You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dns/providers/azuredns.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ _Azure DNS documentation originally written by: Tony Johncock @Tony1044_
9
9
10
10
# To Configure using Azure Portal
11
11
12
-
## Create an Azure AD Service Principle
12
+
## Create an Azure AD Service Principal
13
13
14
14
- In Azure Active Directory, create a user who will then be assigned permissions to update your DNS zone, this can be an App registration. **Take note of your Application (client) ID and Directory (tenant) ID.**
15
15
- In your DNS Zone, use the Access Control (IAM) option to Add a Role Assignment (DNS Zone Contributor). **Take note of your DNS Zone resource-group name and Subscription ID**
Copy file name to clipboardExpand all lines: docs/hub/guides/ccm.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,25 +67,25 @@ The hub does not currently have global settings that can be pushed to all manage
67
67
68
68
If you manage instances across different organizations (e.g. if you are an MSP etc), consider creating multiple joining keys to partition by organization. This allows you to revoke hub access for specific groups without affecting unrelated instances.
69
69
70
-
### 1. Add a Security Principle for Managed Instances
70
+
### 1. Add a Security Principal for Managed Instances
71
71
72
72
This step may be unnecessary in current versions where it's auto-created.
73
73
74
74
1. In the hub, navigate to **Security > Users**
75
-
2. Click **Add New Security Principle**
75
+
2. Click **Add New Security Principal**
76
76
3. Configure as follows:
77
77
-**Type**: Application/Service
78
78
-**Title**: "Hub Managed Instance"
79
-
-**Description**: "Principle for Management Hub Instance Joining"
80
-
4. After adding, click the **Roles icon** (People+ icon) next to the new security principle's ID
79
+
-**Description**: "Principal for Management Hub Instance Joining"
80
+
4. After adding, click the **Roles icon** (People+ icon) next to the new security principal's ID
81
81
5. Select the `Management Hub Managed Instance` role from Available Roles
82
82
6. Click **Save**
83
83
84
84
### 2. Create an API Key for Joining Instances
85
85
86
86
1. Navigate to **Settings > Security > API Access**
87
87
2. Click **Add API Token**
88
-
3. Select **Managed Instances Service Principle**
88
+
3. Select **Managed Instances Service Principal**
89
89
4. Enter **Instance Joining Key** as the title
90
90
5. Select **Management Hub Managed Instance** as the scoped role
91
91
-**Important:** Click **Add/Remove Role Scope** to add it to the scope list
- Populate the *Domain Match Rule* to specify the domains this configuration can update DNS for, then Save.
30
30
31
31
### 2. Configure API Access
32
-
Before you can use your managed challenge you need to configure API access. This involves assigning an API token for a specific *Service Principle* (a specific user or app).
32
+
Before you can use your managed challenge you need to configure API access. This involves assigning an API token for a specific *Service Principal* (a specific user or app).
33
33
34
34
Under *Settings > Security > Users*, add a User to represent the consumer (user or app etc) accessing the service, then assign them the Managed Challenge Consumer Role. They can have any other roles they need, but you'll need this specific role to access managed challenges.
35
35
36
-
Under *Settings > Security > API Access*, select Add API Token, select the required security principle, enter a descriptive title etc for this consumer token so you know why it exists and what it's being used for. To scope the API access token to managed challenges only, select Managed Challenge Consumer from the Role list and click Add/Remove Role Scope, then Save. A new API token will be created and you will need the Client ID and Secret values to access the API and use the managed challenge.
36
+
Under *Settings > Security > API Access*, select Add API Token, select the required security principal, enter a descriptive title etc for this consumer token so you know why it exists and what it's being used for. To scope the API access token to managed challenges only, select Managed Challenge Consumer from the Role list and click Add/Remove Role Scope, then Save. A new API token will be created and you will need the Client ID and Secret values to access the API and use the managed challenge.
37
37
38
38
1. In the hub, navigate to **Settings > Security > Users**
39
39
2. Click **Add User**
40
40
3. Configure as follows:
41
41
-**Type**: Application/Service
42
42
-**Title**: "Managed Challenge User" (for example, to help identify the consumer of the managed challenge)
4. After adding, click the **Roles icon** (People+ icon) next to the new security principle's ID
44
+
4. After adding, click the **Roles icon** (People+ icon) next to the new security principal's ID
45
45
5. Select the `Managed Challenge Consumer` role from Available Roles to assign it.
46
46
6. Click **Save**
47
47
48
48
### 3. Create an API Key to use the managed challenge
49
49
50
50
1. Navigate to **Settings > Security > API Access**
51
51
2. Click **Add API Token**
52
-
3. Select **Managed Challenge User** as the security principle.
52
+
3. Select **Managed Challenge User** as the security principal.
53
53
4. Enter **Managed Challenge API Key** as the title
54
54
5. Select **Managed Challenge Consumer** as the scoped role
55
55
-**Important:** Click **Add/Remove Role Scope** to add it to the scope list
@@ -59,10 +59,11 @@ Under *Settings > Security > API Access*, select Add API Token, select the requi
59
59
#### Combined Hub joining and Managed Challenge Key
60
60
It is possible to create a combined hub joining key and managed challenge key, which certain clients (such as Certify Certificate Manager) can use by default if they already know the hub joining key. This is provided as an option for convenience but is not configured by default.
61
61
62
-
To enable this, add the Managed Challenge Consumer role to the managed instance service principle (or a new service principle), then create a new hub joining key with both the *Hub Managed Instance* role and *Managed Challenge Consumer* role scope.
62
+
To enable this, add the Managed Challenge Consumer role to the managed instance service principal (or a new service principal), then create a new hub joining key with both the *Hub Managed Instance* role and *Managed Challenge Consumer* role scope.
63
63
64
64
### Configure your ACME Client
65
65
Where an ACME client supports Certify Managed Challenges you will follow the normal process used by that client for selecting that provider and you will be required to specify the Client ID and Secret from the above configuration, you will also need to specify the Management Hub API Url. When you then perform your certificate order it will call the Management Hub API to complete the DNS updates required.
66
66
67
-
In Certify Certificate Manager, under Authorization, select dns-01 as the Challenge Type, and Certify Managed Challenge API as the provider, then add the required credentials.
67
+
#### Using with Certify Certificate Manager
68
+
In *Certify Certificate Manager*, under Authorization, select dns-01 as the Challenge Type, and *Certify Managed Challenge API* as the provider, then add/select the required managed challenge consumer credentials. If the instance is joined to the hub you can leave the hub API url blank.
Copy file name to clipboardExpand all lines: docs/hub/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ The product is available to try out as an release candidate version (shortly to
15
15
**All the core features of [Certify Certificate Manager](../intro.md), with a web based management UI and API.**
16
16
-**Self-hosted, cross-platform including Linux, macOS or Windows.**
17
17
- Optionally manage thousands of certs across hundreds of existing *Certify Certificate Manager* instances, or renew centrally, from a "single pane of glass" UI.
18
-
- Multi-user role based access security for administration and consuming certificates, with support for app/service security principles and individual scoped API access
18
+
- Multi-user role based access security for administration and consuming certificates, with support for app/service security principal and individual scoped API access
19
19
- Optional single sign on with [OIDC support](./guides/oidc.md) via providers such as Azure Entra.
20
20
- Distribute certs using optional installed agents, deployment tasks, or use the API to pull the latest cert using your own integrations.
21
21
- Optional centralized DNS challenges compatible with most popular ACME clients, so that privileged DNS credentials do not need to be stored across individual ACME clients.
0 commit comments