Skip to main content

Establecer una aplicación personalizada para la automatización administrada

La automatización administrada de CertCentral admite las aplicaciones de servidor web más populares de manera diferente.

CertCentral también ofrece la flexibilidad de extender la administración de certificados para aplicaciones adicionales no admitidas de manera nativa al permitir la configuración de clientes ACME de terceros a través de la opción "personalizar aplicación".

Para habilitar la automatización administrada para una aplicación personalizada, siga estos pasos:

Custom automations require an active DigiCert agent on the server. The agent:

  • Coordinates each automation request sent through Trust Lifecycle Manager, including details about the requested certificate type and properties.

  • Invokes your custom shell script on the server to complete the request and install the certificate for your application.

For detailed instructions about how to install and activate DigiCert agents on your servers, see Deploy and manage agents.

Importante

To add and assign custom scripts, each agent must be running software version 3.1.2 or above.

In addition to a DigiCert agent, the server must have the Certbot ACME client installed.

Your custom shell script invokes Certbot to complete each request and install the resulting certificate for your custom Linux or Windows application.

For detailed instructions about how to download and install the Certbot client, refer to the official Certbot instructions.

You need a shell script to help manage the certificates for your custom application.

The shell script contains the Certbot command to request and install certificates for your application via the Trust Lifecycle Manager ACME service. Below are example shell scripts for Linux and Windows.

Example scripts

Usage notes

Variable definitions at the top of these shell scripts set the required ACME request parameters:

  • These must match up with the ACME arguments you configure for the custom application in Trust Lifecycle Manager (see below).

  • During an automation event, values for these arguments are supplied to the shell script by the local DigiCert agent.

Commands used in the shell script:

  • Must include all mandatory parameters.

  • Must not exceed 512 characters.

  • Must not include special directives like rm -rf or rmdir

The shell script filename:

  • Must end with .sh or .bat.

  • Must not exceed 255 characters.

To add a custom automation script in Trust Lifecycle Manager:

  1. In the Trust Lifecycle Manager menu, go to Discovery & automation tools > Scripts > DigiCert agents.

  2. Open the Add script for dropdown on the top-right, and select DigiCert agents.

  3. Complete the Add new script sidebar:

    • Name: Enter a user-friendly name for referencing the script.

    • Operating system: Select the applicable operating system (Linux or Windows).

    • Script type: Select Custom automation.

    • Upload script: Drag and drop or browse to select the script to upload. Once uploaded, the name of the script appears below the widget.

    • Description: (Optional) Enter an optional description for the script to help identify it in Trust Lifecycle Manager.

    • Command-line arguments: Enter a space-separated list of general ACME parameters to use with your custom automation script.

      Por ejemplo:

      {acmeDirectoryUrl} {hosts} {email} {key} {extActKid} {extActHmac}

      Tenga en cuenta lo siguiente:

      • Cada argumento se debe ingresar exactamente como se muestra aquí.

      • El orden de los argumentos debe coincidir con cómo se usan en su script shell.

      • Durante un evento de automatización, los valores requeridos para estos argumentos se obtienen automáticamente desde el perfil de automatización seleccionado.

      Explicación de los argumentos ACME admitidos por la automatización administrada de CertCentral:

      • {acmeDirectoryUrl}: configuración de URL de directorio ACME.

      • {hosts}: detalles del host del certificado.

      • {email}: dirección de correo electrónico para notificaciones.

      • {key}: algoritmo de la clave (RSA o ECC).

      • {extActKid}: identificador clave de cuenta externa usado en la URL.

      • {extActHmac}: clave HMAC para firmar la respuesta.

  4. Select Add and verify script to verify the script in Trust Lifecycle Manager. Once verified, the script is available for assignment.

Aviso

For more information about how to add and manage agent scripts in Trust Lifecycle Manager, see Agent scripts.

To complete the custom automation configuration, assign the script to any DigiCert agents that will manage certificates for the custom application:

  1. From the Trust Lifecycle Manager menu, go to Discovery & automation tools > Agents.

  2. Select the agent by name to view the details for it.

  3. On the details page, select the pencil icon on the right to edit the agent configuration.

  4. In the IP/port targets section for the agent, locate any IP/port targets where the custom application is running and configure them as follows:

    • Application: Select Custom.

    • Custom automation script: Select the custom automation script by the name assigned to it in Trust Lifecycle Manager.

  5. Select the Update button at the bottom to save your changes.

What's next

After enabling managed automation for your custom application, you can manage certificate deployments for it as you would any other server application in Trust Lifecycle Manager.

When you need a new certificate for your custom application:

  1. You submit the request through the Trust Lifecycle Manager web console or REST API.

  2. The DigiCert agent on the local system processes the certificate request and invokes your custom shell script with the required parameters.

  3. Your custom shell script invokes the Certbot ACME client to complete the request and install the new certificate for your application.