You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+25-5Lines changed: 25 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,9 +82,9 @@ The Windows Certificate Universal Orchestrator extension implements 3 Certificat
82
82
This integration is compatible with Keyfactor Universal Orchestrator version 10.1 and later.
83
83
84
84
## Support
85
-
The Windows Certificate Universal Orchestrator extension If you have a support issue, please open a support ticket by either contacting your Keyfactor representative or via the Keyfactor Support Portal at https://support.keyfactor.com.
85
+
The Windows Certificate Universal Orchestrator extension is supported by Keyfactor. If you require support for any issues or have feature request, please open a support ticket by either contacting your Keyfactor representative or via the Keyfactor Support Portal at https://support.keyfactor.com.
86
86
87
-
> To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, use the **[Pull requests](../../pulls)** tab.
87
+
> If you want to contribute bug fixes or additional enhancements, use the **[Pull requests](../../pulls)** tab.
88
88
89
89
## Requirements & Prerequisites
90
90
@@ -135,6 +135,26 @@ For customers wishing to use something other than the local administrator accoun
135
135
- Access any Cryptographic Service Provider (CSP) referenced in re-enrollment jobs.
136
136
- Read and Write values in the registry (HKLM:\SOFTWARE\Microsoft\Microsoft SQL Server) when performing SQL Server certificate binding.
137
137
138
+
### Using Crypto Service Providers (CSP)
139
+
When adding or reenrolling certificates, you may specify an optional CSP to be used when generating and storing the private keys. This value would typically be specified when leveraging a Hardware Security Module (HSM). The specified cryptographic provider must be available on the target server being managed.
140
+
141
+
The list of installed cryptographic providers can be obtained by running the PowerShell command on the target server:
142
+
143
+
certutil -csplist
144
+
145
+
When performing a ReEnrollment or On Device Key Generation (ODKG) job, if no CSP is specified, a default value of 'Microsoft Strong Cryptographic Provider' will be used.
146
+
147
+
When performing an Add job, if no CSP is specified, the machine's default CSP will be used, in most cases this could be the 'Microsoft Enhanced Cryptographic Provider v1.0' provider.
148
+
149
+
Each CSP only supports certain key types and algorithms.
150
+
151
+
Below is a brief summary of the CSPs and their support for RSA and ECC algorithms:
| ProviderName | Crypto Provider Name | Name of the Windows cryptographic provider to use during reenrollment jobs when generating and storing the private keys. If not specified, defaults to 'Microsoft Strong Cryptographic Provider'. This value would typically be specified when leveraging a Hardware Security Module (HSM). The specified cryptographic provider must be available on the target server being managed. The list of installed cryptographic providers can be obtained by running 'certutil -csplist' on the target Server.| String || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
280
+
| ProviderName | Crypto Provider Name | Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'| String || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
261
281
| SAN | SAN | String value specifying the Subject Alternative Name (SAN) to be used when performing reenrollment jobs. Format as a list of <san_type>=<san_value> entries separated by ampersands; Example: 'dns=www.example.com&dns=www.example2.com' for multiple SANs. Can be made optional if RFC 2818 is disabled on the CA. | String || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | ✅ Checked |
262
282
263
283
The Entry Parameters tab should look like this:
@@ -392,7 +412,7 @@ the Keyfactor Command Portal
392
412
| SiteName | IIS Site Name | String value specifying the name of the IIS web site to bind the certificate to. Example: 'Default Web Site' or any custom site name such as 'MyWebsite'. | String | Default Web Site | 🔲 Unchecked | ✅ Checked | ✅ Checked | ✅ Checked |
393
413
| SniFlag | SSL Flags | A 128-Bit Flag that determines what type of SSL settings you wish to use. The default is 0, meaning No SNI. For more information, check IIS documentation for the appropriate bit setting.) | String | 0 | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
394
414
| Protocol | Protocol | Multiple choice value specifying the protocol to bind to. Example: 'https' for secure communication. | MultipleChoice | https | 🔲 Unchecked | ✅ Checked | ✅ Checked | ✅ Checked |
395
-
| ProviderName | Crypto Provider Name | Name of the Windows cryptographic provider to use during reenrollment jobs when generating and storing the private keys. If not specified, defaults to 'Microsoft Strong Cryptographic Provider'. This value would typically be specified when leveraging a Hardware Security Module (HSM). The specified cryptographic provider must be available on the target server being managed. The list of installed cryptographic providers can be obtained by running 'certutil -csplist' on the target Server.| String || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
415
+
| ProviderName | Crypto Provider Name | Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'| String || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
396
416
| SAN | SAN | String value specifying the Subject Alternative Name (SAN) to be used when performing reenrollment jobs. Format as a list of <san_type>=<san_value> entries separated by ampersands; Example: 'dns=www.example.com&dns=www.example2.com' for multiple SANs. Can be made optional if RFC 2818 is disabled on the CA. | String || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | ✅ Checked |
397
417
398
418
The Entry Parameters tab should look like this:
@@ -515,7 +535,7 @@ the Keyfactor Command Portal
515
535
| Name | Display Name | Description | Type | Default Value | Entry has a private key | Adding an entry | Removing an entry | Reenrolling an entry |
| InstanceName | Instance Name | String value specifying the SQL Server instance name to bind the certificate to. Example: 'MSSQLServer' for the default instance or 'Instance1' for a named instance. | String || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
518
-
| ProviderName | Crypto Provider Name |Optional string value specifying the name of the Windows cryptographic provider to use during reenrollment jobs when generating and storing private keys. Example: 'Microsoft Strong Cryptographic Provider'.| String || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
538
+
| ProviderName | Crypto Provider Name |Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'| String || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
519
539
| SAN | SAN | String value specifying the Subject Alternative Name (SAN) to be used when performing reenrollment jobs. Format as a list of <san_type>=<san_value> entries separated by ampersands; Example: 'dns=www.example.com&dns=www.example2.com' for multiple SANs. | String || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | ✅ Checked |
Copy file name to clipboardExpand all lines: docsource/content.md
+20Lines changed: 20 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,6 +82,26 @@ For customers wishing to use something other than the local administrator accoun
82
82
- Access any Cryptographic Service Provider (CSP) referenced in re-enrollment jobs.
83
83
- Read and Write values in the registry (HKLM:\SOFTWARE\Microsoft\Microsoft SQL Server) when performing SQL Server certificate binding.
84
84
85
+
### Using Crypto Service Providers (CSP)
86
+
When adding or reenrolling certificates, you may specify an optional CSP to be used when generating and storing the private keys. This value would typically be specified when leveraging a Hardware Security Module (HSM). The specified cryptographic provider must be available on the target server being managed.
87
+
88
+
The list of installed cryptographic providers can be obtained by running the PowerShell command on the target server:
89
+
90
+
certutil -csplist
91
+
92
+
When performing a ReEnrollment or On Device Key Generation (ODKG) job, if no CSP is specified, a default value of 'Microsoft Strong Cryptographic Provider' will be used.
93
+
94
+
When performing an Add job, if no CSP is specified, the machine's default CSP will be used, in most cases this could be the 'Microsoft Enhanced Cryptographic Provider v1.0' provider.
95
+
96
+
Each CSP only supports certain key types and algorithms.
97
+
98
+
Below is a brief summary of the CSPs and their support for RSA and ECC algorithms:
Prior to version 2.6, this extension would only run in the Windows environment. Version 2.6 and greater is capable of running on Linux, however, only the SSH protocol is supported.
Copy file name to clipboardExpand all lines: integration-manifest.json
+29-29Lines changed: 29 additions & 29 deletions
Original file line number
Diff line number
Diff line change
@@ -115,7 +115,7 @@
115
115
"DependsOn": "",
116
116
"DefaultValue": "",
117
117
"Options": "",
118
-
"Description": "Name of the Windows cryptographic provider to use during reenrollment jobs when generating and storing the private keys. If not specified, defaults to 'Microsoft Strong Cryptographic Provider'. This value would typically be specified when leveraging a Hardware Security Module (HSM). The specified cryptographic provider must be available on the target server being managed. The list of installed cryptographic providers can be obtained by running 'certutil -csplist' on the target Server."
118
+
"Description": "Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'"
119
119
},
120
120
{
121
121
"Name": "SAN",
@@ -306,21 +306,21 @@
306
306
"Options": "https,http",
307
307
"Description": "Multiple choice value specifying the protocol to bind to. Example: 'https' for secure communication."
308
308
},
309
-
{
310
-
"Name": "ProviderName",
311
-
"DisplayName": "Crypto Provider Name",
312
-
"Type": "String",
313
-
"RequiredWhen": {
314
-
"HasPrivateKey": false,
315
-
"OnAdd": false,
316
-
"OnRemove": false,
317
-
"OnReenrollment": false
318
-
},
319
-
"DependsOn": "",
320
-
"DefaultValue": "",
321
-
"Options": "",
322
-
"Description": "Name of the Windows cryptographic provider to use during reenrollment jobs when generating and storing the private keys. If not specified, defaults to 'Microsoft Strong Cryptographic Provider'. This value would typically be specified when leveraging a Hardware Security Module (HSM). The specified cryptographic provider must be available on the target server being managed. The list of installed cryptographic providers can be obtained by running 'certutil -csplist' on the target Server."
309
+
{
310
+
"Name": "ProviderName",
311
+
"DisplayName": "Crypto Provider Name",
312
+
"Type": "String",
313
+
"RequiredWhen": {
314
+
"HasPrivateKey": false,
315
+
"OnAdd": false,
316
+
"OnRemove": false,
317
+
"OnReenrollment": false
323
318
},
319
+
"DependsOn": "",
320
+
"DefaultValue": "",
321
+
"Options": "",
322
+
"Description": "Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'"
323
+
},
324
324
{
325
325
"Name": "SAN",
326
326
"DisplayName": "SAN",
@@ -441,21 +441,21 @@
441
441
},
442
442
"Description": "String value specifying the SQL Server instance name to bind the certificate to. Example: 'MSSQLServer' for the default instance or 'Instance1' for a named instance."
443
443
},
444
-
{
445
-
"Name": "ProviderName",
446
-
"DisplayName": "Crypto Provider Name",
447
-
"Type": "String",
448
-
"RequiredWhen": {
449
-
"HasPrivateKey": false,
450
-
"OnAdd": false,
451
-
"OnRemove": false,
452
-
"OnReenrollment": false
453
-
},
454
-
"DependsOn": "",
455
-
"DefaultValue": "",
456
-
"Options": "",
457
-
"Description": "Optional string value specifying the name of the Windows cryptographic provider to use during reenrollment jobs when generating and storing private keys. Example: 'Microsoft Strong Cryptographic Provider'."
444
+
{
445
+
"Name": "ProviderName",
446
+
"DisplayName": "Crypto Provider Name",
447
+
"Type": "String",
448
+
"RequiredWhen": {
449
+
"HasPrivateKey": false,
450
+
"OnAdd": false,
451
+
"OnRemove": false,
452
+
"OnReenrollment": false
458
453
},
454
+
"DependsOn": "",
455
+
"DefaultValue": "",
456
+
"Options": "",
457
+
"Description": "Name of the Windows cryptographic service provider to use when generating and storing private keys. For more information, refer to the section 'Using Crypto Service Providers'"
0 commit comments