You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+11-3Lines changed: 11 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,12 +50,15 @@ Please refer to the READMEs for each supported store type for more information o
50
50
|-----|-----|------|
51
51
|Orchestrated Server hosting certificate store(s) on remote Windows server|WinRM connection | SSH connection |
52
52
|Orchestrated Server hosting certificate store(s) on remote Linux server| SSH connection | SSH connection |
53
-
|Certificate store(s) on same server as orchestrator service (Agent)| WinRM connection or local file system | SSH connection or local file system |
53
+
|Certificate store(s) on same server as orchestrator service (Agent)| WinRM connection or local file system | SSH connection or local file system |
54
+
55
+
Note: when creating, adding certificates to, or removing certificates from any store managed by RemoteFile, the destination store file will be recreated. When this occurs current AES encryption algorithms will be used for affected certificates and certificate store files.
54
56
55
57
The Remote File Universal Orchestrator extension implements 6 Certificate Store Types. Depending on your use case, you may elect to use one, or all of these Certificate Store Types. Descriptions of each are provided below.
56
58
57
59
<details><summary>RFJKS (RFJKS)</summary>
58
60
61
+
59
62
### RFJKS
60
63
61
64
The RFJKS store type can be used to manage java keystores of types JKS or PKCS12. If creating a new java keystore and adding a certificate all via Keyfactor Command, the created java keystore will be of type PKCS12, as java keystores of type JKS have been deprecated as of JDK 9.
@@ -68,6 +71,7 @@ Use cases supported:
68
71
69
72
<details><summary>RFPEM (RFPEM)</summary>
70
73
74
+
71
75
### RFPEM
72
76
73
77
The RFPEM store type can be used to manage PEM encoded files.
@@ -84,6 +88,7 @@ NOTE: PEM stores may only have one private key (internal or external) associated
84
88
85
89
<details><summary>RFPkcs12 (RFPkcs12)</summary>
86
90
91
+
87
92
### RFPkcs12
88
93
89
94
The RFPkcs12 store type can be used to manage any PKCS#12 compliant file format INCLUDING java keystores of type PKCS12.
@@ -101,6 +106,7 @@ Use cases not supported:
101
106
102
107
<details><summary>RFDER (RFDER)</summary>
103
108
109
+
104
110
### RFDER
105
111
106
112
The RFDER store type can be used to manage DER encoded files.
@@ -112,6 +118,7 @@ Use cases supported:
112
118
113
119
<details><summary>RFKDB (RFKDB)</summary>
114
120
121
+
115
122
### RFKDB
116
123
117
124
The RFKDB store type can be used to manage IBM Key Database Files (KDB) files. The IBM utility, GSKCAPICMD, is used to read and write certificates from and to the target store and is therefore required to be installed on the server where each KDB certificate store being managed resides, and its location MUST be in the system $Path.
@@ -124,6 +131,7 @@ Use cases supported:
124
131
125
132
<details><summary>RFORA (RFORA)</summary>
126
133
134
+
127
135
### RFORA
128
136
129
137
The RFORA store type can be used to manage Pkcs12 Oracle Wallets. Please note that while this should work for Pkcs12 Oracle Wallets installed on both Windows and Linux servers, this has only been tested on wallets installed on Windows. Please note, when entering the Store Path for an Oracle Wallet in Keyfactor Command, make sure to INCLUDE the eWallet.p12 file name that by convention is the name of the Pkcs12 wallet file that gets created.
@@ -610,7 +618,7 @@ The Remote File Universal Orchestrator extension implements 6 Certificate Store
| Between `11.0.0` and `11.5.1` (inclusive) |`net6.0`||`net6.0`|
613
-
| Between `11.0.0` and `11.5.1` (inclusive) |`net8.0`|`Never`|`net6.0`|
621
+
| Between `11.0.0` and `11.5.1` (inclusive) |`net8.0`|`Disable`|`net6.0`|
614
622
| Between `11.0.0` and `11.5.1` (inclusive) |`net8.0`|`LatestMajor`|`net8.0`|
615
623
|`11.6` _and_ newer |`net8.0`||`net8.0`|
616
624
@@ -1410,7 +1418,7 @@ If running as an agent (accessing stores on the server where the Universal Orche
1410
1418
1411
1419
## Developer Notes
1412
1420
1413
-
The Remote File Orchestrator Extension is meant to be extended to be used for other file based certificate store types than the ones referenced above. The advantage to extending this integration rather than creating a new one is that the configuration, remoting, and Inventory/Management/Discovery logic is already written. The developer needs to only implement a few classes and write code to convert the destired file based store to a common format. This section describes the steps necessary to add additional store/file types. Please note that familiarity with the [.Net Core BouncyCastle cryptography library](https://github.com/bcgit/bc-csharp) is a prerequisite for adding additional supported file/store types.
1421
+
The Remote File Orchestrator Extension is designed to be highly extensible, enabling its use with various file-based certificate stores beyond the specific implementations currently referenced above. The advantage to extending this integration rather than creating a new one is that the configuration, remoting, and Inventory/Management/Discovery logic is already written. The developer needs to only implement a few classes and write code to convert the destired file based store to a common format. This section describes the steps necessary to add additional store/file types. Please note that familiarity with the [.Net Core BouncyCastle cryptography library](https://github.com/bcgit/bc-csharp) is a prerequisite for adding additional supported file/store types.
1414
1422
1415
1423
Steps to create a new supported file based certificate store type:
0 commit comments