Skip to main content

Einrichten einer benutzerdefinierten Anwendung für Managed Automation

Die CertCentral Managed Automation unterstützt die gängigsten Webserver-Anwendungen.

CertCentral bietet außerdem die Flexibilität, die Zertifikatsverwaltung für zusätzliche Anwendungen zu erweitern, die nicht nativ unterstützt werden, indem die Konfiguration von ACME-Clients von Drittanbietern über die Option „benutzerdefinierte Anwendung“ ermöglicht wird.

Führen Sie die folgenden Schritte aus, um die verwaltete Automatisierung für eine benutzerdefinierte Anwendung zu aktivieren:

Custom automations require an active DigiCert agent on the server. The agent:

  • Coordinates each automation request sent through Trust Lifecycle Manager, including details about the requested certificate type and properties.

  • Invokes your custom shell script on the server to complete the request and install the certificate for your application.

For detailed instructions about how to install and activate DigiCert agents on your servers, see Deploy and manage agents.

Wichtig

To add and assign custom scripts, each agent must be running software version 3.1.2 or above.

In addition to a DigiCert agent, the server must have the Certbot ACME client installed.

Your custom shell script invokes Certbot to complete each request and install the resulting certificate for your custom Linux or Windows application.

For detailed instructions about how to download and install the Certbot client, refer to the official Certbot instructions.

You need a shell script to help manage the certificates for your custom application.

The shell script contains the Certbot command to request and install certificates for your application via the Trust Lifecycle Manager ACME service. Below are example shell scripts for Linux and Windows.

Example scripts

Usage notes

Variable definitions at the top of these shell scripts set the required ACME request parameters:

  • These must match up with the ACME arguments you configure for the custom application in Trust Lifecycle Manager (see below).

  • During an automation event, values for these arguments are supplied to the shell script by the local DigiCert agent.

Commands used in the shell script:

  • Must include all mandatory parameters.

  • Must not exceed 512 characters.

  • Must not include special directives like rm -rf or rmdir

The shell script filename:

  • Must end with .sh or .bat.

  • Must not exceed 255 characters.

To add a custom automation script in Trust Lifecycle Manager:

  1. In the Trust Lifecycle Manager menu, go to Discovery & automation tools > Scripts > DigiCert agents.

  2. Open the Add script for dropdown on the top-right, and select DigiCert agents.

  3. Complete the Add new script sidebar:

    • Name: Enter a user-friendly name for referencing the script.

    • Operating system: Select the applicable operating system (Linux or Windows).

    • Script type: Select Custom automation.

    • Upload script: Drag and drop or browse to select the script to upload. Once uploaded, the name of the script appears below the widget.

    • Description: (Optional) Enter an optional description for the script to help identify it in Trust Lifecycle Manager.

    • Command-line arguments: Enter a space-separated list of general ACME parameters to use with your custom automation script.

      Beispiel:

      {acmeDirectoryUrl} {hosts} {email} {key} {extActKid} {extActHmac}

      Beachten Sie Folgendes:

      • Jedes Argument muss genau wie hier dargestellt eingegeben werden.

      • Die Reihenfolge der Argumente muss mit der Verwendung in Ihrem Shell-Skript übereinstimmen.

      • Während eines Automatisierungsereignisses werden die erforderlichen Werte für diese Argumente automatisch aus dem ausgewählten Automatisierungsprofil abgerufen.

      Erklärung der von CertCentral unterstützten ACME-Argumente:

      • {acmeDirectoryUrl} – Einstellungen der ACME Verzeichnis-URL.

      • {hosts} – Zertifikatshost-Details.

      • {email} – E-Mail-Adresse für Benachrichtigungen.

      • {key} – Schlüsselalgorithmus (RSA oder ECC).

      • {extActKid} – In der URL verwendete externe Schlüssel-ID.

      • {extActHmac} – HMAC-Schlüssel zum Signieren der Antwort.

  4. Select Add and verify script to verify the script in Trust Lifecycle Manager. Once verified, the script is available for assignment.

Hinweis

For more information about how to add and manage agent scripts in Trust Lifecycle Manager, see Agent scripts.

To complete the custom automation configuration, assign the script to any DigiCert agents that will manage certificates for the custom application:

  1. From the Trust Lifecycle Manager menu, go to Discovery & automation tools > Agents.

  2. Select the agent by name to view the details for it.

  3. On the details page, select the pencil icon on the right to edit the agent configuration.

  4. In the IP/port targets section for the agent, locate any IP/port targets where the custom application is running and configure them as follows:

    • Application: Select Custom.

    • Custom automation script: Select the custom automation script by the name assigned to it in Trust Lifecycle Manager.

  5. Select the Update button at the bottom to save your changes.

What's next

After enabling managed automation for your custom application, you can manage certificate deployments for it as you would any other server application in Trust Lifecycle Manager.

When you need a new certificate for your custom application:

  1. You submit the request through the Trust Lifecycle Manager web console or REST API.

  2. The DigiCert agent on the local system processes the certificate request and invokes your custom shell script with the required parameters.

  3. Your custom shell script invokes the Certbot ACME client to complete the request and install the new certificate for your application.