Skip to content

Commit 8f89cf4

Browse files
author
unknown
committed
Merge v1.0_GW_4.48.0 into v1.0
2 parents 0236450 + baf620a commit 8f89cf4

8 files changed

Lines changed: 362 additions & 10 deletions

File tree

docs/Accessing Akeyless/access-and-authentication-methods/auth-with-universal-identity/index.md

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -174,22 +174,26 @@ Universal Identity Details:
174174

175175
3. Define the remaining parameters as follows:
176176

177-
* **Expiration Date:** Select the access expiration date. This parameter is optional. Leave it empty for access to continue without an expiration date.
177+
* **Expiration Date:** Select the access expiration date. This parameter is optional. Leave it empty for access to continue without an expiration date.
178178

179-
* **Allowed Client IPs:** Enter a comma-separated list of CIDR blocks from which the client can issue calls to the proxy. By "client," we mean cURL, SDK, and so on. This parameter is optional. Leave it empty for unrestricted access.
179+
* **Allowed Client IPs:** Enter a comma-separated list of CIDR blocks from which the client can issue calls to the proxy. By "client," we mean cURL, SDK, and so on. This parameter is optional. Leave it empty for unrestricted access.
180180

181-
* **Allowed Trusted Gateway IPs:** Enter a comma-separated list of CIDR blocks. When specified, the Gateway with the IP from this range will be trusted to forward original client IPs (so they will be visible in the logs).
182-
If empty, the Gateway's IP will be used in the logs.
181+
* **Allowed Trusted Gateway IPs:** Enter a comma-separated list of CIDR blocks. When specified, the Gateway with the IP from this range will be trusted to forward original client IPs (so they will be visible in the logs).
182+
If empty, the Gateway's IP will be used in the logs.
183183

184-
* **Audit Log Sub Claims:** Enter a comma-separated list of sub-claims keys to be included in the Audit Logs.
184+
* **Audit Log Sub Claims:** Enter a comma-separated list of sub-claims keys to be included in the Audit Logs.
185185

186-
* **Allowed Client Type:** Select the allowed client type that will be authorized to use this authentication method. For example, `CLI`, `Web UI`, `SDK`.
186+
* **Allowed Client Type:** Select the allowed client type that will be authorized to use this authentication method. For example, `CLI`, `Web UI`, `SDK`.
187187

188-
* Check **Deny Rotate** if you want to forbid token rotation.
188+
* Check **Deny Rotate** if you want to forbid token rotation.
189189

190-
* Check **Deny Inheritance** if you want to forbid creating child tokens.
190+
* Check **Deny Inheritance** if you want to forbid creating child tokens.
191+
192+
* **TTL (minutes):** Specify token TTL.
193+
194+
* **Tree Length:** Set the number of child tokens that can be created.
191195

192-
* **TTL (minutes):** Specify token TTL.
196+
* **Limit Child TTL:** Set the limitation for the child tokens max TTL
193197

194198
4. Click **Finish**.
195199

@@ -219,8 +223,11 @@ To revoke a token in the Console:
219223
To create a child token in the Console:
220224

221225
1. Open the corresponding authentication method.
226+
222227
2. Go to **UID Tree** tab.
228+
223229
3. Right-click the root node and click **Create child token**.
230+
224231
4. Define the parameters as follows:
225232

226233
* Check **Deny Rotate** if you want to forbid child token rotation.

docs/Advanced Functionality/automatic-migration/resource-discovery.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ When working with [SSH Target](https://docs.akeyless.io/docs/ssh-target), the mi
3535
Note: When using Self Signed Certificate, please mount the matching certificate to the Akeyless Gateway server at `etc/ssl/certs`
3636

3737
> ℹ️ **Note (Active Directory migration compatibility):**
38+
>
3839
> The OpenSSH server is available as a supported Feature-on-Demand in Windows Server 2022, Windows Server 2019, and Windows 10 (build 1809 and later)
3940
4041
## Set Up Automatic Migration for Active Directory
@@ -64,6 +65,8 @@ To create the migration from your Active Directory, log in to your **Gateway Con
6465

6566
* **Discover IIS Applications:** Discover any existing IIS Application that runs with explicit user credentials, as part of the rotated secret those IIS Application will be reflected, and upon Rotation, the relevant IIS Application will be restarted with the latest password.
6667

68+
* **AI Certificate Discovery:** Discover existing certificates across the environment using an AI-driven scanner as part of Active Directory Migration.
69+
6770
> ℹ️ **Note:**
6871
>
6972
> Discover Local Users might require further installations of SSH on the servers, based on the supplied Computer Base DN. This will be done automatically by the migration process

docs/Certificate Lifecycle Management/public-ca.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
next:
1111
description: ''
1212
---
13-
Akeyless supports [ZeroSSL](https://zerossl.com/), [GlobalSign](https://www.globalsign.com/), [Venafi (now part of CyberArk)](https://www.cyberark.com/venafi-and-cyberark-machine-identity-security/), [GoDaddy](https://www.godaddy.com/), [Sectigo](https://www.sectigo.com/), and [Let's Encrypt](https://letsencrypt.org/) as Public CAs.
13+
Akeyless supports [ZeroSSL](https://zerossl.com/), [GlobalSign](https://www.globalsign.com/), [Venafi (now part of CyberArk)](https://www.cyberark.com/venafi-and-cyberark-machine-identity-security/), [GoDaddy](https://www.godaddy.com/), [Sectigo](https://www.sectigo.com/), [Google Trust Services (Google CA)](https://cloud.google.com/security/products/certificate-authority-service), [DigiCert](https://www.digicert.com/), and [Let's Encrypt](https://letsencrypt.org/) as Public CAs.
1414

1515
The public certificate authority will sign and issue the certificate, while Akeyless will store and manage the certificate lifecycle.
1616

docs/Secrets Management/targets/_order.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
- azure-targets
44
- chef-infra-targets
55
- database-targets
6+
- digicert-target
67
- docker-hub-target
78
- gcp-targets
89
- gemini-target
@@ -12,6 +13,7 @@
1213
- globalsign-atlas
1314
- globalsign-target
1415
- godaddy-target
16+
- google-ca-target
1517
- hashicorp-vault-target
1618
- kubernetes-targets
1719
- ldap-target
Lines changed: 111 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,111 @@
1+
---
2+
title: DigiCert Target
3+
deprecated: false
4+
hidden: false
5+
metadata:
6+
robots: index
7+
---
8+
The [Digicert](https://www.digicert.com/) Target enables the use of **Digicert** as a Public Certificate Authority (CA) with an Akeyless [PKI Issuer](https://docs.akeyless.io/docs/ssh-and-pkitls-certificates).
9+
10+
With a public CA, Akeyless cannot access the private key that signs certificates. Akeyless validates certificate issuance requests by connecting to **Digicert** through the [Akeyless Gateway](https://docs.akeyless.io/docs/api-gw).
11+
12+
The **DigiCert** integration uses an [ACME Client (v2)](https://datatracker.ietf.org/doc/html/rfc8555).
13+
14+
To prove domain ownership, the Akeyless integration supports DNS validation:
15+
16+
* **DNS validation**: Ownership is proven by adding a DNS TXT record. This requires the domain to be managed in a supported DNS provider's hosted zone (for example, AWS Route 53, GCP Cloud DNS, or Azure DNS).
17+
18+
## Create a Digicert Target with the CLI
19+
20+
To create a Digicert target with the CLI, use one of the following examples based on the challenge method and DNS provider:
21+
22+
```shell DNS with AWS
23+
akeyless target create digicert \
24+
--name <Target Name> \
25+
--digicert-url <us-production / eu-production / us-demo / eu-demo> \
26+
--email <ACME Account Email> \
27+
--eab-key-id <EAB Key ID> \
28+
--eab-hmac-key <EAB HAMC Key> \
29+
--acme-challenge dns \
30+
--dns-target-creds <AWS DNS Target Name> \
31+
--hosted-zone <Route53 Hosted Zone ID>
32+
```
33+
```shell DNS with GCP
34+
akeyless target create digicert \
35+
--name <Target Name> \
36+
--digicert-url <us-production / eu-production / us-demo / eu-demo> \
37+
--email <ACME Account Email> \
38+
--eab-key-id <EAB Key ID> \
39+
--eab-hmac-key <EAB HAMC Key> \
40+
--acme-challenge dns \
41+
--dns-target-creds <GCP DNS Target Name> \
42+
--gcp-project <GCP Project ID>
43+
```
44+
```shell DNS with Azure
45+
akeyless target create digicert \
46+
--name <Target Name> \
47+
--digicert-url <us-production / eu-production / us-demo / eu-demo> \
48+
--email <ACME Account Email> \
49+
--eab-key-id <EAB Key ID> \
50+
--eab-hmac-key <EAB HAMC Key> \
51+
--acme-challenge dns \
52+
--dns-target-creds <Azure DNS Target Name> \
53+
--resource-group <Azure Resource Group Name>
54+
```
55+
56+
Where:
57+
58+
* `name`: A unique name for the target. The name can include a path to a virtual folder by using slash `/` separators. If the folder does not exist, Akeyless creates it with the target.
59+
60+
* `digicert-url`: Use this when you want to select the ACME environment explicitly. Supported values are `production` (default) and `staging`.
61+
62+
* `email`: Email address used for ACME account registration.
63+
64+
* `eab-key-id`: External Account Binding Key ID from DigiCert Services.
65+
66+
`eab-hmac-key`: External Account Binding Key ID from DigiCert Services.
67+
68+
* `acme-challenge`: Use this when you need DNS validation or want to set the challenge type explicitly. Supported values are `http` (default) and `dns`.
69+
70+
* `dns-target-creds`: Use this when `--acme-challenge=dns`. This is required for DNS validation. Supported target types are AWS, Azure, and GCP.
71+
72+
* `hosted-zone`: Use this when `--acme-challenge=dns` and `--dns-target-creds` points to an AWS target. This identifies the Route 53 hosted zone.
73+
74+
* `resource-group`: Use this when `--acme-challenge=dns` and `--dns-target-creds` points to an Azure target.
75+
76+
* `gcp-project`: Use this when `--acme-challenge=dns` and `--dns-target-creds` points to a GCP target and the project ID cannot be derived automatically.
77+
78+
* `timeout`: Use this when challenge validation needs a custom wait time. Default is `5m`. Supported range is `1m` to `1h`.
79+
80+
* `key`: Use this when you want to encrypt target secret values with a specific protection key instead of the account default key.
81+
82+
[View the complete list of parameters for this command.](https://docs.akeyless.io/docs/cli-ref-targets#lets-encrypt)
83+
84+
## Create a Digicert Target in the Console
85+
86+
1. Log in to the Akeyless Console, and go to **Targets** > **New** > **Certificate Automation (Digicert)**.
87+
88+
2. Define the Name of the target, and specify the Location as a path to the virtual folder where you want to create the new target, using slash `/` separators. If the folder does not exist, it will be created together with the target.
89+
90+
3. Select a **Protection key** with a Customer Fragment to enable Zero-Knowledge and click **Next**. [Read more about Zero-Knowledge Encryption](https://docs.akeyless.io/docs/implement-zero-knowledge).
91+
92+
4. Define the remaining parameters as follows:
93+
* **Environment**: The ACME environment, **US Production** / **EU Production** / **US Demo** or **EU Demo**
94+
95+
* **Email**: Email address used to register the ACME account.
96+
97+
* **DNS Provider**: Either **AWS**, **GCP**, or **Azure** (relevant only if **Challenge Type** is **DNS**).
98+
99+
* **Target**: Select a target that contains the DNS provider credentials (relevant only if **Challenge Type** is **DNS**).
100+
101+
* **Hosted Zone**: [AWS Route 53](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/hosted-zones-working-with.html) hosted zone identifier. (Relevant only if **Challenge Type** is **DNS** and **DNS Provider** is **AWS**).
102+
103+
* **Resource Group**: Azure resource group name. (Relevant only if **Challenge Type** is **DNS** and **DNS Provider** is **Azure**).
104+
105+
* **GCP Project**: GCP Cloud DNS project ID. Optional when **DNS Provider** is **GCP**.
106+
107+
* **Timeout**: Challenge validation timeout in seconds. Default is 300 seconds (5 minutes).
108+
109+
5. Click Finish.
110+
111+
<br />
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
title: Google CA Target
3+
deprecated: false
4+
hidden: false
5+
metadata:
6+
robots: index
7+
---
8+
The [Google CA](https://cloud.google.com/security/products/certificate-authority-service?hl=en) Target enables the use of **Google CA** as a Public Certificate Authority (CA) with an Akeyless [PKI Issuer](https://docs.akeyless.io/docs/ssh-and-pkitls-certificates).
9+
10+
With a public CA, Akeyless cannot access the private key that signs certificates. Akeyless validates certificate issuance requests by connecting to **Google CA** through the [Akeyless Gateway](https://docs.akeyless.io/docs/api-gw).
11+
12+
The **Google CA** integration uses an [ACME Client (v2)](https://datatracker.ietf.org/doc/html/rfc8555).
13+
14+
To prove domain ownership, the Akeyless integration supports DNS validation:
15+
16+
* **DNS validation**: Ownership is proven by adding a DNS TXT record. This requires the domain to be managed in a supported DNS provider's hosted zone (for example, AWS Route 53, GCP Cloud DNS, or Azure DNS).
17+
18+
## Create a Google CA Target with the CLI
19+
20+
To create a Google CA target with the CLI, use one of the following examples based on the challenge method and DNS provider:
21+
22+
```shell DNS with AWS
23+
akeyless target create google-trust \
24+
--name <Target Name> \
25+
--google-trust-url <production / staging> \
26+
--email <ACME Account Email> \
27+
--eab-key-id <EAB Key ID> \
28+
--eab-hmac-key <EAB HMAC Key> \
29+
--acme-challenge dns \
30+
--dns-target-creds <AWS DNS Target Name> \
31+
--hosted-zone <Route53 Hosted Zone ID>
32+
```
33+
```shell DNS with GCP
34+
akeyless target create google-trust \
35+
--name <Target Name> \
36+
--google-trust-url <production / staging>
37+
--email <ACME Account Email> \
38+
--eab-key-id <EAB Key ID> \
39+
--eab-hmac-key <EAB HMAC Key> \
40+
--acme-challenge dns \
41+
--dns-target-creds <GCP DNS Target Name> \
42+
--gcp-project <GCP Project ID>
43+
```
44+
```shell DNS with Azure
45+
akeyless target create google-trust \
46+
--name <Target Name> \
47+
--google-trust-url <production / staging>
48+
--email <ACME Account Email> \
49+
--eab-key-id <EAB Key ID>
50+
--eab-hmac-key <EAB HMAC Key>
51+
--acme-challenge dns \
52+
--dns-target-creds <Azure DNS Target Name> \
53+
--resource-group <Azure Resource Group Name>
54+
```
55+
56+
Where:
57+
58+
* `name`: A unique name for the target. The name can include a path to a virtual folder by using slash `/` separators. If the folder does not exist, Akeyless creates it with the target.
59+
60+
* `email`: Email address used for ACME account registration.
61+
62+
* `eab-key-id`: External Account Binding Key ID from Google CA Services.
63+
64+
* `eab-hmac-key`: External Account Binding Key ID from Google CA Services.
65+
66+
* `--google-trust-url`: Use this when you want to select the ACME environment explicitly. Supported values are `production` (default) and `staging`.
67+
68+
* `acme-challenge`: Use this when you need DNS validation or want to set the challenge type explicitly.
69+
70+
* `dns-target-creds`: Use this when `--acme-challenge=dns`. This is required for DNS validation. Supported target types are AWS, Azure, and GCP.
71+
72+
* `hosted-zone`: Use this when `--acme-challenge=dns` and `--dns-target-creds` points to an AWS target. This identifies the Route 53 hosted zone.
73+
74+
* `resource-group`: Use this when `--acme-challenge=dns` and `--dns-target-creds` points to an Azure target.
75+
76+
* `gcp-project`: Use this when `--acme-challenge=dns` and `--dns-target-creds` points to a GCP target and the project ID cannot be derived automatically.
77+
78+
* `timeout`: Use this when challenge validation needs a custom wait time. Default is `5m`. Supported range is `1m` to `1h`.
79+
80+
* `key`: Use this when you want to encrypt target secret values with a specific protection key instead of the account default key.
81+
82+
[View the complete list of parameters for this command.](https://docs.akeyless.io/docs/cli-ref-targets#lets-encrypt)
83+
84+
## Create a Google CA Target in the Console
85+
86+
1. Log in to the Akeyless Console, and go to **Targets** > **New** > **Certificate Automation (Google CA)**.
87+
88+
2. Define the Name of the target, and specify the Location as a path to the virtual folder where you want to create the new target, using slash `/` separators. If the folder does not exist, it will be created together with the target.
89+
90+
3. Select a **Protection key** with a Customer Fragment to enable Zero-Knowledge and click **Next**. [Read more about Zero-Knowledge Encryption](https://docs.akeyless.io/docs/implement-zero-knowledge).
91+
92+
4. Define the remaining parameters as follows:
93+
* **Email**: Email address used to register the ACME account.
94+
95+
* **URL**: Either [Production](https://acme-v02.api.letsencrypt.org/directory) or [Staging](https://acme-staging-v02.api.letsencrypt.org/directory).
96+
97+
* **EAB KID**: External Account Binding Key ID from Google CA Services.
98+
99+
* **EAB HMAC Key**: External Account Binding HMAC Key from Google CA Services.
100+
101+
* **DNS Provider**: Either **AWS**, **GCP**, or **Azure** (relevant only if **Challenge Type** is **DNS**).
102+
103+
* **Target**: Select a target that contains the DNS provider credentials (relevant only if **Challenge Type** is **DNS**).
104+
105+
* **Hosted Zone**: [AWS Route 53](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/hosted-zones-working-with.html) hosted zone identifier. (Relevant only if **Challenge Type** is **DNS** and **DNS Provider** is **AWS**).
106+
107+
* **Resource Group**: Azure resource group name. (Relevant only if **Challenge Type** is **DNS** and **DNS Provider** is **Azure**).
108+
109+
* **GCP Project**: GCP Cloud DNS project ID. Optional when **DNS Provider** is **GCP**.
110+
111+
* **Timeout**: Challenge validation timeout in seconds. Default is 300 seconds (5 minutes).
112+
113+
5. Click Finish.
114+
115+
<br />

docs/Universal Secret Connector/universal-secrets-connector/_order.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,3 +3,4 @@
33
- gcp-universal-secrets-connector
44
- hc-vault-universal-secrets-connector
55
- kubernetes-universal-secrets-connector
6+
- github-universal-secret-connector

0 commit comments

Comments
 (0)