You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can have multiple different CyberArk `Issuer` types installed within the same
14
-
cluster, including mixtures of issuers configured to enroll from the CyberArk
15
-
Certificate Manager SaaS and self-hosted. This allows you to be flexible in the
14
+
cluster, including mixtures of issuers configured to enroll from the CyberArk
15
+
Certificate Manager SaaS and self-hosted. This allows you to be flexible in the
16
16
deployment method that you prefer to use.
17
17
18
18
Automated certificate renewal and management are provided for `Certificates`
@@ -33,7 +33,7 @@ resources, read the [Namespaces](../concepts/issuer.md#namespaces) section.
33
33
34
34
If you haven't already done so, create your CyberArk Certificate Manager SaaS
35
35
account on this [page](https://www.cyberark.com/try-buy/certificate-manager-saas-trial/)
36
-
and copy the API key from your user preferences. Then, you may want to create a
36
+
and copy the API key from your user preferences. Then, you may want to create a
37
37
custom CA Account and Issuing Template, or choose to use the defaults created
38
38
automatically for testing ("Built-in CA" and "Default", respectively). Lastly,
39
39
create an Application to establish ownership of all certificates requested by
@@ -114,8 +114,8 @@ Certificate Manager.
114
114
The setup is similar to the CyberArk Certificate Manager SaaS configuration
115
115
above, however some of the connection parameters are slightly different.
116
116
117
-
> **Note**: You *must* allow "User Provided CSRs" as part of your policy in
118
-
> CyberArk Certificate Manager Self-Hosted, as this is the only type supported
117
+
> **Note**: You *must* allow "User Provided CSRs" as part of your policy in
118
+
> CyberArk Certificate Manager Self-Hosted, as this is the only type supported
119
119
> by cert-manager at this time.
120
120
>
121
121
> More specifically, the valid configurations of the "CSR handling" are:
@@ -189,7 +189,7 @@ credentials.
189
189
190
190
### Username / Password Authentication
191
191
192
-
> **Note**: when using username / password authentication, cert-manager will manage the generation of access token for you. cert-manager does not use refresh tokens to renew access token.
192
+
> **Note**: when using username / password authentication, cert-manager will manage the generation of access token for you. cert-manager does not use refresh tokens to renew access token.
193
193
194
194
1. Create a new user with sufficient privileges to manage certificates in a particular policy folder (zone).
195
195
@@ -201,7 +201,7 @@ credentials.
201
201
Set the "Base Access Settings" to `certificate: manage`.
202
202
203
203
"Edit Access" to the new application integration, and allow it to be used by the user you created earlier.
204
-
204
+
205
205
3. Save the credentials to a Secret in the Kubernetes cluster
Copy file name to clipboardExpand all lines: content/docs/tutorials/venafi/venafi.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -248,9 +248,7 @@ retrieve your Certificates from.
248
248
249
249
### CyberArk Certificate Manager Self-Hosted
250
250
251
-
Assuming you already have a self-hosted instance of CyberArk Certificate Manager
252
-
set up properly, you can create a CyberArk issuer that can be used to issue
253
-
certificates.
251
+
Assuming you already have a self-hosted instance of CyberArk Certificate Manager set up properly, you can create a CyberArk issuer that can be used to issue certificates.
254
252
255
253
To do this, you need to make sure you have your *username* and *password* for
256
254
your CyberArk Certificate Manager Self-Hosted instance.
0 commit comments