You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -388,7 +389,7 @@ public virtual (List<string>, List<string>) GetVaults()
388
389
varwarning=$"Exception thrown performing discovery on tenantId {searchTenantId} and subscription ID {searchSubscription}. Exception message: {ex.Message}";
Copy file name to clipboardExpand all lines: CHANGELOG.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,9 @@
1
1
- 3.2.0
2
-
- Fancy new features here
2
+
- Added an optional entry parameter to indicate whether the private key of the cert should be not exportable when stored in KeyVault
3
+
- Now specifying the pkcs12 format when wirting certs to Azure KeyVault. This should prevent the error when a PEM cert was added outside of Command and then we attempt to update without specifying the format (Azure assumes PEM and throws an error if not).
4
+
3
5
- 3.1.9
4
6
- Added optional entry parameter to indicate that existing tags should be preserved if certificate is replaced
5
-
- bug fix for government cloud host name resolution
6
7
7
8
- 3.1.8
8
9
- Fixed bug where enrollment would fail if the CertificateTags field was not defined as an entry parameter
@@ -13,7 +14,6 @@
13
14
- Added support for Azure KeyVault Certificate Metadata via Entry Parameters
14
15
- Fixed issue where an error would be returned during Inventory if 0 certificates were found
15
16
- Converted to BouncyCastle crypto libraries
16
-
17
17
18
18
- 3.1.6
19
19
- Preventing CertStore parameters from getting used if present but empty.
| CertificateTags | Certificate Tags | If desired, tags can be applied to the KeyVault entries. Provide them as a JSON string of key-value pairs ie: '{'tag-name': 'tag-content', 'other-tag-name': 'other-tag-content'}' | string || 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
666
704
| PreserveExistingTags | Preserve Existing Tags | If true, this will perform a union of any tags provided with enrollment with the tags on the existing cert with the same alias and apply the result to the new certificate. | Bool | False | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
705
+
| NonExportable | Non Exportable Private Key | If true, this will mark the certificate as having a non-exportable private key when importing into Azure KeyVault | Bool | False | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked | 🔲 Unchecked |
If desired, tags can be applied to the KeyVault entries. Provide them as a JSON string of key-value pairs ie: '{'tag-name': 'tag-content', 'other-tag-name': 'other-tag-content'}'
If true, this will perform a union of any tags provided with enrollment with the tags on the existing cert with the same alias and apply the result to the new certificate.
1.**Download the latest Azure Key Vault Universal Orchestrator extension from GitHub.**
677
736
678
-
Navigate to the [Azure Key Vault Universal Orchestrator extension GitHub version page](https://github.com/Keyfactor/azurekeyvault-orchestrator/releases/latest). Refer to the compatibility matrix below to determine whether the`net6.0` or `net8.0` asset should be downloaded. Then, click the corresponding asset to download the zip archive.
737
+
Navigate to the [Azure Key Vault Universal Orchestrator extension GitHub version page](https://github.com/Keyfactor/azurekeyvault-orchestrator/releases/latest). Refer to the compatibility matrix below to determine the asset should be downloaded. Then, click the corresponding asset to download the zip archive.
679
738
680
739
| Universal Orchestrator Version | Latest .NET version installed on the Universal Orchestrator server |`rollForward` condition in `Orchestrator.runtimeconfig.json`|`azurekeyvault-orchestrator` .NET version to download |
0 commit comments