You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -554,7 +554,7 @@ To use the Azure Key Vault Universal Orchestrator extension, you **must** create
554
554
555
555
556
556
557
-
### AKV
557
+
<details><summary>Click to expand details</summary>
558
558
559
559
The Azure Keyvault Certificate Store Type is designed to integrate with Microsoft Azure Key Vault, enabling users to
560
560
manage and automate the lifecycle of cryptographic certificates stored in Azure Key Vault through Keyfactor Command.
@@ -567,8 +567,7 @@ including Service Principals, User Assigned Managed Identities, and System Assig
567
567
that only authorized entities can manage the certificates stored within the Key Vault.
568
568
569
569
While this Certificate Store Type provides a powerful means of managing certificates, there are some important caveats
570
-
to consider. For example, if your instance of Azure Key Vault utilizes private or custom endpoints, or is hosted outside
571
-
of the Azure Public cloud (e.g., Government, China, Germany instances), certain functions like discovery job
570
+
to consider. For example, if your instance of Azure Key Vault utilizes private or custom endpoints, or is hosted outside the Azure Public cloud (e.g., Government, China, Germany instances), certain functions like discovery job
572
571
functionality may not be supported. Additionally, the configuration of access control through Azure's Role Based Access
573
572
Control (RBAC) or classic Access Policies must be meticulously managed to ensure sufficient permissions for the
574
573
orchestrator to perform its tasks.
@@ -589,7 +588,9 @@ Certificate Store Type within your organization’s security framework.
589
588
| Reenrollment | 🔲 Unchecked |
590
589
| Create | ✅ Checked |
591
590
592
-
#### Creation Using kfutil:
591
+
#### Store Type Creation
592
+
593
+
##### Using kfutil:
593
594
`kfutil` is a custom CLI for the Keyfactor Command API and can be used to created certificate store types.
594
595
For more information on [kfutil](https://github.com/Keyfactor/kfutil) check out the [docs](https://github.com/Keyfactor/kfutil?tab=readme-ov-file#quickstart)
595
596
<details><summary>Click to expand AKV kfutil details</summary>
@@ -612,9 +613,8 @@ For more information on [kfutil](https://github.com/Keyfactor/kfutil) check out
612
613
613
614
614
615
#### Manual Creation
615
-
If you do not wish to use the `kfutil` CLI then certificate store types can be creating in the web UI as described below.
616
-
617
-
616
+
Below are instructions on how to create the AKV store type manually in
617
+
the Keyfactor Command Portal
618
618
<details><summary>Click to expand manual AKV details</summary>
619
619
620
620
Create a store type called `AKV` with the attributes in the tables below:
@@ -822,7 +822,7 @@ Please refer to the **Universal Orchestrator (remote)** usage section ([PAM prov
822
822
823
823
### Azure Keyvault Discovery Job
824
824
825
-
1) Navigate to Orchestrators > Management in the platform.
825
+
1) Navigate to `Orchestrators > Management`in the platform.
826
826
827
827

828
828
@@ -837,11 +837,11 @@ Please refer to the **Universal Orchestrator (remote)** usage section ([PAM prov
0 commit comments