Set up managed automation for a custom application
CertCentral managed automation supports the most popular web server applications out of the box.
CertCentral also provides the flexibility to extend certificate management to additional applications not natively supported by allowing configuration of third-party ACME clients via the "custom application" option.
Follow these steps to enable CertCentral managed automation for a custom application.
Custom automations require an active DigiCert agent on the server. The agent coordinates automation requests received from CertCentral and calls your custom shell script to handle certificate lifecycle events for the custom application.
For detailed instructions about how to deploy DigiCert agents on your servers, see Install and activate an ACME automation agent.
In addition to a DigiCert agent, the server must have a third-party ACME client installed. Your custom automation script invokes the ACME client to request certificates from CertCentral and install them for your custom Linux or Windows application.
CertCentral managed automation works with any third-party ACME client that supports the ACMEv2 protocol. Follow the software provider's guidelines to install and configure your preferred third-party ACME client on the same system as your custom application.
You need a shell script to drive the third-party ACME client on your server. During an automation event, the DigiCert agent calls this shell script to invoke the ACME client, which then requests the certificate from CertCentral and installs it for your custom application.
The shell script contains the ACME client command to request and install certificates for your custom application using the parameters expected by the CertCentral ACME service. Command syntax varies based on which third-party ACME client you use. Check the software provider's guidelines for more information.
Below are examples of shell scripts to enable CertCentral managed automation for a custom application via third-party ACME clients Certbot (Linux) and Win-ACME (Windows):
Variable definitions at the top of these shell scripts set the required ACME request parameters:
These must match up with the ACME arguments you configure for the custom application in CertCentral.
During an automation event, values for these arguments are supplied to the shell script by the local DigiCert agent that calls it.
Commands used in the shell script:
Must include all mandatory parameters.
Must not exceed 512 characters.
Must not include special directives like
rm -rf
orrmdir
The shell script filename:
Must end with
.bat
or.sh
Must not exceed 255 characters.
Use the CertCentral Manage automation menu to complete the configuration for your custom application:
In your CertCentral account, in the left main menu, select Automation > Manage automation.
From the Manage automation view, select the Name of the local DigiCert agent running on the system with the custom application.
In the agent configuration panel on the right, move down to the Configure IP/Port section.
Locate the IP address and port number for the custom application. Select Custom as the application name.
In the Client command path field, provide the complete path for the shell script that invokes the third-party ACME client.
For example:
Windows:
G:\certcentral\agent\custom_automation_1.bat
Linux:
/home/certcentral/agent/custom_automation_1.sh
In the Client command arguments field, specify the general ACME arguments to use.
For example:
{acmeDirectoryUrl} {hosts} {email} {key} {extActKid} {extActHmac}
Note that:
Each argument must be entered exactly as shown here.
The order of the arguments must match up with how they are used in your shell script.
During an automation event, the required values for these arguments are obtained from the selected automation profile.
Explanation of ACME arguments supported by CertCentral managed automation:
{acmeDirectoryUrl}
– ACME directory URL settings.{hosts}
– Certificate host details.{email}
– Email address for notifications.{key}
– Key algorithm (RSA or ECC).{extActKid}
– External account key identifier used in the URL.{extActHmac}
– HMAC key for signing the response.
Select Save to put the updated automation settings into effect.
What's next?
After setting up the custom application, you can manage certificates for it from CertCentral in the same way as any other managed application. To learn more, see Next steps.