+
283
334
##### Entry Parameters Tab
284
335
285
336
| Name | Display Name | Description | Type | Default Value | Entry has a private key | Adding an entry | Removing an entry | Reenrolling an entry |
Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'
String value specifying the Subject Alternative Name (SAN) to be used when performing reenrollment jobs. Format as a list of <san_type>=<san_value> entries separated by ampersands; Example: 'dns=www.example.com&dns=www.example2.com' for multiple SANs. Can be made optional if RFC 2818 is disabled on the CA.
Internally set the -IncludePortInSPN option when creating the remote PowerShell connection. Needed for some Kerberos configurations.
480
+
481
+

482
+
483
+
484
+
485
+
###### WinRM Protocol
486
+
Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment.
487
+
488
+

489
+
490
+
491
+
492
+
###### WinRM Port
493
+
String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22.
494
+
495
+

496
+
497
+
498
+
499
+
###### Server Username
500
+
Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'.
501
+
502
+
503
+
> [!IMPORTANT]
504
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
505
+
506
+
507
+
508
+
509
+
###### Server Password
510
+
Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key.
511
+
512
+
513
+
> [!IMPORTANT]
514
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
515
+
516
+
517
+
518
+
519
+
###### Use SSL
520
+
Determine whether the server uses SSL or not (This field is automatically created)
521
+
522
+

523
+
524
+
525
+
526
+
527
+
412
528
##### Entry Parameters Tab
413
529
414
530
| Name | Display Name | Description | Type | Default Value | Entry has a private key | Adding an entry | Removing an entry | Reenrolling an entry |
String value specifying the IP address to bind the certificate to for the IIS site. Example: '*' for all IP addresses or '192.168.1.1' for a specific IP address.
String value specifying the host name (host header) to bind the certificate to for the IIS site. Leave blank for all host names or enter a specific hostname such as 'www.example.com'.
String value specifying the name of the IIS web site to bind the certificate to. Example: 'Default Web Site' or any custom site name such as 'MyWebsite'.
A 128-Bit Flag that determines what type of SSL settings you wish to use. The default is 0, meaning No SNI. For more information, check IIS documentation for the appropriate bit setting.)
Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'
String value specifying the Subject Alternative Name (SAN) to be used when performing reenrollment jobs. Format as a list of <san_type>=<san_value> entries separated by ampersands; Example: 'dns=www.example.com&dns=www.example2.com' for multiple SANs. Can be made optional if RFC 2818 is disabled on the CA.
Internally set the -IncludePortInSPN option when creating the remote PowerShell connection. Needed for some Kerberos configurations.
709
+
710
+

711
+
712
+
713
+
714
+
###### WinRM Protocol
715
+
Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment.
716
+
717
+

718
+
719
+
720
+
721
+
###### WinRM Port
722
+
String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22.
723
+
724
+

725
+
726
+
727
+
728
+
###### Server Username
729
+
Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'.
730
+
731
+
732
+
> [!IMPORTANT]
733
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
734
+
735
+
736
+
737
+
738
+
###### Server Password
739
+
Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key.
740
+
741
+
742
+
> [!IMPORTANT]
743
+
> This field is created by the `Needs Server` on the Basic tab, do not create this field manually.
744
+
745
+
746
+
747
+
748
+
###### Use SSL
749
+
Determine whether the server uses SSL or not (This field is automatically created)
750
+
751
+

752
+
753
+
754
+
755
+
###### Restart SQL Service After Cert Installed
756
+
Boolean value (true or false) indicating whether to restart the SQL Server service after installing the certificate. Example: 'true' to enable service restart after installation.
757
+
758
+

759
+
760
+
761
+
762
+
763
+
540
764
##### Entry Parameters Tab
541
765
542
766
| Name | Display Name | Description | Type | Default Value | Entry has a private key | Adding an entry | Removing an entry | Reenrolling an entry |
String value specifying the SQL Server instance name to bind the certificate to. Example: 'MSSQLServer' for the default instance or 'Instance1' for a named instance.
Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'
String value specifying the Subject Alternative Name (SAN) to be used when performing reenrollment jobs. Format as a list of <san_type>=<san_value> entries separated by ampersands; Example: 'dns=www.example.com&dns=www.example2.com' for multiple SANs.
@@ -557,15 +801,14 @@ the Keyfactor Command Portal
557
801
558
802
1.**Download the latest Windows Certificate Universal Orchestrator extension from GitHub.**
559
803
560
-
Navigate to the [Windows Certificate Universal Orchestrator extension GitHub version page](https://github.com/Keyfactor/iis-orchestrator/releases/latest). Refer to the compatibility matrix below to determine whether the`net6.0` or `net8.0` asset should be downloaded. Then, click the corresponding asset to download the zip archive.
804
+
Navigate to the [Windows Certificate Universal Orchestrator extension GitHub version page](https://github.com/Keyfactor/iis-orchestrator/releases/latest). Refer to the compatibility matrix below to determine the asset should be downloaded. Then, click the corresponding asset to download the zip archive.
561
805
562
806
| Universal Orchestrator Version | Latest .NET version installed on the Universal Orchestrator server |`rollForward` condition in `Orchestrator.runtimeconfig.json`|`iis-orchestrator` .NET version to download |
0 commit comments