Skip to content

Commit b857544

Browse files
authored
Documentation fix (#22)
Update RFKDB Certificate Store Type instructions
1 parent 34c782f commit b857544

File tree

2 files changed

+28
-2
lines changed

2 files changed

+28
-2
lines changed

README.md

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,32 @@ It is not necessary to implement all of the secrets available to be managed by a
5555
Setting up a PAM provider for use involves adding an additional section to the manifest.json file for this extension as well as setting up the PAM provider you will be using. Each of these steps is specific to the PAM provider you will use and are documented in the specific GitHub repo for that provider. For a list of Keyfactor supported PAM providers, please reference the [Keyfactor Integration Catalog](https://keyfactor.github.io/integrations-catalog/content/pam).
5656

5757

58+
### Register the PAM Provider
59+
60+
A PAM Provider needs to be registered on the Universal Orchestrator in the same way other extensions are. Create a folder for the specific PAM Provider to be added, and place the contents of the PAM Provider into the folder. There needs to be a manifest.json with the PAM Provider.
61+
62+
After a manifest.json is added, the final step for configuration is setting the "provider-level" parameters for the PAM Provider. These are also known as the "initialization-level" parameters. These need to be placed in a json file that gets loaded by the Orchestrator by default.
63+
64+
example manifest.json for MY-PROVIDER-NAME
65+
```
66+
{
67+
"extensions": {
68+
"Keyfactor.Platform.Extensions.IPAMProvider": {
69+
"PAMProviders.MY-PROVIDER-NAME.PAMProvider": {
70+
"assemblyPath": "my-pam-provider.dll",
71+
"TypeFullName": "Keyfactor.Extensions.Pam.MyPamProviderClass"
72+
}
73+
}
74+
},
75+
"Keyfactor:PAMProviders:MY-PROVIDER-NAME:InitializationInfo": {
76+
"InitParam1": "InitValue1",
77+
"InitParam2": "InitValue2"
78+
}
79+
}
80+
```
81+
82+
83+
5884

5985
---
6086

@@ -301,7 +327,7 @@ CURL script to automate certificate store type creation can be found [here](Cert
301327
**RFKDB Certificate Store Type**
302328
**************************************
303329

304-
The RFKDB store type can be used to manage IBM Key Database Files (KDB) files. The IBM utility, GSKCAPICMD, is used to read and write certificates from and to the target store and is therefore required to be installed on the server where the Keyfactor Orchestrator Service is installed, and its location MUST be in the system $Path.
330+
The RFKDB store type can be used to manage IBM Key Database Files (KDB) files. The IBM utility, GSKCAPICMD, is used to read and write certificates from and to the target store and is therefore required to be installed on the server where each KDB certificate store being managed resides, and its location MUST be in the system $Path.
305331

306332
Use cases supported:
307333
1. One-to-many trust entries - A single certificate without a private key in a certificate store. Each certificate identified with a custom alias or certificate thumbprint.

readme_source.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ CURL script to automate certificate store type creation can be found [here](Cert
240240
**RFKDB Certificate Store Type**
241241
**************************************
242242

243-
The RFKDB store type can be used to manage IBM Key Database Files (KDB) files. The IBM utility, GSKCAPICMD, is used to read and write certificates from and to the target store and is therefore required to be installed on the server where the Keyfactor Orchestrator Service is installed, and its location MUST be in the system $Path.
243+
The RFKDB store type can be used to manage IBM Key Database Files (KDB) files. The IBM utility, GSKCAPICMD, is used to read and write certificates from and to the target store and is therefore required to be installed on the server where each KDB certificate store being managed resides, and its location MUST be in the system $Path.
244244

245245
Use cases supported:
246246
1. One-to-many trust entries - A single certificate without a private key in a certificate store. Each certificate identified with a custom alias or certificate thumbprint.

0 commit comments

Comments
 (0)