Skip to main content

System scripts

DigiCert provides a few post-processing scripts, which DigiCert manages and are referred to as System scripts. The system post-processing scripts are signed so you can verify them for authenticity and integrity to safeguard against unauthorized or malicious changes.

In DigiCert​​®​​ Trust Lifecycle Manager, you can view all the system scripts from Discovery & automation tools > Scripts > System scripts page, where these scripts are available to view, download, or for reference. All the system scripts that DigiCert manages are non-editable.

Warning

If using a third-party platform for device management, ensure the PowerShell execution policy on client computers is set to RemoteSigned to ensure proper operation of the Windows system post-scripts. Check the Microsoft PowerShell documentation for more details about execution policies.

DigiCert-managed system post-scripts

Script name

OS*

Script description

Supported certificate templates

Microsoft Outlook Configuration

To use this script, the 64-bit version of Microsoft Outlook 2016 or later must be installed.

Important

New Outlook for Windows is not supported for post-processing scripts.

Windows

Configure Outlook's security profile to use the certificate for signing and encrypting.

  • Private S/MIME Secure Email

  • Public S/MIME Secure Email (via CertCentral)

Active Directory Publisher - Windows

Windows

Publish the certificate to an Active Directory.

  • Private S/MIME Secure Email

  • Public S/MIME Secure Email (via CertCentral)

Active Directory Publisher - macOS

macOS

Publish the certificate to an Active Directory.

Requires DigiCert Trust Assistant V1.2.6 or later to run this script.

  • Private S/MIME Secure Email

  • Public S/MIME Secure Email (via CertCentral)

Adobe Acrobat Document Signing Configuration

Windows

This script configures Adobe Acrobat Reader to use the Adobe individual certificate for document signing.

Adobe Individual in Organization (via CertCentral)

*For specific version of the OS, refer to Prerequisites.

Verify system script signature

Once a signed system script is downloaded from DigiCert® Trust Lifecycle Manager, it is possible to verify the script signature manually.

Note

The signature verification step is optional and can be skipped.

Verifying Windows PowerShell scripts

Use the following Powershell command to verify a signed PowerShell script:

PS> Get-AuthenticodeSignature -FilePath <path-to-script-file>

For example, a valid signature on Outlook.ps1 looks like:

PS> Get-AuthenticodeSignature -FilePath .\Outlook.ps1


SignerCertificate                          Status                        Path                                   
-----------------------------------------------------------------------------                   
D05A55D54AAA0653D148B231141AC268C416E1D4   Valid                    Outlook.ps1

Verifying macOS shell scripts

Use the following command on a macOS terminal to verify a signed shell script:

security cms -D -i <path-to-script-file>

For example, an invalid script looks like:

$ security cms -D -i invalid.sh
security: failed to add data to decoder: UNKNOWN (-8183(d)
security: problem decoding

Whereas, a valid signed script looks like:

$ security cms -D -i ADPublisher.sh
IyEvYmluL2Jhc2gKCiMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjCiMgQURQdWJsaXNoZXJfTWFjLnNoCiMgCiMgVGhpcyBzY3JpcHQgcHVibGlzaGVzIGEgY2VydGlmaWNhdGUgdG8gQWN0aXZlIERpcmVjdG9yeSB1c2luZyBMREFQLgojIEl0...<snip>...

* pipe the output to decode base64 encoding to obtain the script.

security cms -D -i <path-to-script-file> | base64 -d, for example:

$ security cms -D -i ADPublisher.sh | base64 -d
#!/bin/bash

#############################################################################
# ADPublisher_Mac.sh
#
# This script publishes a certificate to Active Directory using LDAP.
...<snip>...

Code signing certificate and CA chain

Use the following links to download the PEM-encoded code signing, intermediate CA, and root CA certificates used to sign the system scripts:

TSA (Time-Stamping Authority) signing certificate and CA chain

Use the following links to download the TSA (Time-Stamping Authority) signing and intermediate root CA certificates: