Skip to content

Commit e47eda2

Browse files
Merge pull request #10 from Keyfactor/doctool-migration-58558
Doctool migration 58558
2 parents 8b957e9 + 66537ca commit e47eda2

File tree

9 files changed

+656
-147
lines changed

9 files changed

+656
-147
lines changed
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
name: Keyfactor Bootstrap Workflow
2+
3+
on:
4+
workflow_dispatch:
5+
pull_request:
6+
types: [opened, closed, synchronize, edited, reopened]
7+
push:
8+
create:
9+
branches:
10+
- 'release-*.*'
11+
12+
jobs:
13+
call-starter-workflow:
14+
uses: keyfactor/actions/.github/workflows/starter.yml@v3
15+
secrets:
16+
token: ${{ secrets.V2BUILDTOKEN}}
17+
APPROVE_README_PUSH: ${{ secrets.APPROVE_README_PUSH}}
18+
gpg_key: ${{ secrets.KF_GPG_PRIVATE_KEY }}
19+
gpg_pass: ${{ secrets.KF_GPG_PASSPHRASE }}
20+
scan_token: ${{ secrets.SAST_TOKEN }}

.github/workflows/keyfactor-starter-workflow.yml

Lines changed: 0 additions & 39 deletions
This file was deleted.

CHANGELOG.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# v2.0.0
2+
- .Net 6 and .Net 8 Support and Documentation Updates
3+
# v1.0.0
4+
- Initial extension release
5+

Kemp.sln

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11

22
Microsoft Visual Studio Solution File, Format Version 12.00
3-
# Visual Studio Version 16
4-
VisualStudioVersion = 16.0.30717.126
3+
# Visual Studio Version 17
4+
VisualStudioVersion = 17.11.35222.181
55
MinimumVisualStudioVersion = 10.0.40219.1
66
Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Kemp", "Kemp\Kemp.csproj", "{33FBC5A1-3466-4F10-B9A6-7186F804A65A}"
77
EndProject

Kemp/Kemp.csproj

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
<Project Sdk="Microsoft.NET.Sdk">
22

33
<PropertyGroup>
4-
<TargetFramework>netcoreapp3.1</TargetFramework>
5-
<RootNamespace>Keyfactor.Extensions.Orchestrator.Kemp</RootNamespace>
4+
<AppendTargetFrameworkToOutputPath>true</AppendTargetFrameworkToOutputPath>
5+
<TargetFrameworks>net6.0;net8.0</TargetFrameworks>
66
<CopyLocalLockFileAssemblies>true</CopyLocalLockFileAssemblies>
7+
<ImplicitUsings>disable</ImplicitUsings>
78
</PropertyGroup>
89

910
<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|AnyCPU'">
@@ -22,7 +23,7 @@
2223
<PackageReference Include="Keyfactor.Orchestrators.IOrchestratorJobExtensions" Version="0.6.0" />
2324
<PackageReference Include="Newtonsoft.Json" Version="13.0.1" />
2425
<PackageReference Include="Portable.BouncyCastle" Version="1.9.0" />
25-
<PackageReference Include="RestSharp" Version="107.2.1" />
26+
<PackageReference Include="RestSharp" Version="112.1.0" />
2627
<PackageReference Include="System.Management.Automation" Version="7.0.5" />
2728
</ItemGroup>
2829

README.md

Lines changed: 376 additions & 76 deletions
Large diffs are not rendered by default.

docsource/content.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
## Overview
2+
3+
The Kemp Load Balancer Universal Orchestrator extension enables remote management of cryptographic certificates on Kemp Load Balancers. Kemp Load Balancers use certificates to secure HTTP and HTTPS traffic efficiently, ensuring that sensitive data is encrypted during transit. This extension integrates with Keyfactor Command to automate the process of inventorying, adding, and removing certificates within Kemp Load Balancer environments. By leveraging this orchestrator, administrators can easily manage SSL/TLS certificates, ensuring the security and reliability of their load balancing infrastructure.
4+

docsource/kemp.md

Lines changed: 149 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,149 @@
1+
# Enabling API Access for Keyfactor on Kemp LoadMaster
2+
3+
This guide explains how to enable API access for a specific user on a Kemp LoadMaster appliance to allow Keyfactor Orchestrator integrations for certificate management and inventory operations.
4+
5+
---
6+
7+
## 🧩 Step-by-Step: Enabling API Access for a User
8+
9+
### 1. Log in to the Kemp Web UI
10+
- In your browser, go to:
11+
```
12+
https://<loadmaster-hostname-or-ip>:8443
13+
```
14+
- Log in as an administrator account that can manage users.
15+
16+
---
17+
18+
### 2. Edit the User Permissions
19+
1. In the left-hand menu, navigate to:
20+
```
21+
System Configuration → System Administration → User Management
22+
```
23+
2. Locate the user account that will be used by the Keyfactor Orchestrator (for example: `bhill`).
24+
3. Click **Modify** next to that user to open the **Permissions for User** screen.
25+
4. Under **Rules**, enable the following options:
26+
-**Certificate Creation**
27+
-**Intermediate Certificates**
28+
5. Click **Set Permissions** to apply the changes.
29+
30+
These permissions allow the orchestrator to create and manage intermediate and server certificates.
31+
32+
---
33+
34+
### 3. Generate and Record the API Key
35+
1. Scroll down to the **API Keys** section.
36+
2. Click **Generate New APIKey** to create a new key for API authentication.
37+
3. Copy and securely store this key — it will be used in your Keyfactor orchestrator configuration as the **ServerPassword** or **API Key**.
38+
4. You can later use **Delete** to revoke it if needed.
39+
40+
---
41+
42+
### 4. Verify API Access
43+
Use a command line or PowerShell session to verify connectivity:
44+
45+
#### Using curl:
46+
```bash
47+
curl -k -H "Authorization: <API_KEY>" https://<loadmaster-ip>:8443/access/list
48+
```
49+
50+
#### Using PowerShell:
51+
```powershell
52+
Invoke-RestMethod -Uri "https://<loadmaster-ip>:8443/access/list" -Headers @{ Authorization = "<API_KEY>" } -SkipCertificateCheck
53+
```
54+
55+
If you receive a JSON response, API access is successfully configured.
56+
57+
### ✅ Summary of Required Settings
58+
59+
| Setting | Location | Value |
60+
|----------|-----------|--------|
61+
| Certificate Creation | User Permissions | Enabled |
62+
| Intermediate Certificates | User Permissions | Enabled |
63+
| API Key | User Management (Modify user) | Generated |
64+
| Allow Web Administrative Access | Remote Access | Enabled |
65+
| Enable API Interface | Remote Access | Enabled |
66+
| Port | Remote Access | 8443 |
67+
| Authentication Method | Remote Access | Password Only (default) |
68+
69+
---
70+
71+
## Kemp LoadMaster Orchestrator – Behavior Summary
72+
73+
This document summarizes the observed behaviors of the **Kemp LoadMaster Orchestrator** integration during SSL and Intermediate Certificate management operations.
74+
It details how the orchestrator interacts with the LoadMaster API, handles overwrite logic, manages bindings, and synchronizes data with Keyfactor Command.
75+
76+
---
77+
78+
### 🧩 Overall Integration Behavior
79+
80+
- The orchestrator communicates with the **Kemp LoadMaster REST API** using the configured **ServerUsername**, **API Key**, and **SSL (HTTPS)** over port 8443.
81+
- Operations are driven by the **Overwrite flag** and **Alias Name** supplied in the job parameters.
82+
- Certificates are managed in two categories:
83+
- **SSL Certificates** – used by virtual services (may be bound/unbound).
84+
- **Intermediate Certificates** – uploaded supporting CA chain files.
85+
- The orchestrator validates overwrite rules, binding constraints, and synchronization with Keyfactor Command for each operation.
86+
87+
---
88+
89+
### 🧪 Test Case Behavior Summary
90+
91+
| # | Case Name | Behavior Summary | Outcome |
92+
|---|------------|------------------|----------|
93+
| **1** | **New Add New Alias SSL Certificates** | When a new alias (`TC1`) is provided and the certificate does not exist, the orchestrator successfully uploads a new SSL certificate to the LoadMaster and registers it in Keyfactor. | ✅ New certificate created successfully. |
94+
| **2** | **Replace Alias SSL Certificates** | The orchestrator detects an existing alias (`TC1`) and, with **Overwrite=True**, replaces the existing SSL certificate. The old certificate file is overwritten. | ✅ Replacement successful. |
95+
| **3** | **Replace Alias SSL Certificates (No Overwrite)** | Attempting to replace an existing alias without the overwrite flag causes the orchestrator to abort the operation and return an error indicating the flag is required. | ✅ Expected error: “Overwrite flag should be used.” |
96+
| **4** | **Replace Alias Bound SSL Certificates** | When a certificate bound to a virtual service is replaced with **Overwrite=True**, the orchestrator updates the certificate file while maintaining the existing service binding. | ✅ Bound certificate replaced in place. |
97+
| **5** | **Remove Bound SSL Certificate** | The orchestrator prevents removal of any certificate that is currently bound to a virtual service, returning an error message. | ✅ Error handled correctly (“cannot remove bound certificates”). |
98+
| **6** | **Remove Unbound SSL Certificate** | The orchestrator removes an SSL certificate only if it is unbound, confirming removal through the LoadMaster API. | ✅ Certificate removed successfully. |
99+
| **7** | **New Add New Alias Intermediate Certificates** | A new intermediate certificate (`TC8b`) is uploaded since no alias conflict exists. It appears under the Intermediate Certificates list. | ✅ Intermediate certificate created. |
100+
| **8** | **Replace Alias Intermediate Certificates** | Kemp does not support overwriting intermediate certificates. The orchestrator logs and returns the expected API error (`Filename already exists`). | ✅ Expected failure recorded. |
101+
| **9** | **Remove Intermediate Certificates** | The orchestrator deletes the intermediate certificate (`TC8b`) from the LoadMaster and synchronizes removal from Keyfactor Command. | ✅ Certificate removed successfully. |
102+
| **10** | **Inventory Intermediate Certificates** | Performs an inventory scan of all intermediate certificates on the LoadMaster, importing them into Keyfactor Command. | ✅ Inventory successful. |
103+
| **11** | **Inventory SSL Certificates** | Enumerates all SSL certificates (bound and unbound) on the LoadMaster and updates Keyfactor’s inventory accordingly. | ✅ Inventory successful. |
104+
105+
---
106+
107+
### ⚙️ Functional Insights
108+
109+
- **Overwrite Logic:** SSL certificates respect the `Overwrite` flag. Intermediate certificates cannot be overwritten.
110+
- **Binding Awareness:** The orchestrator checks for bound services before delete or replace operations.
111+
- **Error Handling:** Clear API error messages are surfaced in Keyfactor job logs.
112+
- **Synchronization:** Add/Remove/Inventory maintain consistent state between Keyfactor and LoadMaster.
113+
- **Security:** All operations occur over HTTPS using API Key authentication.
114+
115+
---
116+
117+
### ✅ Operation Coverage Summary
118+
119+
| Operation | Certificate Type | Supported | Notes |
120+
|------------|------------------|------------|--------|
121+
| Add | SSL || Creates new alias or replaces with overwrite flag |
122+
| Replace | SSL || Requires `Overwrite=True` |
123+
| Replace | Intermediate || Unsupported – API rejects |
124+
| Remove | SSL || Allowed only if unbound |
125+
| Remove | Intermediate || Fully supported |
126+
| Inventory | SSL || Returns all SSL certificates |
127+
| Inventory | Intermediate || Returns all intermediate certificates |
128+
129+
---
130+
131+
## TEST CASES
132+
Case Number|Case Name|Case Description|Overwrite Flag|Alias Name|Expected Results|Passed|Screenshots
133+
------------|---------|----------------|--------------|----------|----------------|--------------|------------
134+
1|New Add New Alias SSL Certificates|Will Create a new SSL Certificate|False|TC1|New SSL Certificate with Alias TC1 Created On Kemp LoadMaster|True|![](images/TC1Results.gif)
135+
2|Replace Alias SSL Certificates|Will Replace SSL Certificate|True|TC1|SSL Certificate with Alias TC1 Replaced On Kemp LoadMaster|True|![](images/TC2Results.gif)
136+
3|Replace Alias SSL Certificates no Overwrite|Will Replace SSL Certificate|False|TC1|Error should occur stating Overwrite flag should be used|True|![](images/TC3Results.gif)
137+
4|Replace Alias Bound SSL Certificates|Will Replace Bound SSL Certificate|True|TC1|Bound Certificate should be replaced|True|![](images/TC4Results.gif)
138+
5|Remove Bound SSL Certificate|Should fail as you cannot remove Bound Certificates|N/A|TC1|Error Occurs stating you cannot remove bound certificates.|True|![](images/TC5Results.gif)
139+
6|Remove UnBound SSL Certificate|Try to remove SSL Certificate that is UnBound|N/A|TC8a|Unbound Certificate Is Removed from LoadMaster.|True|![](images/TC6Results.gif)
140+
7|New Add New Alias Intermediate Certificates|Will Create a new Intermediate Certificate|False|TC8b|New Intermediate Certificate with Alias TC8b Created On Kemp LoadMaster|True|![](images/TC7Results.gif)
141+
8|Replace Alias Intermediate Certificates|You cannot replace intermediate certificates|True|TC8b|Command Failed: Filename already exists|True|![](images/TC8Results.gif)
142+
9|Remove Intermediate Certificates|Intermediate Certificate Will Be Removed|N/A|TC8b|Intermediate Certificate Is Removed From Keyfactor and the LoadMaster|True|![](images/TC9Results.gif)
143+
10|Inventory Intermediate Certificates|Intermediate Certificate Will Be Inventoried|N/A|N/A|Intermediate Certificate Is Inventoried to Keyfactor|True|![](images/TC10Results.gif)
144+
11|Inventory SSL Certificates|SSL Certificate Will Be Inventoried|N/A|N/A|SSL Certificate Is Inventoried to Keyfactor|True|![](images/TC11Results.gif)
145+
146+
## Overview
147+
148+
TODO Overview is a required section
149+

integration-manifest.json

Lines changed: 96 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,98 @@
11
{
2-
"$schema": "https://keyfactor.github.io/integration-manifest-schema.json",
3-
"integration_type": "orchestrator",
4-
"name": "Kemp Load Balancer",
5-
"status": "production",
6-
"description": "Kemp Load Balancer for Add, Remove and Inventory.",
7-
"about": {
8-
"orchestrator": {
9-
"win": {
10-
"supportsCreateStore": false,
11-
"supportsDiscovery": false,
12-
"supportsManagementAdd": true,
13-
"supportsManagementRemove": true,
14-
"supportsReenrollment": false,
15-
"supportsInventory": true,
16-
"platformSupport": "Unused"
17-
},
18-
"linux": {
19-
"supportsCreateStore": false,
20-
"supportsDiscovery": false,
21-
"supportsManagementAdd": false,
22-
"supportsManagementRemove": false,
23-
"supportsReenrollment": false,
24-
"supportsInventory": false,
25-
"platformSupport": "Unused"
26-
}
27-
}
28-
}
2+
"$schema": "https://keyfactor.github.io/integration-manifest-schema.json",
3+
"integration_type": "orchestrator",
4+
"name": "Kemp Load Balancer Orchestrator",
5+
"status": "production",
6+
"update_catalog": true,
7+
"link_github": true,
8+
"support_level": "kf-supported",
9+
"release_project": "Kemp/Kemp.csproj",
10+
"release_dir": "Kemp/bin/Release",
11+
"description": "Kemp Load Balancer for Add, Remove and Inventory.",
12+
"about": {
13+
"orchestrator": {
14+
"UOFramework": "10.4",
15+
"keyfactor_platform_version": "10.4",
16+
"pam_support": true,
17+
"win": {
18+
"supportsCreateStore": false,
19+
"supportsDiscovery": false,
20+
"supportsManagementAdd": true,
21+
"supportsManagementRemove": true,
22+
"supportsReenrollment": false,
23+
"supportsInventory": true,
24+
"platformSupport": "Unused"
25+
},
26+
"linux": {
27+
"supportsCreateStore": false,
28+
"supportsDiscovery": false,
29+
"supportsManagementAdd": false,
30+
"supportsManagementRemove": false,
31+
"supportsReenrollment": false,
32+
"supportsInventory": false,
33+
"platformSupport": "Unused"
34+
},
35+
"store_types": [
36+
{
37+
"Name": "Kemp",
38+
"ShortName": "Kemp",
39+
"Capability": "Kemp",
40+
"LocalStore": false,
41+
"SupportedOperations": {
42+
"Add": true,
43+
"Create": false,
44+
"Discovery": false,
45+
"Enrollment": false,
46+
"Remove": true
47+
},
48+
"Properties": [
49+
{
50+
"Name": "ServerUsername",
51+
"DisplayName": "Server Username",
52+
"Type": "Secret",
53+
"DependsOn": "",
54+
"DefaultValue": "",
55+
"Required": false,
56+
"IsPAMEligible": true,
57+
"Description": "Not used."
58+
},
59+
{
60+
"Name": "ServerPassword",
61+
"DisplayName": "Server Password",
62+
"Type": "Secret",
63+
"DependsOn": "",
64+
"DefaultValue": "",
65+
"Required": false,
66+
"IsPAMEligible": true,
67+
"Description": "Kemp Api Password. (or valid PAM key if the username is stored in a KF Command configured PAM integration)."
68+
},
69+
{
70+
"Name": "ServerUseSsl",
71+
"DisplayName": "Use SSL",
72+
"Type": "Bool",
73+
"DependsOn": "",
74+
"DefaultValue": "true",
75+
"Required": true,
76+
"IsPAMEligible": false,
77+
"Description": "Should be true, http is not supported."
78+
}
79+
],
80+
"EntryParameters": [],
81+
"ClientMachineDescription": "Kemp Load Balancer Client Machine and port example TestKemp:8443.",
82+
"StorePathDescription": "Not used just put a /",
83+
"PasswordOptions": {
84+
"EntrySupported": false,
85+
"StoreRequired": false,
86+
"Style": "Default"
87+
},
88+
"PrivateKeyAllowed": "Optional",
89+
"JobProperties": [],
90+
"ServerRequired": true,
91+
"PowerShell": false,
92+
"BlueprintAllowed": false,
93+
"CustomAliasAllowed": "Required"
94+
}
95+
]
96+
}
97+
}
2998
}

0 commit comments

Comments
 (0)