You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+23-14Lines changed: 23 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ Please refer to the READMEs for each supported store type for more information o
56
56
|Orchestrated Server hosting certificate store(s) on remote Windows server|WinRM connection | SSH connection |
57
57
|Certificate store(s) on same server as orchestrator service (Agent)| WinRM connection or local file system | Not Supported |
58
58
59
-
WinRM is used to remotely manage the certificate stores and IIS bindings. WinRM must be properly configured to allow the orchestrator on the server to manage the certificates. Setting up WinRM is not in the scope of this document.
59
+
WinRM is used to remotely manage the certificate stores and IIS bindings on Windows machines only. WinRM must be properly configured to allow the orchestrator on the server to manage the certificates. Setting up WinRM is not in the scope of this document.
60
60
61
61
**Note:**
62
62
In version 2.0 of the IIS Orchestrator, the certificate store type has been renamed and additional parameters have been added. Prior to 2.0 the certificate store type was called “IISBin” and as of 2.0 it is called “IISU”. If you have existing certificate stores of type “IISBin”, you have three options:
@@ -138,13 +138,24 @@ Before installing the Windows Certificate Universal Orchestrator extension, we r
138
138
139
139
140
140
<details>
141
-
<summary><b>Using the WinCert Extension on Linux:</b></summary>
141
+
<summary><b>Using the WinCert Extension on Linux servers:</b></summary>
142
+
143
+
1. General SSH Setup Information: PowerShell 6 or higher and SSH must be installed on all computers. Install SSH, including ssh server, that's appropriate for your platform. You also need to install PowerShell from GitHub to get the SSH remoting feature. The SSH server must be configured to create a SSH subsysten to host a PowerShell process on the remote computer. It is suggested to turn off password authentication as this extension uses key-based authentication.
144
+
145
+
2. SSH Authentication: When creating a Keyfactor certificate store for the WinCert orchestrator extension, the only protocol supported to communicate with Windows servers is ssh. When providing the user id and password, the connection is attempted by creating a temporary private key file using the contents in the Password textbox. Therefore, the password field must contain the full SSH Private key.
146
+
142
147
</details>
143
148
144
149
<details>
145
150
<summary><b>Using the WinCert Extension on Windows servers:</b></summary>
151
+
152
+
1. When orchestrating management of external (and potentially local) certificate stores, the WinCert Orchestrator Extension makes use of WinRM to connect to external certificate store servers. The security context used is the user id entered in the Keyfactor Command certificate store. Make sure that WinRM is set up on the orchestrated server and that the WinRM port (by convention, 5585 for HTTP and 5586 for HTTPS) is part of the certificate store path when setting up your certificate stores jobs. If running as an agent, managing local certificate stores, local commands are run under the security context of the user account running the Keyfactor Universal Orchestrator Service.
153
+
146
154
</details>
147
155
156
+
Please consult with your company's system administrator for more information on configuring SSH or WinRM in your environment.
157
+
158
+
148
159
### Security and Permission Considerations
149
160
150
161
From an official support point of view, Local Administrator permissions are required on the target server. Some customers have been successful with using other accounts and granting rights to the underlying certificate and private key stores. Due to complexities with the interactions between Group Policy, WinRM, User Account Control, and other unpredictable customer environmental factors, Keyfactor cannot provide assistance with using accounts other than the local administrator account.
@@ -232,7 +243,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
232
243
| WinRM Protocol | WinRM Protocol | Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment. | MultipleChoice | https,http,ssh | ✅ Checked |
233
244
| WinRM Port | WinRM Port | String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22. | String | 5986 | ✅ Checked |
234
245
| ServerUsername | Server Username | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. | Secret | | 🔲 Unchecked |
235
-
| ServerPassword | Server Password | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. | Secret | | 🔲 Unchecked |
246
+
| ServerPassword | Server Password | Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key. | Secret | | 🔲 Unchecked |
236
247
| ServerUseSsl | Use SSL | Determine whether the server uses SSL or not (This field is automatically created) | Bool | true | ✅ Checked |
237
248
238
249
The Custom Fields tab should look like this:
@@ -315,7 +326,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
315
326
| WinRM Protocol | WinRM Protocol | Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment. | MultipleChoice | https,http,ssh | ✅ Checked |
316
327
| WinRM Port | WinRM Port | String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986'forHTTPS or '5985' for HTTP. By default, when using sshin a Linux environment, the default port number is 22. | String | 5986 | ✅ Checked |
317
328
| ServerUsername | Server Username | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. | Secret || 🔲 Unchecked |
318
-
| ServerPassword | Server Password | Password corresponding to the Server Username used to log into the target serverforestablishing the WinRM session. Example: 'P@ssw0rd123'. | Secret || 🔲 Unchecked |
329
+
| ServerPassword | Server Password | Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key. | Secret || 🔲 Unchecked |
319
330
| ServerUseSsl | Use SSL | Determine whether the server uses SSL or not (This field is automatically created) | Bool |true| ✅ Checked |
320
331
321
332
The Custom Fields tab should look like this:
@@ -404,7 +415,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
404
415
| WinRM Protocol | WinRM Protocol | Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment. | MultipleChoice | https,http,ssh | ✅ Checked |
405
416
| WinRM Port | WinRM Port | String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22. | String | 5986 | ✅ Checked |
406
417
| ServerUsername | Server Username | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. | Secret | | 🔲 Unchecked |
407
-
| ServerPassword | Server Password | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. | Secret | | 🔲 Unchecked |
418
+
| ServerPassword | Server Password | Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key. | Secret | | 🔲 Unchecked |
408
419
| ServerUseSsl | Use SSL | Determine whether the server uses SSL or not (This field is automatically created) | Bool | true | ✅ Checked |
409
420
| RestartService | Restart SQL Service After Cert Installed | Boolean value (true or false) indicating whether to restart the SQL Server service after installing the certificate. Example: 'true' to enable service restart after installation. | Bool | false | ✅ Checked |
410
421
@@ -500,7 +511,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
500
511
| WinRM Protocol | Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment. |
501
512
| WinRM Port | String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22. |
502
513
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
503
-
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
514
+
| ServerPassword | Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key. |
504
515
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
505
516
506
517
@@ -531,7 +542,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
531
542
| WinRM Protocol | Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment. |
532
543
| WinRM Port | String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22. |
533
544
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
534
-
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
545
+
| ServerPassword | Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key. |
535
546
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
536
547
537
548
@@ -574,7 +585,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
574
585
| WinRM Protocol | Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment. |
575
586
| WinRM Port | String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22. |
576
587
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
577
-
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
588
+
| ServerPassword | Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key. |
578
589
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
579
590
580
591
@@ -605,7 +616,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
605
616
| WinRM Protocol | Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment. |
606
617
| WinRM Port | String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986'forHTTPS or '5985' for HTTP. By default, when using sshin a Linux environment, the default port number is 22. |
607
618
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
608
-
| ServerPassword | Password corresponding to the Server Username used to log into the target serverforestablishing the WinRM session. Example: 'P@ssw0rd123'. |
619
+
| ServerPassword | Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key. |
609
620
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
610
621
611
622
@@ -648,7 +659,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
648
659
| WinRM Protocol | Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment. |
649
660
| WinRM Port | String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986' for HTTPS or '5985' for HTTP. By default, when using ssh in a Linux environment, the default port number is 22. |
650
661
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
651
-
| ServerPassword | Password corresponding to the Server Username used to log into the target server for establishing the WinRM session. Example: 'P@ssw0rd123'. |
662
+
| ServerPassword | Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key. |
652
663
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
653
664
| RestartService | Boolean value (true or false) indicating whether to restart the SQL Server service after installing the certificate. Example: 'true' to enable service restart after installation. |
654
665
@@ -680,7 +691,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
680
691
| WinRM Protocol | Multiple choice value specifying which protocol to use. Protocols https or http use WinRM to connect from Windows to Windows Servers. Using ssh is only supported when running the orchestrator in a Linux environment. |
681
692
| WinRM Port | String value specifying the port number that the Windows target server's WinRM listener is configured to use. Example: '5986'forHTTPS or '5985' for HTTP. By default, when using sshin a Linux environment, the default port number is 22. |
682
693
| ServerUsername | Username used to log into the target server for establishing the WinRM session. Example: 'administrator' or 'domain\username'. |
683
-
| ServerPassword | Password corresponding to the Server Username used to log into the target serverforestablishing the WinRM session. Example: 'P@ssw0rd123'. |
694
+
| ServerPassword | Password corresponding to the Server Username used to log into the target server. When establishing a SSH session from a Linux environment, the password must include the full SSH Private key. |
684
695
| ServerUseSsl | Determine whether the server uses SSL or not (This field is automatically created) |
685
696
| RestartService | Boolean value (true or false) indicating whether to restart the SQL Server service after installing the certificate. Example: 'true' to enable service restart after installation. |
686
697
@@ -704,9 +715,7 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
704
715
## Client Machine Instructions
705
716
Prior to version 2.6, this extension would only run in the Windows environment. Version 2.6 and greater is capable of running on Linux, however, only the SSH protocol is supported.
706
717
707
-
If running as an agent (accessing stores on the server where the Universal Orchestrator Services is installed ONLY), the Client Machine can be entered, OR you can bypass a WinRM connection and access the local file system directly by adding "|LocalMachine" to the end of your value for Client Machine, for example "1.1.1.1|LocalMachine". In this instance the value to the left of the pipe (|) is ignored. It is important to make sure the values for Client Machine and Store Path together are unique for each certificate store created, as Keyfactor Command requires the Store Type you select, along with Client Machine, and Store Path together must be unique. To ensure this, it is good practice to put the full DNS or IP Address to the left of the | character when setting up a certificate store that will be accessed without a WinRM connection.
708
-
709
-
Here are the settings required for each Store Type previously configured.
718
+
If running as an agent (accessing stores on the server where the Universal Orchestrator Services is installed ONLY), the Client Machine can be entered, OR you can bypass a WinRM connection and access the local file system directly by adding "|LocalMachine" to the end of your value for Client Machine, for example "1.1.1.1|LocalMachine". In this instance the value to the left of the pipe (|) is ignored. It is important to make sure the values for Client Machine and Store Path together are unique for each certificate store created, as Keyfactor Command requires the Store Type you select, along with Client Machine, and Store Path together must be unique. To ensure this, it is good practice to put the full DNS or IP Address to the left of the | character when setting up a certificate store that will be accessed without a WinRM connection.
0 commit comments